Hacking SoC IP Under Pressure


Hack@DAC certainly shows that some teams can find bugs faster than others. The hackfest, now in its third year, is a bug-finding contest for teams of university students joined by a smattering of industry members whose task is to find a bugs implanted in SoC IP.  The teams follow the practices of real-world security teams. “[The teams'] objective is to identify the security vulnerabilitie... » read more

Disregard Safety And Security At Your Own Peril


Semiconductor Engineering sat down to discuss industry attitudes towards safety and security with Dave Kelf, chief marketing officer for Breker Verification; Jacob Wiltgen, solutions architect for functional safety at Mentor, a Siemens Business; David Landoll, solutions architect for OneSpin Solutions; Dennis Ciplickas, vice president of characterization solutions at PDF Solutions; Andrew Dauma... » read more

Algorithms And Security


From a security standpoint, the best thing AI has going for it is that it's in a state of perpetual change. That also may be the worst thing. The problem, at least for now, is that no one knows for sure. What’s clear is that security is not a primary concern when it comes to designing and building AI systems. In many cases it’s not even an action item because architectures are constantly... » read more

Holes In AI Security


Mike Borza, principal security technologist in Synopsys’ Solutions Group, explains why security is lacking in AI, why AI is especially susceptible to Trojans, and why small changes in training data can have big impacts on many devices. » read more

Securing The Mobile IoT


It’s 2019. Security fears, locked ecosystems, and lack of technology are keeping IoT products within WiFi networks, and not reaching their full potential. As an industry, we must provide IoT solutions that are simple and keep consumers--and their data--secure.The mobile IoT is the next frontier in the connected device market, providing out-of-the-box connectivity with security from silicon... » read more

Blog Review: June 5


Mentor's Neil Johnson argues that coverage closure shouldn't have to be mad scramble in the home stretch of development if designers change their early development mindset. In a video, Cadence's Amol Borkar explains Simultaneous Localization and Mapping, or SLAM, from the creation of a map of an unknown environment and understanding the orientation of a camera in this space. Synopsys' Tay... » read more

DAC 2019: Day 1


The last time that DAC was in Las Vegas was 2001. Much has changed since then. The first day kicked off with the usual ceremonies and then two short keynotes. A change from previous years is that keynotes are now on the show floor. This is presumably to ensure that once the keynotes are over, everyone sees the vendor booths. During the commencement session, it was also announced that all cof... » read more

Meltdown, Spectre And Foreshadow


Ben Levine, senior director of product management for Rambus’ Security Division, talks with Semiconductor Engineering about hardware-specific attacks, why they are so dangerous, and how they work. » read more

Cyber Attacks Against Vehicles On The Rise


Who is worried about automotive security and safety? I, for one, most definitely am! I’ve written previously about how tackling this problem makes good business sense. But the more immersed I become in this topic, the more I feel personally concerned about the implications of this, and the snail’s-pace at which the market is responding to it. I’ve just read an Upstream Security repo... » read more

Intellectual Property: Trust… But Verify


For those around the microelectronic component industry for many years, we have seen quite a transformation of capability, sourcing of the supply chain, and now threats to these devices that drive the technology in our world today. These integrated circuits (ICs), once so simple as a few transistors, have continued to follow Moore’s Law and are now made up of tens of billions of transistor... » read more

← Older posts Newer posts →