How To Build An IoT Chip


Semiconductor Engineering sat down to discuss IoT chip design issues with Jeff Miller, product marketing manager for electronic design systems in the Deep Submicron Division of [getentity id="22017" e_name="Mentor, a Siemens Business"]; Mike Eftimakis, IoT product manager in [getentity id="22186" comment="ARM"]'s Systems and Software Group; and John Tinson, vice president of sales at Sondrel Lt... » read more

Executive Insight: Aart de Geus


Aart de Geus, chairman and co-CEO of [getentity id="22035" e_name="Synopsys"], sat down with Semiconductor Engineering to discuss machine learning and big data, the race toward autonomous vehicles, systems vs. chips, software vs. hardware, and the future of EDA. What follows are excerpts of that conversation. SE: The whole tech world is buzzing over data and how it gets used in areas such as... » read more

Design And Verification For An Era Of A Trillion Devices


Scared or excited? When I did a back-of-the-envelope calculation whether the one trillion devices that Softbank’s CEO Masa-san predicted least year at ARM TechCon was possible, I realized that a trillion may be the low end of the range. For me, the geeky excitement about the potential technological progress and how to architect the Internet of Things (IoT) gets balanced very fast with concern... » read more

Power/Performance Bits: Aug. 22


USB data leakage Researchers from the University of Adelaide found that USB connections are vulnerable to information leakage. In testing more than 50 different computers and external USB hubs, they found that over 90% of them leaked information to an external USB device. "USB-connected devices include keyboards, cardswipers and fingerprint readers which often send sensitive information to ... » read more

Exploiting The Java Deserialization Vulnerability


In the security industry, we know that operating on untrusted inputs is a significant area of risk; and for penetration testers and attackers, a frequent source of high-impact issues. Serialization is no exception to this rule, and attacks against serialization schemes are innumerable. Unfortunately, developers enticed by the efficiency and ease of reflection-based and native serialization cont... » read more

IoT Security Challenged By Evolving Threat Landscape


Many IoT devices on the market today lack effective security, making them vulnerable to attackers and easily compromised. This is problematic, because an unsecured IoT ecosystem introduces real-world risks that include malicious actors manipulating the flow of information to and from network connected devices or tampering with the devices themselves. This salient lack of IoT security was ill... » read more

Achieving Separation On Multiprocessor SoCs For Enhanced Safety And Security


As I read my colleague Andrew Caples’ article on The Blurring of Safety and Security for Embedded Devices, I immediately started to think of the Xilinx UltraScale+ MPSoC – as I have engaged with numerous customers about using this chip for both safety and security purposes, and the requirements for both areas are definitely starting to blur. I quickly realized a blog about the Xilinx... » read more

What Does An IoT Chip Look Like?


By Ed Sperling and Jeff Dorsch Internet of Things chip design sounds like a simple topic on the face of it. Look deeper, though, and it becomes clear there is no single IoT, and certainly no type of chip that will work across the ever-expanding number of applications and markets that collectively make up the IoT. Included under this umbrella term are sensors, various types of processors, ... » read more

Tracking Down Errors With Data


Michael Schuldenfrei, CTO at [getentity id="22929" comment="Optimal+"], sat down with Semiconductor Engineering to discuss how data will be used and secured in the future, the accuracy of that data, and what impact it can have on manufacturing. What follows are excerpts of that conversation. SE: Can data be shared across the supply chain? Schuldenfrei: We believe it has to happen. If it d... » read more

IoT Security? Let Them Eat Cake!


Often attributed to Marie Antoinette, the now famous phrase “let them eat cake” (qu'ils mangent de la brioche) is typically used to highlight one’s lack of understanding of a serious issue. This attitude is particularly noticeable in the world of IoT security. Everyone acknowledges that the clear majority of IoT devices are vulnerable and easily compromised, as many lack even the most ... » read more

← Older posts Newer posts →