Cache Speculation Side-Channels


This whitepaper looks at the susceptibility of Arm implementations following research findings from security researchers, including Google and MIT, on new potential cache timing side-channels exploiting processor speculation. This paper also outlines possible mitigations that can be employed for software designed to run on existing Arm processors. To read more, click here. » read more

More Processing Everywhere


Simon Segars, CEO of Arm Holdings, sat down with Semiconductor Engineering to discuss security, power, the IoT, a big push at the edge, and the rise of 5G and China. What follows are excerpts of that conversation. SE: Are we making any progress in security? And even if Arm makes progress, does it matter, given there are so many things connected together? Segars: It feels like we’re maki... » read more

Why The IIoT Is Not Secure


The Internet of Things is famously insecure, but not because the technology to build it or secure it is immature. Likewise, severely insufficient security on the Industrial IoT suffers from a lack of will. Neither tech buyers nor providers have yet invested the same effort expended in other areas of the tech world to create and adopt steps that will make everyone safer, according to chipmakers ... » read more

Top 6 Application Security Hurdles And The Secret To Overcoming Them


Applications support some of the most strategic business processes and access an organization’s most sensitive data. These applications also contain 92% of reported security vulnerabilities, not networks. Yet application security continues to receive less budget and attention than network security. This means security-aware companies must find a cost-effective application security solution to... » read more

Accelerate Computer Vision Design Using High-Level Synthesis


Computer vision solutions are all around us, in cars, consumer products, security, retail, and agriculture. But, designing these solutions is not easy, mainly because of constant algorithm upgrades and related requirements changes. This means that wherever the team is in the RTL creation and verification flow, they might have to start over, which can cause an unacceptable delay in the productio... » read more

On-Chip Monitoring Of FinFETs


Stephen Crosher, CEO of Moortec, sat down with Semiconductor Engineering to discuss on-chip monitoring and its impact on power, security and reliability, including predictive maintenance. What follows are excerpts of that conversation. SE: What new problems are you seeing in design? Crosher: There are challenges emerging for companies working on advanced nodes, including scaling and trans... » read more

Safety, Security And PPA Tradeoffs


Safety and security are emerging as key design tradeoffs as chips are added into safety-critical markets, adding even more complexity into an already complicated optimization process. In the early days of semiconductor design, performance and area were traded off against each other. Then power became important, and the main tradeoffs became power, performance and area (PPA). But as chips inc... » read more

Blog Review: July 18


Synopsys' Shivani Bansal introduces DFI 5.0, the latest interface specification that defines signals, timing, and functionality required for efficient communication between the memory controller and PHY, including changes to boost performance in DDR5/LPDDR5. Mentor's Ricardo Anguiano contends that for greater autonomy in vehicles, centralized sensor fusion is necessary to both reduce the cos... » read more

Right-Sizing Your Cryptographic Processing Solution


The cornerstone of all security solutions that deal with confidentiality, integrity and authentication is cryptography. Cryptography is a complex math problem used to help create security applications. Algorithms vary for different applications and are used for specific purposes. The common cryptographic algorithms are symmetric block ciphers for confidentiality, hash functions for integrity, a... » read more

The New Voice Of The Embedded Intelligent Assistant


As intelligent assistance is becoming vital in our daily lives, the technology is taking a big leap forward. Recognition Technologies & Arm have published a white paper that provides technical insight into the architecture and design approach that’s making the gateway a more powerful, efficient place for voice recognition. Some topics covered include: Why knowing who is speaking is i... » read more

← Older posts Newer posts →