Lots Of Little Knobs For Power


Dynamic power is becoming a much bigger worry at new nodes as more finFETs are packed on a die and wires shrink to the point where resistance and capacitance become first-order effects. Chipmakers began seeing dynamic power density issues with the first generation of [getkc id="185" kc_name="finFETs"]. While the 3D transistor structures reduced leakage current by providing better gate contro... » read more

Continuous Integration


In this article, I tackle the classic question engineers developing software for custom integrated circuits (ICs) grapple with constantly: How do I test my software before the hardware team gets me a working silicon chip? No ‘one size fits all’ solution is provided here (look for that alongside my pet unicorn); instead I detail an easy-to-use yet powerful approach to solve this proble... » read more

Making Software Development Equivalent For Models And Boards


Selected Cortex-M processors include the instruction trace microcell (ITM) to help understand system behavior. Although it can provide other types of trace, the ITM is commonly associated with printf() output and event tracing from applications and operating systems. Historically, Fast Model systems have used semihosting or UART models to provide character and file I/O when running software on ... » read more

Linux Security Primer: SELinux And SMACK Frameworks


With the increased expansion of the IoT, software developers are called upon to do more to protect their devices from malicious attacks. Building a secure system involves many components and layers of security. This paper offers an introductory review of two popular Linux security frameworks: SELinux and SMACK. Readers will gain an understanding of these two frameworks and when to best implemen... » read more

The Week In Review: IoT


Finance Santa Monica, Calif.-based Sixgill reports raising $27.9 million in its Series B round of private financing, led by DRW Venture Capital. Mobile Financial Partners participated in the round. The startup last year raised $6 million in its Series A funding, also led by DRW. The company offers the Sixgill Sense sensor data services platform, addressing applications in the Internet of Thing... » read more

Are You Designing The Right Product?


Development and production of SoCs is becoming more and more complex and expensive. And rightfully so, the semiconductor industry spends billions of dollars on verification efforts. Verification is about checking the design behaves per its specification, a process that is very important and well understood. Still, something can go terribly wrong because having a verified SoC does not guarant... » read more

Executive Insight: Aart de Geus


Aart de Geus, chairman and co-CEO of [getentity id="22035" e_name="Synopsys"], sat down with Semiconductor Engineering to discuss machine learning and big data, the race toward autonomous vehicles, systems vs. chips, software vs. hardware, and the future of EDA. What follows are excerpts of that conversation. SE: The whole tech world is buzzing over data and how it gets used in areas such as... » read more

Extracting Maximum Performance From Hardware


The Arm DS-5 Streamline performance analyzer provides system performance metrics, software tracing, and statistical profiling to help engineers get the most performance from hardware and find important bottlenecks in software. The Raspberry Pi 3 is one of the easiest systems for learning Streamline, and a quad-core Cortex-A53 also makes it a good target for learning Linux development. Many o... » read more

Fuzz Testing Maturity Model


Fuzz testing is a highly effective technique for locating vulnerabilities in software. Malformed and unexpected inputs are delivered to the target software, and when failures occur, vulnerabilities have been located. Fuzzing is a widely recognized technique for improving the security, robustness, and safety of software. However, fuzzing is an open-ended pursuit—an infinite space problem. So, ... » read more

Exploiting The Java Deserialization Vulnerability


In the security industry, we know that operating on untrusted inputs is a significant area of risk; and for penetration testers and attackers, a frequent source of high-impact issues. Serialization is no exception to this rule, and attacks against serialization schemes are innumerable. Unfortunately, developers enticed by the efficiency and ease of reflection-based and native serialization cont... » read more

← Older posts Newer posts →