Why It’s So Hard To Create New Processors


The introduction, and initial success, of the RISC-V processor ISA has reignited interest in the design of custom processors, but the industry is now grappling with how to verify them. The expertise and tools that were once in the market have been consolidated into the hands of the few companies that have been shipping processor chips or IP cores over the past 20 years. Verification of a pro... » read more

Do You Trust Your IP Supplier?


How much do you trust your IP supplier, regardless of whether IP was developed in-house or by a third-party provider? And what implications does it have a system integrator? These are important questions that many companies are beginning to ask. Today, there are few methods, other than documentation, that provide the necessary information. The software industry may be ahead of the hardware i... » read more

Power/Performance Bits: March 24


Backscatter Wi-Fi radio Engineers at the University of California San Diego developed an ultra-low power Wi-Fi radio they say could enable portable IoT devices. Using 5,000 times less power than standard Wi-Fi radios, the device consumes 28 microwatts while transmitting data at a rate of 2 megabits per second over a range of up to 21 meters. "You can connect your phone, your smart devices, ... » read more

Speeding Up Verification Using SystemC


Brett Cline, senior vice president at OneSpin Solutions, explains how adding formal verification into the high-level synthesis flow can reduce the time spent in optimization and debug by about two-thirds, why this needs to be done well ahead of RTL, starting with issues such as initialization, memory out of bounds and other issues that are difficult to find in simulation. » read more

The Long Road To Quantum Computing


Building a quantum computer is like building a cathedral. They both take a couple generations. The time frame for useful quantum computing applications that are not toy-sized is still a few years to a decade or more away. But the push is on now. Governments are racing to get their country’s quantum computing going for national security reasons. Companies such as Google and IBM are competin... » read more

5G And AI Raise Security Risks For IoT Devices


This IDC Technology Spotlight, sponsored by Rambus, highlights the fifth generation of cellular network technology (5G) is scaling further in 2020, enabling a new wave of AI-powered end points. To remain competitive, manufacturers must implement enhanced security measures on edge and IoT devices designed for the increased performance in speed, latency, and connection density. Click here to r... » read more

Battling Persistent Hacks At The Flash Level


Hardware vendors are beginning to close up security vulnerabilities across a broader range of technology than in the past, a sign that they are taking potential hardware breaches much more seriously. Awareness of security flaws has been growing since the introduction of Meltdown, Spectre and Foreshadow, and more recently, the Cable Haunt attack. The general conclusion among chipmakers is tha... » read more

Implementing Strong Security For AI/ML Accelerators


A number of critical security vulnerabilities affecting high-performance CPUs identified in recent years have rocked the semiconductor industry. These high-profile vulnerabilities inadvertently allowed malicious programs to access sensitive data such as passwords, secret keys and other secure assets. The real-world risks of silicon complexity The above-mentioned vulnerabilities are primaril... » read more

Penetration Tests, Prison Security, And Mothers


There is always an interesting sounding presentation at RSA that looks like it might be a good blog post topic just based on the title. This year it was "I Had My Mom Break Into A Prison Then We Had Pie" by John Strand of Black Hills Information Security. A pen test is short for a penetration test. They can take various forms from trying to log in to a system they shouldn't, to trying to g... » read more

A Complete System-Level Security Verification Methodology


Hardware is at the root of all digital systems, and security must be considered during the system-on-chip (SoC) design and verification process. Verifying the security of an SoC design is challenging because of time to market pressure and resource constraints. Resources allocated to the already time-consuming task of functional verification must be diverted to security verification, which requi... » read more

← Older posts Newer posts →