Implementing Strong Security For AI/ML Accelerators


A number of critical security vulnerabilities affecting high-performance CPUs identified in recent years have rocked the semiconductor industry. These high-profile vulnerabilities inadvertently allowed malicious programs to access sensitive data such as passwords, secret keys and other secure assets. The real-world risks of silicon complexity The above-mentioned vulnerabilities are primaril... » read more

Penetration Tests, Prison Security, And Mothers


There is always an interesting sounding presentation at RSA that looks like it might be a good blog post topic just based on the title. This year it was "I Had My Mom Break Into A Prison Then We Had Pie" by John Strand of Black Hills Information Security. A pen test is short for a penetration test. They can take various forms from trying to log in to a system they shouldn't, to trying to g... » read more

A Complete System-Level Security Verification Methodology


Hardware is at the root of all digital systems, and security must be considered during the system-on-chip (SoC) design and verification process. Verifying the security of an SoC design is challenging because of time to market pressure and resource constraints. Resources allocated to the already time-consuming task of functional verification must be diverted to security verification, which requi... » read more

The BSIMM Turns 10


The Building Security In Maturity Model (BSIMM) is a data-driven model developed through the analysis of software security initiatives (SSIs), also known as application/product security programs. BSIMM10 represents the latest evolution of this detailed and sophisticated “measuring stick” for SSIs. Our analysis of real-world data from 122 organizations in eight industry verticals uncovered t... » read more

Keep The Wooden Horse Out Of Your Chip


The OneSpin's Holiday Puzzle tradition has reached its fourth year: hear, hear! In December 2016, OneSpin challenged engineers to solve the Einstein riddle using assertions and a formal verification tool. In December 2017, the challenge was to model the hardest Sudoku in the world using assertions and find a solution with a formal tool. The OneSpin 2018-19 Holiday Puzzle asked engineers to desi... » read more

What’s In Your IP?


Jeff Markham, software architect at ClioSoft, talks with Semiconductor Engineering about IP traceability in markets such as automotive and aerospace, what’s actually in IP, what should not be in that IP from a security standpoint, and how all of this data can used to avert system reliability issues in the future. » read more

Artificial Intelligence For Industrial Applications


By Dirk Mayer and Olaf Enge-Rosenblatt Due to digitalization, modern machines and systems provide massive quantities of data, which form a significant basis for the optimization of production processes, operations and safety. These data sets, however, grow more and more complex, which renders the simple analysis methods typically used in the past often ineffective. This is one factor driv... » read more

Week In Review: Auto, Security, Pervasive Computing


Internet of Things SEMI-FlexTech launched six flexible hybrid electronics (FHE) projects, collaborating with U.S. Army Research Laboratory (ARL), to accelerate innovations in sensor and sensor systems. Participating in the projects are American Semiconductor, Inc., University of Texas El Paso, Tekscan, PARC, Alertgy, and Iowa State University, among others. Some of the projects include develop... » read more

Security Is Key When AI Meets 5G


5G represents a revolution in mobile technology with performance that will rival that of wireline networks. Relative to its 4G predecessor, 5G promises 10X the data rate, 100X the efficiency, and 1000X the capacity, at 1/100th the latency. With 1Gbps speed at 1ms latency, 5G makes it possible to offer a host of real-time applications and services. Real-time is critical, because in parallel t... » read more

Automotive Industry On Course To Disruption And Evolution


Consumers expect a lot from their vehicles. We expect vehicles to serve not only as transportation, but as hubs of entertainment and connectivity that can help us manage busy lives, or relax after long days. Someday, we may even expect our cars to do the driving themselves, without any human intervention. Automotive manufacturers consistently strive to meet these expectations by delivering high... » read more

← Older posts Newer posts →