The BSIMM Turns 10


The Building Security In Maturity Model (BSIMM) is a data-driven model developed through the analysis of software security initiatives (SSIs), also known as application/product security programs. BSIMM10 represents the latest evolution of this detailed and sophisticated “measuring stick” for SSIs. Our analysis of real-world data from 122 organizations in eight industry verticals uncovered t... » read more

Keep The Wooden Horse Out Of Your Chip


The OneSpin's Holiday Puzzle tradition has reached its fourth year: hear, hear! In December 2016, OneSpin challenged engineers to solve the Einstein riddle using assertions and a formal verification tool. In December 2017, the challenge was to model the hardest Sudoku in the world using assertions and find a solution with a formal tool. The OneSpin 2018-19 Holiday Puzzle asked engineers to desi... » read more

What’s In Your IP?


Jeff Markham, software architect at ClioSoft, talks with Semiconductor Engineering about IP traceability in markets such as automotive and aerospace, what’s actually in IP, what should not be in that IP from a security standpoint, and how all of this data can used to avert system reliability issues in the future. » read more

Artificial Intelligence For Industrial Applications


By Dirk Mayer and Olaf Enge-Rosenblatt Due to digitalization, modern machines and systems provide massive quantities of data, which form a significant basis for the optimization of production processes, operations and safety. These data sets, however, grow more and more complex, which renders the simple analysis methods typically used in the past often ineffective. This is one factor driv... » read more

Week In Review: Auto, Security, Pervasive Computing


Internet of Things SEMI-FlexTech launched six flexible hybrid electronics (FHE) projects, collaborating with U.S. Army Research Laboratory (ARL), to accelerate innovations in sensor and sensor systems. Participating in the projects are American Semiconductor, Inc., University of Texas El Paso, Tekscan, PARC, Alertgy, and Iowa State University, among others. Some of the projects include develop... » read more

Security Is Key When AI Meets 5G


5G represents a revolution in mobile technology with performance that will rival that of wireline networks. Relative to its 4G predecessor, 5G promises 10X the data rate, 100X the efficiency, and 1000X the capacity, at 1/100th the latency. With 1Gbps speed at 1ms latency, 5G makes it possible to offer a host of real-time applications and services. Real-time is critical, because in parallel t... » read more

Automotive Industry On Course To Disruption And Evolution


Consumers expect a lot from their vehicles. We expect vehicles to serve not only as transportation, but as hubs of entertainment and connectivity that can help us manage busy lives, or relax after long days. Someday, we may even expect our cars to do the driving themselves, without any human intervention. Automotive manufacturers consistently strive to meet these expectations by delivering high... » read more

Hardware Attack Surface Widening


An expanding attack surface in hardware, coupled with increasing complexity inside and outside of chips, is making it far more difficult to secure systems against a variety of new and existing types of attacks. Security experts have been warning about the growing threat for some time, but it is being made worse by the need to gather data from more places and to process it with AI/ML/DL. So e... » read more

Unprotected IoT Devices Threaten Consumer Privacy And Safety


Unprotected IoT devices continue to pose a disturbing threat to both consumer privacy and security. For example, a camera installed in the Memphis bedroom of a young girl was recently hijacked by a hacker who seized control of the device to spy on the 8-year-old, taunt her with music and encourage destructive behavior. Another infamous instance of a camera falling victim to a hacker was reporte... » read more

Authentication In The IoT Age


We all know passwords are a problem. We have too many of them to remember, but too many of them are reused to make them secure. No surprise that they are the root cause of the vast majority of data breaches. Fortunately, clever minds are working at ways to replace them and they have come together to create the FIDO (Fast IDentity Online) Alliance. The FIDO Alliance was created in 2013 to de... » read more

← Older posts Newer posts →