Taking Security-By-Design To The Next Level


It’s hard to argue that the pre-eminent challenge before our industry today is security. While each sensational hacking headline gets readers’ attention, countless engineers and developers behind the scenes innovate security solutions every day to stay one step ahead of the hackers. At a high level, companies have begun to work together toward holistic solutions to complement their own s... » read more

New Approaches To Security


Different approaches are emerging to identify suspicious behavior and shut down potential breaches before they have a chance to do serious damage. This is becoming particularly important in markets where safety is an issue, and in AI and edge devices where the rapid movement of data is essential. These methods are a significant departure from the traditional way of securing devices through l... » read more

The Long And Detailed Road To Automotive Compliance


Compliance with automotive safety requirements is slowing down both innovation and participation by a flurry of startups as the whole ecosystem struggles to bring autonomous vehicles to reality. This is particularly onerous for chipmakers, which face a high bar for IC integrity and reliability. They must meet specifications and be free of design errors. Improper behavior in corner-case s... » read more

The Blockchain – Not As Secure As You Think


The blockchain has the potential to touch all aspects of our everyday lives, from buying and trading cryptocurrency, to securing vital healthcare records, to proving that a tomato really is organic. The security challenges, specifically the vulnerability of private keys faced by the cryptocurrency market, prove that before the transformative impact of blockchain technology can be realized, a co... » read more

Heterogeneous Design Creating Havoc With Firmware Versions


Adding different kinds of processing elements into chips is creating system-level incompatibilities because of sometimes necessary, but usually uncoordinated, firmware updates from multiple vendors. In the past, firmware typically was synchronized with other firmware and the chip was verified and debugged. But this becomes much more difficult when multiple heterogeneous processing elements a... » read more

The Next Spoiler Alert


Speculative execution seemed like a good idea at the time. As the power/performance benefits of each node shrink began to dwindle, companies like Intel figured out ways to maintain processor speeds at the same or lower power. There were other approaches, as well. Speculative execution and branch prediction are roughly equivalent to pre-fetch in search, which has gotten so good that often the... » read more

Next Wave Of Security For IIoT


A rush of new products and services promise to make the famously un-secured Industrial IoT (IIoT) substantially more secure in the near future. Although the semiconductor industry has been churning out a variety of security-related products and concepts, ranging from root of trust approaches to crypto processors and physically unclonable functions, most IIoT operations have been slow to adop... » read more

Don’t Have A Meltdown Over A Spectre In Your SoC


You may be concerned about last year’s widely published Spectre and Meltdown vulnerabilities affecting most processors. Are your phone and computer OK? Or more importantly, if you are designing or verifying a System on Chip (SoC), do you have a specter in your design? Let’s first look at what these two vulnerabilities are and how they may be affecting your system. Both vulnerabilitie... » read more

Enterprise or Open Source: Which SAST Tool Is Right for You?


Static application security testing (SAST) is an essential part of any secure development workflow. But not all SAST tools are created equal. It’s crucial that you weigh your options carefully when choosing a SAST tool to avoid unnecessary costs in the future. This white paper compares open source and enterprise SAST solutions and provides relevant information to help you select the option th... » read more

Hidden Signals: The Memories And Interfaces Enabling IoT, 5G, And AI


This IDC Technology Spotlight Report, sponsored by Rambus, highlights key, often hidden, memory and interface technologies that are enabling high performance electronic systems to serve the disruptive trends of the next decade like IoT, 5G, and Artificial Intelligence. The report discusses: Data and the importance of connectivity, both from the physical (analog) world to the digital wor... » read more

← Older posts Newer posts →