All-in-One Vs. Point Tools For Security


Security remains an urgent concern for builders of any system that might tempt attackers, but designers find themselves faced with a bewildering array of security options. Some of those are point solutions for specific pieces of the security puzzle. Others bill themselves as all-in-one, where the whole puzzle filled in. Which approach is best depends on the resources you have available and y... » read more

The Road To Post-Quantum Cryptography


Quantum computing offers the promise of tremendous leaps in processing power over current digital computers. But for the public-key cryptography algorithms used today for e-commerce, mobile payments, media streaming, digital signatures and more, quantum computing represents an existential event. Quantum computers may be able to break the widely used RSA and ECC (Elliptic-Curve Cryptography) alg... » read more

Monitoring Chips After Manufacturing


New regulations and variability of advanced process nodes are forcing chip designers to insert additional capabilities in silicon to help with comprehension, debug, analytics, safety, security, and design optimization. The impact of this will be far-reaching as the industry discusses what capabilities can be shared between these divergent tasks, the amount of silicon area to dedicate to it, ... » read more

The Challenge Of Keeping AI Systems Current


Semiconductor Engineering sat down to discuss AI and its move to the edge with Steven Woo, vice president of enterprise solutions technology and distinguished inventor at Rambus; Kris Ardis, executive director at Maxim Integrated; Steve Roddy, vice president of Arm's Products Learning Group; and Vinay Mehta, inference technical marketing manager at Flex Logix. What follows are excerpts of that ... » read more

Huawei: 5G Is About Capacity, Not Speed


Paul Scanlan, CTO of the Huawei Carrier Business Group in Huawei Technologies, sat down with Semiconductor Engineering to talk about 5G, which use cases are attractive and why, and how that compares with previous wireless technologies. SE: Where are you seeing 5G, and how do you see this rolling out both for sub-6GHz and millimeter wave? Scanlan: 5G is a platform for transformation. The f... » read more

From Cloud To Cloudlets


Cloudlets, or mini-clouds, are starting to roll out closer to the sources of data in an effort to reduce latency and improve overall processing performance. But as this approach gains steam, it also is creating some new challenges involving data distribution, storage and security. The growing popularity of distributed clouds is a recognition that the cloud model has limitations. Sending the ... » read more

Customization And Limitations At The Edge


Semiconductor Engineering sat down to discuss the edge constraints and the need for security with Jeff DeAngelis, managing director of the Industrial and Healthcare Business Unit at Maxim Integrated; Norman Chang, chief technologist at Ansys; Andrew Grant, senior director of artificial intelligence at Imagination Technologies; Thomas Ensergueix, senior director of the automotive and IoT line of... » read more

Better Security, Lower Cost


For years, chipmakers have marginalized security in chips, relying instead on software solutions. Eventually that approach caught up with them, creating near panic in a scramble to plug weaknesses involving speculative execution and branch prediction, as well as the ability to read the data from chips with commercially available tools such as optical probes. There were several reasons for th... » read more

Combating Counterfeit Chips


The harsh reality is that today, the authenticity of chips is often impossible to guarantee. The counterfeit chip market is sizeable and growing with a worldwide value estimated at $75B in 2019. Those counterfeits are believed to have been integrated into more than $169B of electronic devices. Recent confirmed incidents of counterfeit parts found in electronic systems include defibrillators, ai... » read more

Welcome To 6 Minutes Of Security


Yet another blog on security! Oh, wait, this is hardware security – and trust. While secure hardware should be free from vulnerabilities in general, I use the term trust to refer to the belief that a semiconductor intellectual property (IP) or integrated circuit (IC) is free from malicious, intentionally inserted vulnerabilities. Hardware security is on the rise. The media is helping. ... » read more

← Older posts Newer posts →