PUF, The Magic IoT Defender


How would you feel if you put hours of effort and your ingenuity into designing a product, only to find cheaper copycats on the market? And what if, over time, those copycats failed and somehow eroded your company’s brand reputation? It happens more often than it should, especially as hackers up their game in sophistication and consumers get attracted to lower cost options. So that’s why... » read more

Security Verification For Processor-Based SoCs


By Ruud Derwig and Nicole Fern Security in modern systems is of utmost importance. Device manufacturers are including multiple security features and attack protections into both the hardware and software design. End-product system security, however, cannot be guaranteed by using a secure processor alone. The final product security results not only from using proven, secure hardware component... » read more

Building Security IntoThe DevOps Life Cycle


The primary goal when breaking the build in the CI/CD DevOps life cycle is to treat security issues with the same level of importance as quality and business requirements. If quality or security tests fail, the continuous integration server breaks the build. When the build breaks, the CI/CD pipeline also breaks. Based on the reason for the broken build, appropriate activities such as archite... » read more

Why It’s So Hard To Create New Processors


The introduction, and initial success, of the RISC-V processor ISA has reignited interest in the design of custom processors, but the industry is now grappling with how to verify them. The expertise and tools that were once in the market have been consolidated into the hands of the few companies that have been shipping processor chips or IP cores over the past 20 years. Verification of a pro... » read more

Do You Trust Your IP Supplier?


How much do you trust your IP supplier, regardless of whether IP was developed in-house or by a third-party provider? And what implications does it have a system integrator? These are important questions that many companies are beginning to ask. Today, there are few methods, other than documentation, that provide the necessary information. The software industry may be ahead of the hardware i... » read more

Power/Performance Bits: March 24


Backscatter Wi-Fi radio Engineers at the University of California San Diego developed an ultra-low power Wi-Fi radio they say could enable portable IoT devices. Using 5,000 times less power than standard Wi-Fi radios, the device consumes 28 microwatts while transmitting data at a rate of 2 megabits per second over a range of up to 21 meters. "You can connect your phone, your smart devices, ... » read more

Speeding Up Verification Using SystemC


Brett Cline, senior vice president at OneSpin Solutions, explains how adding formal verification into the high-level synthesis flow can reduce the time spent in optimization and debug by about two-thirds, why this needs to be done well ahead of RTL, starting with issues such as initialization, memory out of bounds and other issues that are difficult to find in simulation. » read more

The Long Road To Quantum Computing


Building a quantum computer is like building a cathedral. They both take a couple generations. The time frame for useful quantum computing applications that are not toy-sized is still a few years to a decade or more away. But the push is on now. Governments are racing to get their country’s quantum computing going for national security reasons. Companies such as Google and IBM are competin... » read more

5G And AI Raise Security Risks For IoT Devices


This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density. Click here to r... » read more

Battling Persistent Hacks At The Flash Level


Hardware vendors are beginning to close up security vulnerabilities across a broader range of technology than in the past, a sign that they are taking potential hardware breaches much more seriously. Awareness of security flaws has been growing since the introduction of Meltdown, Spectre and Foreshadow, and more recently, the Cable Haunt attack. The general conclusion among chipmakers is tha... » read more

← Older posts Newer posts →