Why Connectivity Is Changing Microcontrollers


More devices are being connected to the internet and to each other, transforming what used to be a simple microprocessor with fixed memory and limited connectivity into a much more complex and versatile device. These new MCUs need more compute power, more memory both on and off-chip, and on-the-fly encryption/decryption. Sivaram Trikutam, vice president of the Wi-Fi product line at Infineon, ta... » read more

Chip Industry Week In Review


The U.S. Department of Commerce and Texas Instruments (TI) signed a non-binding preliminary memorandum of terms to provide up to $1.6 billion in CHIPS Act funding towards TI’s investment of over $18 billion for three 300mm semiconductor wafer fabs under construction in Texas and Utah. TI also expects to get about $6 billion to $8 billion from the U.S. Department of Treasury’s Investmen... » read more

A Practical Approach To Inline Memory Encryption And Confidential Computing For Enhanced Data Security


In today's technology-driven landscape in which reducing TCO is top of mind, robust data protection is not merely an option but a necessity. As data, both personal and business-specific, is continuously exchanged, stored, and moved across various platforms and devices, the demand for a secure means of data aggregation and trust enhancement is escalating. Traditional data protection strategies o... » read more

Changes In Formal Verification


For the better part of two decades, formal verification was considered too difficult to use in many designs and too slow for anything but narrow bug hunting. Much has changed recently. Ashish Darbari, CEO of Axiomise, explains why formal is now essential for finding deadlocks, security holes, and Xprop issues in mission-critical, safety-critical, and AI designs, and how that will apply to chipl... » read more

Securing AI Silicon


The importance of security in AI training/inference silicon is increasing in awareness. Over the past several months, I’ve noticed many questions in common from various parts of the microelectronic industry. In this blog post, I’ll share my thoughts on some of these most frequently asked questions. Firstly, people often ask if securing AI silicon is different from securing other types of... » read more

Securing Data In Heterogeneous Designs


Data security is becoming a bigger concern as chips are disaggregated into chiplets and various third-party IP blocks. There is no single solution that works for all designs, and no single tool or methodology that addresses everything in any design. Data is being transmitted across time zones, political borders, and even across multiple designs. Laws and the need to comply with standards may... » read more

Temperature: A Growing Concern For Chip Security Experts


While everyone in the semiconductor industry wants to have the hottest new product, having that type of temperature manifest in a literal sense poses a threat not just to product stability and performance but to the security of the chips themselves. Temperature has become an object of fascination to security researchers due to the vagaries of how the physical properties of heat affect perfor... » read more

Addressing Quantum Computing Threats With SRAM PUFs


You’ve probably been hearing a lot lately about the quantum-computing threat to cryptography. If so, you probably also have a lot of questions about what this “quantum threat” is and how it will impact your cryptographic solutions. Let’s take a look at some of the most common questions about quantum computing and its impact on cryptography. What is a quantum computer? A quantum comput... » read more

The Importance Of Memory Encryption For Protecting Data In Use


As systems-on-chips (SoCs) become increasingly complex, security functions must grow accordingly to protect the semiconductor devices themselves and the sensitive information residing on or passing through them. While a Root of Trust security solution built into the SoCs can protect the chip and data resident therein (data at rest), many other threats exist which target interception, theft or t... » read more

Secure Your SoC From Side Channel Attacks With Adaptable Security


Many SoC and ASIC manufacturers rely heavily on cryptographic solutions to safeguard sensitive IP and data transmission within their devices. In a dynamic landscape where threats from attackers continue to evolve, encryption algorithms play a crucial role in fortifying defenses. Hackers today are leveraging advanced physical tactics that extend beyond traditional data interception, posing signi... » read more

← Older posts Newer posts →