Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

Who Will Regulate Technology?


Outside regulation and technological innovation don't mix well, particularly when it comes to modern electronics, but the potential for that kind of oversight is rising. In the past, most of the problems involving regulation stemmed from a lack of understanding about technology and science. This is hardly a new phenomenon. It literally dates back centuries. Galileo was forced to recant helio... » read more

The Value Of Trust


It took 40 years for Alexander Graham Bell’s telephone to go from 10% to 40% global saturation. The smartphone repeated that market penetration in less than a tenth of the time. But even the success of the smartphone is being eclipsed by the lightning pace at which Internet of Things (IoT) products are being born, with Gartner predicting that 95% of all technology products will be IoT-capable... » read more

2017 Coverity Scan Report


Today, open source software (OSS) development is one of the primary driving forces of technological innovation. From artificial intelligence to the Internet of Things, autonomous driving, and cloud computing infrastructure, OSS plays a pivotal role in the evolution of a wide range of technologies. But what are the implications of its dominance? To answer this, we review what we’ve learn... » read more

Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

Privacy Is In Retreat


It was always a given that when you were online, you're in public. The deceptive piece is that your online activities can appear very distant from your physical location. You might be shopping from the comfort and seeming privacy of your living room, or texting on your smart phone before you get out of bed. This created a lot of buzz initially, but over the past year or so the level of paran... » read more

Safety, Security And Open Source In The Automotive Industry


Today’s cars are as much defined by the power of their software as the power of their engines. Almost any car feature you can name is now digitized to provide drivers with easier operation and better information. Technological innovation is accelerating, enabling automobiles to monitor and adjust their position on the highway, alerting drivers if they’re drifting out of their lane, even aut... » read more

CISO Research Identifies 4 Distinct Approaches To The Role


Every chief information security officer (CISO) is unique. They each have varying modes of operation that are influenced by long and distinguished careers. To understand CISO strategies and approaches, we decided to conduct a study. We gathered data in a series of extended in-person interviews with 25 CISOs with the goal of describing how a CISO’s work is organized and executed. To read mo... » read more

Predictions: Methodologies And Tools


Predictions are divided into four posts this year. Part one covered markets and drivers. The second part looked at manufacturing, devices and companies and this part will cover methodologies and tools. In addition, the outlook from EDA executives will be provided in a separate post. Intellectual property As designs get larger, it should be no surprise that the size of the [getkc id="43" kc_... » read more

Protecting Automotive Systems With A Root Of Trust


As our cars become more connected and autonomous, we depend on them to entertain us, connect seamlessly to our phones (which carry substantial personal information), help keep us in our proper driving lane, and more. We expect that the electronics in the automobile will work as advertised. However, connected cars can have vulnerabilities to direct, over-the-air, or side-channel attacks, which c... » read more

← Older posts Newer posts →