Security Tradeoffs In A Shifting Global Supply Chain


Experts at the Table: Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. The first part of this discussion ca... » read more

The Great Data Flood Ahead


The number of devices connected to the Internet is expected to exceed 1 trillion devices over the next decade or so. The timeline is a bit fuzzy, in part because no one is actually counting all of these devices, but the implications are pretty clear. A data deluge of biblical proportions is headed our way, and so far no one has any idea of what to do with all of it. From a system-level s... » read more

The Growing Impact Of Portable Stimulus


It has been a year since Accellera's Portable Test and Stimulus Specification became a standard. Semiconductor Engineering sat down to discuss the impact it has had, and the future direction of it, with Dave Kelf, chief marketing officer for Breker Verification Systems; Larry Melling, product management director for Cadence; Tom Fitzpatrick, strategic verification architect for Mentor, a Siemen... » read more

Why Data Is So Difficult To Protect In AI Chips


Experts at the Table: Semiconductor Engineering sat down to discuss a wide range of hardware security issues and possible solutions with Norman Chang, chief technologist for the Semiconductor Business Unit at ANSYS; Helena Handschuh, fellow at Rambus, and Mike Borza, principal security technologist at Synopsys. What follows are excerpts of that conversation. The first part of this discussion ca... » read more

Cost-Effective, Silicon-Based Security Reduces Risks, Achieves Competitive Advantage


IDC Spotlight, by Robert Westervelt, Research Director, Security Products, sponsored by Rambus. Device manufacturers are increasingly under pressure to address security and privacy. Cost-effective, silicon-based security is among the components that can significantly reduce the risk of physical attacks and cyberattacks and achieve a competitive advantage over both legacy and insecure solutio... » read more

Securing IoT Devices With A Programmable Root Of Trust


The exponential increase of vulnerable IoT devices demands a far more determined and proactive approach to security than is offered by the current industry status quo. This is because compromised IoT devices pose a threat to both consumers and critical internet infrastructure. For example, a compromised security camera or baby video monitor can be easily exploited to violate consumer privacy... » read more

IP Security In FPGAs


Quinn Jacobson, strategic architect at Achronix, talks about security in FPGAs, including how to prevent reverse engineering of IP, how to make sure the design is authentic, and how to limit access to IP in transit and in the chip. » read more

A Complete System-Level Security Verification Methodology


Hardware is at the root of all digital systems, and security must be considered during the system-on-chip (SoC) design and verification process. Verifying the security of an SoC design is challenging because of time to market pressure and resource constraints. Resources allocated to the already time-consuming task of functional verification must be diverted to security verification, which requi... » read more

Blog Review: Sept. 4


Synopsys' Taylor Armerding checks out Apple's newly expanded bug bounty program, with bounty payouts are increasing to compete with malicious actors, and why even with security-oriented development the practice of bug bounties will remain needed. Mentor's Colin Walls shares a few more embedded software tips, this time on external variables, delay loops in real time systems, and meaningful pa... » read more

Power/Performance Bits: Aug. 27


The sound of typing Cybersecurity researchers at the Southern Methodist University found a way to detect what a user is typing based on sensor data collected from a nearby smartphone. The team found that acoustic signals produced by typing on a computer keyboard can successfully be picked up by a smartphone, which can then be processed to determine which keys were struck – even in noisy conf... » read more

← Older posts Newer posts →