Standards And Threat Testing For Secure Autonomous Vehicles


Modern vehicles continue to move up through the levels of autonomy, as defined by The Society of Automotive Engineers (SAE). These definitions have been widely adopted across the industry and emerging vehicle technology is measured against this scale (figure 1). Fig. 1: An illustration from the Society for Automotive Engineers shows levels of autonomy. The closer we move towards level... » read more

Setting The Standard For Automotive Security


Vehicle systems and the semiconductors used within them are some of the most complex electronics seen today. In the past, electronics going into vehicle systems implemented flat architectures with isolated functions controlling various components of the power train and vehicle dynamics. These electronic systems communicated primarily through legacy bus interconnect protocols, like controller ar... » read more

Add Security And Supply Chain Trust To Your ASIC Or SoC with eFPGAs


Before Covid-induced supply chain issues affected semiconductor availability and lead times, concerns about counterfeit parts and trusted supply chains were becoming the subject of many articles and discussions affecting critical data centers, communications, public infrastructure, and facilities such as regional power plants and the grid. Today’s semiconductor design and manufacturing is com... » read more

Preventing A $500 Attack Destroying Your IoT Devices


Internet of Things (IoT) smart devices numbering in the billions and connected via the internet are increasingly vital to society and the global economy. However, the very “connectedness” that makes IoT devices so valuable can be turned to an enormous liability if these devices are left unprotected from security-related threats. This paper explores the threat environment faced by, and the c... » read more

Common Weakness Enumeration


Understanding potential design vulnerabilities up front can help prevent future cyberattacks. Jason Oberg, CTO at Tortuga Logic, talks with Semiconductor Engineering about why CWE is so important, when it needs to be considered, and why no hardware design is completely bulletproof. » read more

Research Bits: March 22


Securing wireless communications without encryption Researchers from Princeton University, University of Michigan–Shanghai Jiao Tong University Joint Institute, and Xi’an Jiaotong University developed a millimeter-wave wireless chip that allows secure wireless transmissions and makes it challenging to eavesdrop on high-frequency wireless transmissions, even with multiple colluding bad acto... » read more

Navigating The Intersection Of Safety And Security


Vehicle systems and the semiconductors used within them are some of the most complex electronics seen today. In the past, electronics going into vehicle systems implemented flat architectures with isolated functions controlling various components of the power train and vehicle dynamics. However, to support the realization of Level 4 and Level 5 (L4/L5) autonomous driving, a massive restructure ... » read more

Verifying Side-Channel Security Pre-Silicon


As security grows in importance, side-channel attacks pose a unique challenge because they rely on physical phenomena that aren’t always modeled for the design verification process. While everything can be hacked, the goal is to make it so difficult that an attacker concludes it isn't worth the effort. For side-channel attacks, the pre-silicon design is the best place to address any known ... » read more

DPA Countermeasures Done Right


In the late nineties, Paul Kocher, Josh Jaffe, and Ben Jun published a paper that caused many across industry sectors to reconsider what cryptographic implementations should look like. They described an exploit wherein an adversary could extract secrets from a device by analyzing the power consumption or electromagnetic emittance from the device when it was executing cryptographic operations. S... » read more

Hardware Security Optimization With MITRE CWE


Whether you’re just starting to build out a hardware security program at your organization, or you’re looking to optimize existing hardware security processes, the MITRE Common Weakness Enumeration (CWE) database is an excellent resource to keep in your toolbox. What is CWE? A CWE is a type of vulnerability, or flaw, in the design of either hardware or software in embedded systems. Indi... » read more

← Older posts Newer posts →