Learn how analog and mixed-signal (AMS) verification technology, which we developed as part of DARPA’s POSH and ERI programs, emulates analog designs.
We’re enabling secure SoC design for aerospace applications with cloud-based EDA tools on the Microsoft Azure Government Cloud, as part of the DoD’s RAMP program.
Autonomous vehicle safety and cybersecurity starts with automotive SoC design, protecting connected vehicles against data tampering and physical attacks.
We explain the NHTSA’s latest automotive cybersecurity best practices, including guidelines to protect automotive ECUs and connected vehicle technologies.
Connected vehicles are now part of the Internet of Things, and need IoT security to match. Explore automotive cybersecurity & the NHTSA, SAE & ISO standards.
We cap off 2020 with a look at this year’s Smart Everything developments, including AI advancements, new EDA tools, 5G’s global rollout, and security in design.
Posted in 5G, Aerospace and Government, Application Security, Artificial Intelligence, Automotive, Cloud, EDA, HPC, Inside Synopsys, Internet of Things, Optical Design, Prototyping, Security, Verification
Security is imperative for defense applications; we explore how shifting security left in the design process (DevSecOps) allows security & speed to coexist.
The Motor Industry Software Reliability Association recently announced it is merging its C++ guidelines with AUTOSAR. Will this unified standard for safety-related code development be enough to safeguard the future of the connected car?
Women play vital roles in developing the tools that engineers around the world use to design smart chips and develop secure code for the amazing devices that are changing the way we work and play. USA Today recently featured three Synopsys engineers, who reflect on their experiences as women in tech and offer advice on carving out success in a male-dominated field.
Posted in Application Security, Artificial Intelligence, Automotive, Cryptography, EDA, Healthcare, Internet of Things, IP, Machine Learning, Malware, Optical Design, Privacy, Quantum Computing, Robotics, Security, Superconducting Electronics, TCAD
When security researchers first demonstrated that they could hack a car over the internet to control its brakes and transmission, Chrysler had to recall 1.4 million vehicles to fix the software vulnerability. The infamous Jeep hack of 2015 was an expensive wake-up call for the automotive industry. So, what has changed since then?