Hardware Security: A Critical Piece Of The Cybersecurity Puzzle


Cybersecurity is a critical foundation of our rapidly expanding digital world spanning hardware and software that powers everything from our personal devices to the global infrastructure. Over the past decade, significant progress has been made in many security domains, especially in maturing secure software development processes. So far, hardware security has received limited attention, howeve... » read more

When You Can’t Afford To Scrimp On System Reliability


Failure happens, whether we like it or not. What’s important is to be prepared for failure to occur, which involves putting in place measures that allow us to quickly address or resolve the problem. But not all failures are created equally. For example, a laptop that you use daily might experience occasional glitches. If it’s well-designed, you can simply reset the machine to get it back to... » read more

Virtualization In The Car


As the automotive industry grapples with complexity due to electrification and increasing autonomy of vehicles, consolidation of ECUs within vehicles, more stringent safety and security requirements, automotive ecosystem players are looking to virtualization concepts in a number of ways to realize the vehicles of tomorrow. One way is with hardware virtualization; the ability of a device such... » read more

Shifting The Burden Of Tool Safety Compliance From Users To Vendors


Functional safety standards demand that this risk be assessed and adequately minimized through tool qualification and other processes. For engineering teams, this is a time-consuming task and, worryingly, one for which there are no mature solutions yet. Tool vendors may provide safety certificates or packages, in an attempt to support their customers with safety compliance. Strategies... » read more

Measurable Hardware Security With Mitre CWEs


In this new white paper, you will learn how MITRE’s new hardware of Common Weakness Enumerations (CWE) can assist the development team in threat modeling and security validation. Here is a 5-steps CWE validation process to significantly save time, resources, and money on FPGA, ASIC, and SoC design. Click here to continue reading. » read more

EDA Forms The Basis For Designing Secure Systems


By Adam Cron and Brandon Wang As Internet of Things (IoT) devices rapidly increase in popularity and deployment, security risks are arising at all levels. It could be at the usability level such as social engineering, pretexting, phishing; at the primitive level such as cryptanalysis; at the software level such as client-side scripting, code injection; and now even at the hardware level. Dur... » read more

RISC-V Gaining Traction


Part 1: Semiconductor Engineering sat down to discuss where and why RISC-V is doing well, with Zdenek Prikryl, CTO of Codasip; Helena Handschuh, a Rambus Security Technologies fellow; Louie De Luna, director of marketing at Aldec; Shubhodeep Roy Choudhury, CEO of Valtrix Systems; and Bipul Talukdar, North America director of applications engineering at SmartDV. What follows are excerpt of that ... » read more

Maximizing Value Post-Moore’s Law


When Moore's Law was in full swing, almost every market segment considered moving to the next available node as a primary way to maximize value. But today, each major market segment is looking at different strategies that are more closely aligned with its individual needs. This diversity will end up causing both pain and opportunities in the supply chain. Chip developers must do more with a ... » read more

The Evolution Of Ethernet To 800G And MACsec Encryption


Ethernet is a frame-based data communication technology that employs variable-sized frames to carry a data payload. This contrasts with long-haul Optical Transport Networks (OTN) that use fixed-sized frames. The size of Ethernet frames ranges from a minimum of 60 bytes up to 1500 bytes, and in case of jumbo frames, up to 9K bytes. A frame is a Layer 2 data container with the physical addresses ... » read more

Reducing Hardware Security Risk


In today’s world, hackers, computer viruses and cyber-terrorists are making headlines almost daily. Security has become a priority in all aspects of life, and most importantly, of our businesses. Recently hackers have been targeting the heart of our most complex systems, the Application Specific ICs (ASICs) and Systems on Chips (SoCs) that run them. The risk associated with these devices i... » read more

← Older posts Newer posts →