Design For Security Now Essential For Chips, Systems


It's nearly impossible to create a completely secure chip or system, but much can be done to raise the level of confidence about that security. In the past, security was something of an afterthought, disconnected from the architecture and added late in the design cycle. But as chips are used increasingly in safety- and mission-critical systems, and as the value of data continues to rise, the... » read more

Rambus RT-640 Road To ISO 26262 Certification


Modern vehicles incorporate an increasing number of complex integrated circuits. Failures in automotive systems can lead to damage to property, injury or loss of life. Ensuring the reliability of electronic systems is crucial, and the ISO26262 standard documents the requirements for determining automotive functional safety. This white paper details the process for how Rambus achieved the ISO262... » read more

L5 Adoption Hinges on 5G/6G


Truly self-driving cars don’t yet exist, and research shows many consumers are wary of them anyway. What will it take to make fully autonomous cars possible? And how can automakers convince consumers to adopt such vehicles? Experts say the answer to both questions could lie in wireless communication networks. That’s because such networks offer a workaround to a major obstacle in autonomo... » read more

The Next Incarnation Of EDA


The EDA industry has incrementally addressed issues as they arise in the design of electronic systems, but is there about to be a disruption? Academia is certainly seeing that as a possibility, but not all of them see it happening for the same reason. The academic community questioned the future of EDA at the recent Design Automation Conference. Rather than EDA as we know it going away, they... » read more

Using GPUs to Speed Up DFIT Analysis


Researchers at National University of Singapore and an independent researcher presented a new technical paper titled "FlowMatrix: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation" at the USENIX Security Symposium in Boston in August 2022. Abstract: "Dynamic Information Flow Tracking (DIFT) forms the foundation of a wide range of security and privacy analyses. The ... » read more

Design And Security Challenges for VR


Virtual reality is no longer just for gamers, and as this technology is deployed in everything from health care to industrial training, the requirements for processing more data faster over a high-speed connection are growing. Designing these devices continues to be a study in contradictions. They must be extremely low power, with a small enough batteries to make them comfortable to wear. Bu... » read more

Building Trust Through Certification Of Security Solutions


Certification is all around us in our daily lives. When it comes to making decisions, we look for certain labels, stamps, and symbols indicating that products and services have been assessed or tested. If you are buying a new car, you may review NCAP (New Car Assessment Program) test results. If you are getting electrical work done at your home, you will choose a certified professional. And if ... » read more

Hertzbleed: Prime Time For Power Side Channel Countermeasures Or Novelty Attack?


Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of clock cycles. The novel observation is that the duration of a clock cycle can vary depending on the data processed on a CPU that uses dynamic frequency scaling. This allows a remote attacker to extract... » read more

Is Standardization Required For Security?


Semiconductor Engineering sat down to discuss chip and system security with Mike Borza, fellow and scientist on the security IP team at Synopsys; Lee Harrison, automotive IC test solutions manager at Siemens Digital Industries Software; Jason Oberg, founder and CTO of Cycuity (formerly Tortuga Logic); Nicole Fern, senior security analyst at Riscure; Norman Chang, fellow and CTO of the electroni... » read more

Five Things You Should Know To Avoid The Most Common Security Errors


Since 2001, Riscure has been helping chip vendors and device manufacturers improve the security of their products. Over the years, the security scenario has changed a lot. The attacker profile evolved from individuals motivated by curiosity, with very limited resources and attack potential, to well-funded and organized adversaries with dark motivations and the capacity to execute very sophistic... » read more

← Older posts Newer posts →