About 374 results
Open links in new tab
  1. Site is undergoing maintenance - Tech Design Forum

    Site will be available soon. Thank you for your patience!

  2. Using threat models and risk assessments to define device security ...

    Oct 9, 2018 · A complete hardware security module, based on a root of trust and implementing a ladder of keys, isolates critical assets from remote attacks. Hardware solutions take more silicon area to …

  3. Chiplets may have to prove themselves for secure operation

    Nov 8, 2021 · Each chiplet is then interrogated by a chiplet hardware security module (CHSM) that in Tehranipoor’s model is loaded into an FPGA at boot time. The use of an FPGA provides a degree of …

  4. Security and safety issue challenge automated driving

    Mar 27, 2014 · The idea is to integrate the HSM [hardware security module] into host CPUs coming from our partners. We will not use it in every ECU,” said Bolle, as the focus for the HSM will be on critical …

  5. Ensuring reliability through design separation

    Sep 1, 2009 · This trust must be proven by hardware analysis of each IT component, ensuring that information-assurance levels meet the security requirements of either the Common Criteria or …

  6. Debugging complex RISC-V processors - Tech Design Forum Techniques

    Mar 29, 2024 · Adding hardware modules to a RISC-V design to support software debugging tools is essential, particularly for complex designs. While the additional area cost and verification …

  7. Synopsys launches IP and software for Internet of Things

    Sep 22, 2015 · Low-power IP portfolio includes security hardware, Bluetooth and ISB interfaces, configurable processors and sensor subsystems for Internet of Things

  8. hardware accelerator Archives – Tech Design Forum

    Jul 18, 2022 · Xilinx aims for software flow with Vitis Xilinx has released the first version of its Vitis development environment as the company aims to capture a user base that is more used to software …

  9. Webinar discusses SoC security, area, and power trade-offs

    Dec 22, 2016 · A webinar from Synopsys discusses the challenges of creating secure SoCs, and then covers the trade-offs necessary to balance the value of whatever it is that the SoC is protecting with …

  10. Real Intent tool looks at paths to hardware vulnerability

    Jun 6, 2024 · Real Intent has developed a tool for identifying potential security issues in chip designs at the sign-off stage. Sentry Hardware Security analyzes datapaths within the hardware, ensuring those …