Holes In AI Security


Mike Borza, principal security technologist in Synopsys’ Solutions Group, explains why security is lacking in AI, why AI is especially susceptible to Trojans, and why small changes in training data can have big impacts on many devices. » read more

Week in Review: IoT, Security, Auto


Internet of Things The Wing unit of Alphabet this summer will begin making drone deliveries in the Vuosarri district of Helsinki, Finland. The unmanned aerial vehicles will bear food and other items from Herkku Food, a gourmet market, and the Café Monami restaurant. The drones will bear deliveries of up to 3.3 pounds over distances of up to 6.2 miles. Comcast is reportedly developing an in... » read more

Hardware Trojans And The Problem Of Trust In Integrated Circuits


Electronic systems are at the core of an ever-increasing number of products and services. From power plants to automobiles, from medical devices to airplanes, from smartphones to home appliances, complex electronic systems enable an unprecedented level of automation, performance, safety, and security. Integrated circuits (ICs) are the backbone of these systems. It is of paramount importance tha... » read more

What EDA’s Big 3 Think Now


In the past two months the CEOs of Cadence, Synopsys and Mentor Graphics delivered their annual high-level messages to their respective user groups. Semiconductor Engineering attended all of the speeches at these conferences, as it did in 2014 (see story here). From a high level, the big issues for CEOs last year were Moore's Law, the costs of design, the impact of low power, and business-... » read more

Designing For Security


Some level of security is required in SoC today, whether it is in hardware, software or — most commonly — both. Of course, there is a price to pay from a power and performance perspective, but thankfully just a small one in most cases. The explosion of consumer devices has driven the need for increased security features in smart cards, smart phones, personal computers, home networks, and... » read more

The Next Big Threat: Manufacturing


The business adage that you’re only as good as your partners should be a core principle of doing business when it comes to security. But with a complex SoC you don’t always know all your partners, who financed them—or worse, who else they’re working with or working for. Consider this scenario: A band of sophisticated thieves grinds off the top of an SoC package, inserts probes to map... » read more