Security Solutions for AI/ML


AI/ML is increasingly pervasive across all industries driven by a massive wave of digitization. Data, the raw material of AI/ML and Deep Learning algorithms, is available in enormous quantities from all aspects of business operations. AI/ML promises great gains in responsiveness and adaptability in an ever-changing technology landscape, and industries are enthusiastically responding to that app... » read more

When It Makes Sense To Perform An Open Source Audit


Today's software is not created so much as assembled. The parts that serve as ingredients come from a variety of sources, but mostly from the millions of open source components freely available on the internet. This has enabled a digital transformation in several industries, helping market leaders speed their time to market, lower costs, and improve innovation. But what are the licensing and... » read more

Power/Performance Bits: June 1


Stronger PUFs Researchers from Ohio State University and Potomac Research propose a new version of physical unclonable functions, or PUFs, that could be used to create secure ID cards, to track goods in supply chains, and as part of authentication applications. "There's a wealth of information in even the smallest differences found on computers chips that we can exploit to create PUFs," sai... » read more

One-On-One: Lip-Bu Tan


Lip-Bu Tan, CEO of Cadence, sat down with Semiconductor Engineering to talk about the impact of massive increases in data across a variety of industries, the growing need for computational software, and the potential implications of U.S.-China relations. What follows are excerpts of that discussion. SE: What do you see as the biggest change for the chip industry? Tan: We're in our fifth g... » read more

Achieving Automotive Safety With Security


Security researchers have demonstrated extensively how cybersecurity attacks can have disastrous consequences in automobiles. A successful car hack in an automotive control system such as the drive train or brakes could affect an entire fleet of vehicles and put many lives in danger. Moreover, car owners' privacy and the protection of intellectual properties (IPs) and other assets of car manufa... » read more

Securing AI/ML With A Hardware Root Of Trust


AI/ML (Artificial Intelligence/Machine Learning) is now pervasive across all industries. It contributes to rationalizing and harnessing the enormous amount of information made available by the current massive wave of digitization. Digitization is transforming how business is run and how value is produced using digital technologies. Data, the raw material of AI/ML and deep learning algorithms, i... » read more

IC Security Threat Grows As More Devices Are Connected


Designing for security is beginning to gain traction across a wider swath of chips and systems as more of them are connected to the Internet and to each other, sometimes in safety- and mission-critical markets where the impact of a cyber attack can be devastating. But it's also becoming more difficult to design security into these systems. Unlike in the past, connectivity is now considered e... » read more

MACsec Explained: Securing Data in Motion


For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides the foundation upon which all data security is built. Similarly, for data in motion, security anchored in hardware at the foundational communication layer prov... » read more

Penetration Testing: A Buyer’s Guide


Data breaches continue to plague organizations—whether they’re targeted attacks from outside or malicious insiders. According to the 2020 IBM “Cost of Data Breach” report, 52% of breaches were caused by a malicious attack and the average total cost of a breach was $3.86 million. Many of these breaches are the result of combinations of errors or vulnerabilities, with attackers working th... » read more

Shifting Auto Architectures


Domain controllers and gateways are being replaced by central processing modules and zonal gateways to handle all of the data traffic in a vehicle. Ron DiGiuseppe, automotive IP segment manager at Synopsys, talks with Semiconductor Engineering about how automotive applications are changing, what that means for engineering teams, and how they will shift as AI is increasingly deployed. » read more

← Older posts Newer posts →