About 507 results
Open links in new tab
  1. Site is undergoing maintenance - Tech Design Forum

    Site will be available soon. Thank you for your patience!

  2. Using threat models and risk assessments to define device security ...

    Oct 9, 2018 · A complete hardware security module, based on a root of trust and implementing a ladder of keys, isolates critical assets from remote attacks. Hardware solutions take more …

  3. Chiplets may have to prove themselves for secure operation

    Nov 8, 2021 · Each chiplet is then interrogated by a chiplet hardware security module (CHSM) that in Tehranipoor’s model is loaded into an FPGA at boot time. The use of an FPGA …

  4. Security and safety issue challenge automated driving

    Mar 27, 2014 · The idea is to integrate the HSM [hardware security module] into host CPUs coming from our partners. We will not use it in every ECU,” said Bolle, as the focus for the …

  5. Ensuring reliability through design separation

    Sep 1, 2009 · This trust must be proven by hardware analysis of each IT component, ensuring that information-assurance levels meet the security requirements of either the Common …

  6. Debugging complex RISC-V processors - Tech Design Forum …

    Mar 29, 2024 · Adding hardware modules to a RISC-V design to support software debugging tools is essential, particularly for complex designs. While the additional area cost and verification …

  7. Webinar discusses SoC security, area, and power trade-offs

    Dec 22, 2016 · A webinar from Synopsys discusses the challenges of creating secure SoCs, and then covers the trade-offs necessary to balance the value of whatever it is that the SoC is …

  8. Computer vision shows HLS' power for AI design: Part One

    Mar 26, 2019 · Computer vision is a very dynamic part of the artificial intelligence (AI) market. It is attracting massive amounts of funding largely because it targets a very wide range of …

  9. Real Intent tool looks at paths to hardware vulnerability

    Jun 6, 2024 · Real Intent has developed a tool for identifying potential security issues in chip designs at the sign-off stage. Sentry Hardware Security analyzes datapaths within the …

  10. Imagination to extend virtualization across the SoC

    May 20, 2015 · Imagination Technologies plans to virtualize all its processor cores, including the Ensigma family, as part of a plan to improve SoC security.