A Complete System-Level Security Verification Methodology


Hardware is at the root of all digital systems, and security must be considered during the system-on-chip (SoC) design and verification process. Verifying the security of an SoC design is challenging because of time to market pressure and resource constraints. Resources allocated to the already time-consuming task of functional verification must be diverted to security verification, which requi... » read more

Blog Review: Sept. 4


Synopsys' Taylor Armerding checks out Apple's newly expanded bug bounty program, with bounty payouts are increasing to compete with malicious actors, and why even with security-oriented development the practice of bug bounties will remain needed. Mentor's Colin Walls shares a few more embedded software tips, this time on external variables, delay loops in real time systems, and meaningful pa... » read more

Power/Performance Bits: Aug. 27


The sound of typing Cybersecurity researchers at the Southern Methodist University found a way to detect what a user is typing based on sensor data collected from a nearby smartphone. The team found that acoustic signals produced by typing on a computer keyboard can successfully be picked up by a smartphone, which can then be processed to determine which keys were struck – even in noisy conf... » read more

Chip Security Needs A New Language


By Sven Beyer and Sergio Marchese Safety- and security-critical systems, such as connected autonomous vehicles, require high-integrity integrated circuits (ICs). Functional correctness and safety are necessary to establish IC integrity, but not sufficient. Security is another critical pillar of IC integrity. Systems and products using ICs with security vulnerabilities ultimately undermine th... » read more

Responsibility And Automotive Security


I came across this excellent, thought-provoking white paper from NTT Security and felt that some of the insights were worth sharing. Some of our previous blogs have discussed the cost implications of automotive cybersecurity for vehicle manufacturers, and the potential implications for the driver and passengers of vehicles. But this paper got me thinking about another angle – responsibilit... » read more

Configure, Confirm, Ship


Security is a first-order design requirement for processor-based systems. Processor designers implement security functionality directly into the hardware itself to protect the system at its most fundamental layer. System integrators that use processor IP such as Synopsys’ DesignWare® ARC® processors must ensure that they configure and manage the protection and security features correctly, a... » read more

The Great Test Blur


As chip design and manufacturing shift left and right, concerns over reliability are suddenly front and center. But figuring out what exactly what causes a chip to malfunction, or at least not meet specs for performance and power, is getting much more difficult. There are several converging trends here, each of which plays an integral role in improving reliability. But how significant a role... » read more

Smart NiCs


Manish Sinha, strategic planning for marketing and business at Achronix, talks with Semiconductor Engineering about what’s changing in networking interface cards, how to get more performance out of these devices, and how much needs to be in hardware versus software. » read more

Who’s In Your Wallet?


Hacking a financial institution is a very big deal. Banks and credit card companies take their security very seriously because they literally have money to lose if something goes awry. What becomes clear, though, in reading the criminal complaint involving the Capital One hack, is that the weakest link isn't always the hardware or the software. It's the geeks who want to show off, or ... » read more

New Approaches For Hardware Security


Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. (L-R) Norman Chang, Helena Handschuh, Mike Borza. Pho... » read more

← Older posts Newer posts →