Bandwidth Utilization Side-Channel On ML Inference Accelerators


Abstract—Accelerators used for machine learning (ML) inference provide great performance benefits over CPUs. Securing confidential model in inference against off-chip side-channel attacks is critical in harnessing the performance advantage in practice. Data and memory address encryption has been recently proposed to defend against off-chip attacks. In this paper, we demonstrate that bandwidth... » read more

Debugging Embedded Applications


Debugging embedded designs is becoming increasingly difficult as the number of observed and possible interactions between hardware and software continue to grow, and as more features are crammed into chips, packages, and systems. But there also appear to be some advances on this front, involving a mix of techniques, including hardware trace, scan chain-based debug, along with better simulation ... » read more

HECTOR-V: A Heterogeneous CPU Architecture for a Secure RISC-V Execution Environment


Summary "To ensure secure and trustworthy execution of applications, vendors frequently embed trusted execution environments into their systems. Here, applications are protected from adversaries, including a malicious operating system. TEEs are usually built by integrating protection mechanisms directly into the processor or by using dedicated external secure elements. However, both of these... » read more

Implementing Secure Boot With A Root Of Trust


A boot sequence describes the initial set of operations performed by a device at the start of the boot process. During this stage, available resources reside in some form of local, nonvolatile storage that is readily accessible by the device. The entity initiating the startup sequence is known as a boot loader (or bootstrap loader). The boot loader enables forward progression throughout the ... » read more

Deep Dive Into Hardware Security Verification At This Year’s Osmosis User Group


We’ve been talking for months about how to successfully verify designs to avoid security weaknesses and vulnerabilities. In the upcoming Osmosis (OneSpin Meeting on Solution, Innovation & Strategy) user group event, attendees will get to hear first-hand from one of our most ardent users how they were able to secure their hardware design. The two-day, virtual event on November 3rd and 4... » read more

Six Things We Might Need For Pervasive Computing


There is little doubt that digital technology will become more pervasive than it is even now in the coming decades. Organizations like the Exponential Group argue that digital should be the first step in sustainability, estimating that hardware and software could help reduce emissions by 15% by 2030 and beyond by helping fine-tune buildings, factories, and other environments. Cars—already ... » read more

Latency Considerations Of IDE Deployment On CXL Interconnects


Certain applications and hardware types – emerging memory, artificial intelligence/machine learning (AI/ML), and cloud servers, to name a few – can realize significant performance advantages when a low latency interface is employed. However, traditional interconnects like PCI Express (PCIe) often do not offer low enough latencies required to optimize these applications. In response, the Com... » read more

Manufacturing Bits: Oct. 11


IC security using AFMs The National Institute of Standards and Technology (NIST) has developed a probe assisted doping technique (PAD), a technology that could help prevent counterfeit chips and electronic devices from entering the market. PAD involves creating a unique ID tag on every chip using an atomic force microscope (AFM). Basically, an AFM system incorporates a cantilever with a tin... » read more

Security Risks Grow With 5G


5G mobile phones can download a movie in seconds rather than minutes, but whether that can be done securely remains to be seen. What is clear from technology providers, though, is they are taking security very seriously with this new wireless technology. More data is in motion, and the value of that data is growing as users rely on mobile devices for everything from banking to automotive saf... » read more

Implementing An AES Cipher On Application-Specific Processors


In the previous blog post, “Embedded Security Using Cryptography”, we looked at how cryptography can be used for securing assets in embedded systems and ensure confidentiality, integrity and authenticity, or in short “CIA”. In this blog, we will explore the Advanced Encryption Standard (AES) and how to implement an AES engine on Cadence Tensilica Xtensa application-specific processors. ... » read more

← Older posts Newer posts →