Manufacturing Cyber Security


Designers and manufacturers worldwide are concerned about manufacturing cyber security and design data when using additive manufacturing technology. This whitepaper from Identify3D discusses how digital product data is shared during the additive manufacturing workflow and how that data might be better secured. Using products from Identify3D and Siemens, the entire additive manufacturing data ch... » read more

Meet Both Security And Safety Needs In New Automotive SoCs


With advances in hardware and software, smart vehicles are improving with every generation. Capabilities that once seemed far-off and futuristic—from automatic braking to self-driving features—are now either standard or within reach. However, as vehicle architectures evolve, the ways that both security and safety can be addressed at the system-on-chip (SoC) level also must evolve. Cars a... » read more

Improving PPA In Complex Designs With AI


The goal of chip design always has been to optimize power, performance, and area (PPA), but results can vary greatly even with the best tools and highly experienced engineering teams. Optimizing PPA involves a growing number of tradeoffs that can vary by application, by availability of IP and other components, as well as the familiarity of engineers with different tools and methodologies. Fo... » read more

Calibrate And Configure Your Power Management IC With NVM IP


Power Management Integrated Circuits (PMICs) are the first to turn on and the last to turn off in a system. They perform the task of delivering the right voltage to component chips by regulating or boosting the voltage levels to the component chips. Some PMICs are configured once at the factory and an area-efficient OTP NVM is the best choice. When a PMIC is expected to be re-configured mult... » read more

ISO/SAE 21434: Secure Hardware Development In Modern Vehicles


Demonstrating the importance of security doesn't get much more memorable than Charlie Miller and Chris Valasek successfully hacking a Jeep and driving it into a ditch. The effects of that drive have been long-reaching, sparking conversations in both the media and automotive industry about the evolving threat landscape as vehicles become increasingly automated. The average car contains over 1... » read more

Building A Defense In Depth Against Cyberattacks


As the number and type of cyberattacks, from the “simple and cheap” to the “expensive and sophisticated,” continues to grow at a dramatic pace, protection of chips and devices must employ a defense in depth strategy. In this way, if an attacker successfully bypasses a mechanism of protection, they’ll face another layer of defense, rather than a clear path to the assets they seek to ex... » read more

Data Security Challenges In Automotive


Automakers are scrambling to prevent security breaches and data hacks in new vehicles while simultaneously adding new and increasingly autonomous features into vehicles that can open the door to new vulnerabilities. These two goals are often at odds. As with security in any complex system, nothing is ever completely secure. But even getting a handle on this multilayered issue is a challenge.... » read more

Power Grids Under Attack


Cyberattacks are becoming as troublesome to the electrical power grid as natural disasters, and the problem is growing worse as these grids become more connected and smarter. Unlike in the past, when a power outage affected just the electricity supplied to homes and businesses, power grids are becoming core elements of smart cities, infrastructure, and safety-related services. Without power,... » read more

Health Care Is Gold Mine For Hackers


Today’s digital health care systems are facing relentless cyberattacks, which are targeting health care organizations as well as the medical devices they use. The critical nature and size of the U.S. health care market — an estimated $3.5 trillion in 2020, with substantial growth anticipated — make it a favorite target of hackers. Vanson Bourne conducted a survey for Sophos in early 20... » read more

FortifyIQ: Hardware Security Verification


What’s the best way to protect against side-channel attacks? FortifyIQ believes the answer lies at least partly in the verification process. Side channel and fault-injection attacks have been garnering more attention lately as hackers continue to branch out from software to a combination of software and hardware. This is especially worrying for safety-critical applications, such as automot... » read more

← Older posts Newer posts →