What It Takes To Make An SoC Design Quantum Safe


When it comes to quantum computing attacks, the first question people ask is “will my design be impacted?” In the majority of cases, the answer is yes. For any device that cannot function with manually programmed symmetric keys, which is most devices, you must plan to make upgrades. The good news is that your architecture is not impacted. Secure domains remain secure domains and keys can be... » read more

New Approaches To Sensors And Sensing


Sensors are becoming more intelligent, more complex, and much more useful. They are being integrated with other sensors in sensor fusion, so a smart doorbell may only wake up when it’s imperative to see who’s at the door, and a microphone may only send alerts when there are cries for help or sounds of glass breaking. Kim Lee, senior director of system applications engineering at Infineon, t... » read more

Achieving ISO/SAE21434 Cyber Security Using Secure Flash


ISO/SAE21434 specifies the requirements for making a car system more robust against cyber-attacks. It outlines the criteria during the concept, development, production, usage and decommission of automotive systems. The requirements of ISO 21434 applies to systems, subsystems and components whose development started after the publication of the standard in August 2021. ISO21434 has been made ... » read more

Shift Left, Extend Right, Stretch Sideways


The EDA industry has been talking about shift left for a few years, but development flows are now being stretched in two additional ways, extending right to include silicon lifecycle management, and sideways to include safety and security. In addition, safety and security join verification and power as being vertical concerns, and we are increasingly seeing interlinking within those concerns. ... » read more

Protecting Data And Devices Now And In The Quantum Computing Era


Quantum computing is being pursued across industry, government and academia with tremendous energy and is set to become a reality in the not-so-distant future. Once sufficiently large quantum computers exist, traditional asymmetric cryptographic methods for key exchange and digital signatures will be broken. Many initiatives have been launched throughout the world to develop and deploy new quan... » read more

Spectre-BHB: Speculative Target Reuse Attacks Version 1.7


In March 2022, researchers within the Systems and Network Security Group at Vrije Universiteit Amsterdam disclosed a new cache speculation vulnerability known as Branch History Injection (BHI) or Spectre-BHB. Spectre-BHB is similar to Spectre v2, except that malicious code uses the shared branch history (stored in the CPU Branch History Buffer, or BHB) to influence mispredicted branches within ... » read more

Wi-Fi 7 Moves Forward, Adding Yet Another Protocol


The latest generation Wi-Fi protocol brings better speeds and data handling, but it does little to bridge various communications technologies. That, in turn, makes it more difficult and more expensive to design chips because they must integrate and support multiple wireless technologies, including different versions of the same technology. Wireless communications technologies are often victi... » read more

RowPress: Read-Disturb Phenomenon In DDR4 DRAM Chips


A technical paper titled "RowPress: Amplifying Read Disturbance in Modern DRAM Chips" was published by researchers at ETH Zürich. Abstract: "Memory isolation is critical for system reliability, security, and safety. Unfortunately, read disturbance can break memory isolation in modern DRAM chips. For example, RowHammer is a well-studied read-disturb phenomenon where repeatedly opening and clo... » read more

Silicon Root Of Trust IP And The Automotive Chain Of Trust


Cybersecurity attacks in the automotive industry have increased in magnitude, frequency and sophistication in recent years. According to IDC, there have been more than 900 publicly reported automotive security incidents since 2010, and this number is growing year over year. New attack vectors are emerging all the time. For example, attacks on the EV charging infrastructure reached 4% of total i... » read more

Curbing Automotive Cybersecurity Attacks


The relentless cyberattacks on the automotive sector are not limited to vehicles and have an impact on the entire automotive supply chain, so the pressure is on the automotive ecosystem to understand the necessary standards and regulations for vehicles and components. While the process of attaining compliance adds additional effort, in the long run, the increase in cybersecurity will save the a... » read more

← Older posts Newer posts →