Network Interface Card Evolution


Longer chip lifetimes, more data to process and move, and a slowdown in the rate of processor improvements has created a series of constantly shifting bottlenecks. Kartik Srinivasan, director of data center marketing at Xilinx, looks at one of those bottlenecks, the network interface card, why continuous enhancements and changes will be required, and how to extend the life of NICs as the networ... » read more

How Heterogeneous ICs Are Reshaping Design Teams


Experts at the Table: Semiconductor Engineering sat down to discuss the complex interactions developing between different engineering groups as designs become more heterogeneous, with Jean-Marie Brunet, senior director for the Emulation Division at Siemens EDA; Frank Schirrmeister, senior group director for solution marketing at Cadence; Maurizio Griva, R&D Manager at Reply; and Laurent Mai... » read more

CISO’s Guide To Sensitive Data Protection


Emerging data protection and privacy laws are causing organizations to scramble to implement strategies that address regulatory compliance and data security governance. And the SolarWinds software supply chain attack, in which attackers inserted a malicious back door into its network software release that later led to sensitive data exposure, further underscores the need to secure the DevSecOps... » read more

COVID-19 And Cybersecurity: Pay Attention To Exponential Growth!


COVID-19 and cybersecurity – you may wonder what these two seemingly very different topics have in common. I would list two: Both of them are exponential in nature, which, as a society we have difficulties grappling with – making this one of the reasons for our uneven responses. Both of them require a multi-layered solution strategy that, while it does not need to be perfect, must b... » read more

Design Issues For Chips Over Longer Lifetimes


Semiconductor Engineering sat down to discuss the myriad challenges associated with chips used in complex systems over longer periods of time them with Jean-Marie Brunet, senior director for the Emulation Division at Siemens EDA; Frank Schirrmeister, senior group director for solution marketing at Cadence; Maurizio Griva, R&D Manager at Reply; and Laurent Maillet-Contoz, system and architec... » read more

Water System Hack And The Implications For Hardware Security


Last month we talked about the SolarWinds hack and now this month another disturbing attack has taken place – this time on a water supply system in Florida. Unfortunately, these types of attacks are becoming more frequent, giving us all pause as to how secure the systems that serve our everyday life really are. What lessons can we take from this recent attack that we can implement to make thi... » read more

Auto OEMs Face New Competitive Threats


Automotive design and manufacturing are undergoing a fundamental shift to the left as cars increasingly are electrified and chips take over more functions formerly done by mechanical parts, setting the stage for massive disruption across a supply chain that has been in place for decades. The success of Tesla — a company that had never actually built a chip or a car — was both a surprise ... » read more

Keeping Key Management Clear And Physical


Fundamental to all digital security systems is the ability to turn sensitive data into what looks like random incomprehensible jibberish and turn it back again into the same original information. But that is not all there is to it. You should be able to do that second bit of getting the original text only if you are allowed to do so. A classic way to deal with this problem is by using another s... » read more

Security Provisioning Moves Out Of The Factory


Security credentials traditionally have been provisioned during chip manufacturing, often as a final part of the testing process. That's starting to change. Logistics management can be improved by pushing that process out — even as far as the on-boarding process. And simpler on-boarding can hide most of the details from the user. “The IT approach to provisioning IoT devices has primar... » read more

A Machine-Learning-Resistant 3D PUF with 8-layer Stacking Vertical RRAM and 0.014% Bit Error Rate Using In-Cell Stabilization Scheme for IoT Security Applications


Abstract: "In this work, we propose and demonstrate a multi-layer 3-dimensional (3D) vertical RRAM (VRRAM) PUF with in-cell stabilization scheme to improve both cost efficiency and reliability. An 8-layer VRRAM array was manufactured with excellent uniformity and good endurance of >10 7 . Apart from the variation in RRAM resistance, enhanced randomness is obtained thanks to the parasitic IR... » read more

← Older posts Newer posts →