2017 Coverity Scan Report


Today, open source software (OSS) development is one of the primary driving forces of technological innovation. From artificial intelligence to the Internet of Things, autonomous driving, and cloud computing infrastructure, OSS plays a pivotal role in the evolution of a wide range of technologies. But what are the implications of its dominance? To answer this, we review what we’ve learn... » read more

Imperfect Silicon, Near-Perfect Security


Some chipmakers, under pressure to add security to rapidly growing numbers of IoT devices, have rediscovered a "fingerprinting" technique used primarily as an anti-counterfeiting measure. [getkc id="227" kc_name="Physically unclonable functions"] (PUFs) are used to assign a unique identification number based on inconsistencies in the speed with which current causes a series of logic gates to... » read more

Privacy Is In Retreat


It was always a given that when you were online, you're in public. The deceptive piece is that your online activities can appear very distant from your physical location. You might be shopping from the comfort and seeming privacy of your living room, or texting on your smart phone before you get out of bed. This created a lot of buzz initially, but over the past year or so the level of paran... » read more

Safety, Security And Open Source In The Automotive Industry


Today’s cars are as much defined by the power of their software as the power of their engines. Almost any car feature you can name is now digitized to provide drivers with easier operation and better information. Technological innovation is accelerating, enabling automobiles to monitor and adjust their position on the highway, alerting drivers if they’re drifting out of their lane, even aut... » read more

CISO Research Identifies 4 Distinct Approaches To The Role


Every chief information security officer (CISO) is unique. They each have varying modes of operation that are influenced by long and distinguished careers. To understand CISO strategies and approaches, we decided to conduct a study. We gathered data in a series of extended in-person interviews with 25 CISOs with the goal of describing how a CISO’s work is organized and executed. To read mo... » read more

Predictions: Methodologies And Tools


Predictions are divided into four posts this year. Part one covered markets and drivers. The second part looked at manufacturing, devices and companies and this part will cover methodologies and tools. In addition, the outlook from EDA executives will be provided in a separate post. Intellectual property As designs get larger, it should be no surprise that the size of the [getkc id="43" kc_... » read more

Protecting Automotive Systems With A Root Of Trust


As our cars become more connected and autonomous, we depend on them to entertain us, connect seamlessly to our phones (which carry substantial personal information), help keep us in our proper driving lane, and more. We expect that the electronics in the automobile will work as advertised. However, connected cars can have vulnerabilities to direct, over-the-air, or side-channel attacks, which c... » read more

Predictions: Markets And Drivers


Semiconductor Engineering received a record number of predictions this year. Some of them are just wishful thinking, but many are a lot more thoughtful and project what needs to happen for various markets or products to become successful. Those far reaching predictions may not fully happen within 2018, but we give everyone the chance to note the progress made towards their predictions at the en... » read more

What Will 2018 Bring To The IoT?


The Internet of Things is widely expected to progress in 2018—especially the Industrial IoT—as industry standards get hashed out and more vendors take cybersecurity seriously. On the home front, many Americans are growing accustomed to artificial intelligence technology from their use of Amazon Echo, Apple HomeKit, and Google Home devices. They’re talking to their remote controls to ch... » read more

The Week In Review: Design


Security Security researchers identified a major exploit of the "speculative execution" technique used to optimize performance in modern processors. The flaws allow an attacker to read sensitive information in the system's memory such as passwords, encryption keys, or sensitive information open in applications, according to Google's Jann Horn. Multiple researchers discovered the issues indepen... » read more

← Older posts Newer posts →