Verification In Crisis


Why is it still so hard to ensure good quality sign-off happens without leaving behind bugs in silicon? The answer, according to my colleagues at DVCon, is highly nuanced. The industry has been improving overall, as has the complexity of designs. For ASICs, 74% of the designs surveyed in the recent Wilson Research Group/Siemens EDA report have one or more processor cores, 52% have two or mor... » read more

Exploring The Security Framework Of RISC-V Architecture In Modern SoCs


In the rapidly evolving world of technology, system-on-chip (SoC) designs have become a cornerstone for various applications, from automotive and mobile devices to data centers. These complex systems integrate multiple processors, a multi-level cache hierarchy, and various subsystems that share memory and system resources. However, this open access to shared memory and resources introduces pote... » read more

How To Scale Application Security Across The Enterprise


Enterprise organizations have hundreds of developers on numerous teams in dozens of business units. They are all working on thousands of applications, releasing software in very rapid iteration cycles. The challenges of development across all these software development life cycles, business units, and organizational silos are well known, and the sheer scale of enterprise development multiplies ... » read more

Trusted Electronics: Current And Future Developments


In today’s world, we encounter electronics increasingly as complex hardware/software systems, such as those in vehicles, machines, and communication devices. These systems are characterized by dramatic increases in functionality in areas like environment sensing, stages of autonomy, and the installation of future updates. Developing and manufacturing such electronic systems today requires glo... » read more

Why Semiconductor Security Is More Important Than Ever in 2024


When I think about the state of semiconductor security today compared to when I joined Cycuity in 2020, I can safely say that chip security conversations are now taking place with greater frequency and urgency. Over the past year, I observed three trends that I expect will continue and accelerate in 2024: Continued occurrence of new and increasingly sophisticated cyber incidents Emergen... » read more

Innovative Cybersecurity Solutions Accelerate TTM For The Software-Defined Vehicle


The automotive industry is undergoing a transformative shift towards the software-defined vehicle (SDV), signaling a new era that prioritizes customer-centric mobility and presents new, data-based revenue opportunities across the automotive value chain and ecosystem. However, this transition also presents many challenges, from managing increasingly complex hardware (HW) and software (SW) design... » read more

Cybersecurity Metrics: The Path To OT Security Maturity


In 2023, the cybersecurity challenges in the Operational Technology (OT) and Industrial Control Systems (ICS) landscape reached unprecedented levels. Ransomware, increasingly prevalent through new Ransomware-as-a-Service (RaaS) models, became a widespread and costly headache. While some might argue this exaggerates the risk, the growing demand for defenses is not overstated. 2024 continues to b... » read more

Verifying Hardware Security With RTL Simulation


When consumers think about security for their electronic gadgets, financial applications probably spring first to mind. Identity theft and unauthorized access to bank and investment accounts are a constant threat. But there’s more to worry about every day. Stories of webcams and smart speakers being hacked are all over the web. Users rightfully demand that device manufacturers provide a high ... » read more

Simulation With Taint Propagation For Security Verification


Security has arisen as a primary concern for many types of electronic devices. A wide range of malicious agents is constantly probing and looking for weaknesses to try to steal confidential information or exert unauthorized control. The need for security has been well understood and widely adopted in software for years. Techniques such as passwords, multi-factor authentication, and biometric ch... » read more

Safeguarding IoT Devices With SESIP And PSA Certified Root Of Trust IP


IoT is everywhere. By the end of 2024, it’s forecasted that there will be a staggering 207 billion IoT devices in the world, that’s 25 each for every human being on Earth. The connectivity of IoT devices brings great value for consumers and businesses alike, but with great connectivity comes greater vulnerability to a wide variety of malicious attacks from cyber criminals. IoT devices ar... » read more

← Older posts Newer posts →