Predictions: Markets And Drivers


Semiconductor Engineering received a record number of predictions this year. Some of them are just wishful thinking, but many are a lot more thoughtful and project what needs to happen for various markets or products to become successful. Those far reaching predictions may not fully happen within 2018, but we give everyone the chance to note the progress made towards their predictions at the en... » read more

What Will 2018 Bring To The IoT?


The Internet of Things is widely expected to progress in 2018—especially the Industrial IoT—as industry standards get hashed out and more vendors take cybersecurity seriously. On the home front, many Americans are growing accustomed to artificial intelligence technology from their use of Amazon Echo, Apple HomeKit, and Google Home devices. They’re talking to their remote controls to ch... » read more

The Week In Review: Design


Security Security researchers identified a major exploit of the "speculative execution" technique used to optimize performance in modern processors. The flaws allow an attacker to read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications, according to Google's Jann Horn. Multiple researchers discovered the issues indepen... » read more

Bluetooth Mesh Drives Security For Automotive Applications


The use of Bluetooth technology continues to grow beyond mobile into rapidly expanding IoT and automotive applications. Consumers have grown to expect hands-free calling via Bluetooth, however, as the technology moves to other use cases such as tire pressure monitors or door lock connectivity, security becomes a key challenge to automotive SoC designers. Bluetooth-enabled devices have been a... » read more

IoT Security Manifesto


Securing tomorrow means rethinking how we design intelligent devices by embracing concepts from outside the digital realm and taking advantage of advanced new technologies. Some of the things the Arm Security Manifesto explores: A digital immune system. Technologists develop human-like immune systems and health-care services that automatically detect, quarantine and treat any cyber inf... » read more

Protecting Electronic Systems From Side-Channel Attacks


During the early days of safecracking, rudimentary rotary locks were compromised by feel or sound to determine the correct combination. Following in this tradition, malicious actors are now exploiting side-channel attacks (SCA) to compromise cryptographic systems. To be sure, all physical electronic systems routinely leak information about the internal process of computing via fluctuating level... » read more

Thwarting Side-Channel Attacks With DPA-Protected Software Libraries


All physical electronic systems routinely leak information about the internal process of computing via fluctuating levels of power consumption and electro-magnetic emissions. Much like the early days of safecracking, electronic side-channel attacks (SCA) eschew a brute force approach to extracting keys and other secret information from a device or system. Moreover, SCA conducted against elec... » read more

Who’s Responsible For Security?


Semiconductor Engineering sat down to discuss security issues and how to fix them with Mark Schaeffer, senior product marketing manager for secure solutions at Renesas Electronics; Haydn Povey, CTO of Secure Thingz; Marc Canel, vice president of security systems and technologies at [getentity id="22186" comment="Arm"]; Richard Hayton, CTO of Trustonic; Anders Holmberg, director of corporate dev... » read more

Who Needs OWASP?


A list of critical web application security vulnerabilities is a necessary risk management tool. Equally true is that each organization has a different set of vulnerabilities plaguing their applications. To complete a trifecta of fundamental truths, crowdsourced lists such as the OWASP Top 10 rarely reflect an individual organization’s priorities. Given these three points, many organizatio... » read more

Reflection On 2017: Design And EDA


People love to make predictions, and most of the time they have it easy, but at Semiconductor Engineering, we ask them to look back on the predictions they make each year and to assess how close to the mark they were. We see what they missed and what surprised them. Not everyone accepts our offer to grade themselves, but most have this year. (Part one looked at the predictions associated with s... » read more

← Older posts Newer posts →