From Silicon To Software

Archive for the 'Security' Category

 

Why Now Is the Time to Address Quantum Computing’s Impact on Cryptography

Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.

Continue Reading...

Posted in Application Security, Cryptography, IP, Quantum Computing, Security

 

What’s Driving the World’s First Analog and Mixed-Signal Emulation Technology?

Learn how analog and mixed-signal (AMS) verification technology, which we developed as part of DARPA’s POSH and ERI programs, emulates analog designs.

Continue Reading...

Posted in Aerospace and Government, Application Security, Security, Verification

 

5 Strategies for Protecting Your Advanced SoC Designs from Security Breaches

We share 4 strategies for protecting advanced SoCs & chip designs, including chip design tools embedded with security standards & third-party certifications.

Continue Reading...

Posted in Aerospace and Government, Security

 

Security for SoC Interfaces Takes Center Stage in Data Protection

We explore security for SoC interfaces and share how SoC design can enhance data security by protecting devices through authentication and encryption.

Continue Reading...

Posted in IP, Security

 

How AI Helps Cameras See More Clearly

Learn how AI-powered cameras and neural network image processing enable everything from smartphone portraits to machine vision and automotive safety features.

Continue Reading...

Posted in Artificial Intelligence, Automotive, Internet of Things, IP, Robotics, Security

 

Robust Security for Cloud-Based Chip Design and Verification

We explore the importance of cloud security in cloud-based chip design and verification, and unpack the key pillars of security in our cloud EDA tools.

Continue Reading...

Posted in Cloud, EDA, IP, Security, Verification

 

How Do You Stay Ahead of Hackers and Build State-of-the-Art Automotive Cybersecurity?

Explore automotive cybersecurity standards, news, and best practices through blog posts from our experts on connected vehicles, automotive SoCs, and more.

Continue Reading...

Posted in Automotive, Security

 

Counterfeit Chips 101: Protect Your Next Design

We explain the world of counterfeit chips, including types of fake chips, chip design techniques to prevent counterfeiting, and the global forces at play.

Continue Reading...

Posted in Malware, Security, Verification

 

Protecting Automotive OTA Software Updates from Security Threats

Learn about automotive cybersecurity best practices and NHTSA guidelines for securing OTA vehicle software updates to protect connected vehicles.

Continue Reading...

Posted in Automotive, Security

 

Don’t Let Automotive Aftermarket Devices Become Security Threats

Explore the NHTSA’s automotive cybersecurity best practices for protecting ECUs against attacks from (or through) connected aftermarket car accessories.

Continue Reading...

Posted in Automotive, Security