
Site is undergoing maintenance - Tech Design Forum
Site will be available soon. Thank you for your patience!
Using threat models and risk assessments to define device security ...
Oct 9, 2018 · A complete hardware security module, based on a root of trust and implementing a ladder of keys, isolates critical assets from remote attacks. Hardware solutions take more …
Chiplets may have to prove themselves for secure operation
Nov 8, 2021 · Each chiplet is then interrogated by a chiplet hardware security module (CHSM) that in Tehranipoor’s model is loaded into an FPGA at boot time. The use of an FPGA …
Security and safety issue challenge automated driving
Mar 27, 2014 · The idea is to integrate the HSM [hardware security module] into host CPUs coming from our partners. We will not use it in every ECU,” said Bolle, as the focus for the …
Ensuring reliability through design separation
Sep 1, 2009 · This trust must be proven by hardware analysis of each IT component, ensuring that information-assurance levels meet the security requirements of either the Common …
Debugging complex RISC-V processors - Tech Design Forum …
Mar 29, 2024 · Adding hardware modules to a RISC-V design to support software debugging tools is essential, particularly for complex designs. While the additional area cost and verification …
Webinar discusses SoC security, area, and power trade-offs
Dec 22, 2016 · A webinar from Synopsys discusses the challenges of creating secure SoCs, and then covers the trade-offs necessary to balance the value of whatever it is that the SoC is …
Computer vision shows HLS' power for AI design: Part One
Mar 26, 2019 · Computer vision is a very dynamic part of the artificial intelligence (AI) market. It is attracting massive amounts of funding largely because it targets a very wide range of …
Real Intent tool looks at paths to hardware vulnerability
Jun 6, 2024 · Real Intent has developed a tool for identifying potential security issues in chip designs at the sign-off stage. Sentry Hardware Security analyzes datapaths within the …
Imagination to extend virtualization across the SoC
May 20, 2015 · Imagination Technologies plans to virtualize all its processor cores, including the Ensigma family, as part of a plan to improve SoC security.