New Horizons for Chip Design

Archive for the 'Security' Category


UFS 4.0 Explained: How the Latest Flash Storage Standard Propels Our 5G World

We explain the UFS 4.0 specification for flash storage and explore how data transfer rates up to 5800 MBps enhance smartphones, vehicles, AR/VR, and beyond.

Continue Reading...

Posted in 5G, IP, Security


How the MACsec Protocol Keeps Ethernet Networks Secure

We explain how the MACsec protocol works as one of the fundamentals of network security, ensuring Ethernet interface security for automotive, HPC and beyond.

Continue Reading...

Posted in 5G, Automotive, Cloud, HPC, IP, Security


Secure DDR DRAM Against Rowhammer, RAMBleed, and Cold-Boot Attacks

Learn how to design security into high-bandwidth DDR memory interfaces and protect DRAM devices & data from memory-scraping attacks like Rowhammer & RAMbleed.

Continue Reading...

Posted in Internet of Things, IP, Security


New PCIe TDISP Architecture Secures Device Interfaces with Virtual Servers

Part of the PCIe 6.0 specification, learn how the TEE Device Interface Security Protocol (TDISP) secures I/O virtualization & enables secure key exchange.

Continue Reading...

Posted in Cloud, IP, Security


Why Now Is the Time to Address Quantum Computing’s Impact on Cryptography

Explore quantum computing’s impact on cryptography and learn how to prepare SoC designs for post-quantum computing and evolving cryptographic standards.

Continue Reading...

Posted in Application Security, Cryptography, IP, Quantum Computing, Security


What’s Driving the World’s First Analog and Mixed-Signal Emulation Technology?

Learn how analog and mixed-signal (AMS) verification technology, which we developed as part of DARPA’s POSH and ERI programs, emulates analog designs.

Continue Reading...

Posted in Aerospace and Government, Application Security, Security, Verification


5 Strategies for Protecting Your Advanced SoC Designs from Security Breaches

We share 4 strategies for protecting advanced SoCs & chip designs, including chip design tools embedded with security standards & third-party certifications.

Continue Reading...

Posted in Aerospace and Government, Security


Security for SoC Interfaces Takes Center Stage in Data Protection

We explore security for SoC interfaces and share how SoC design can enhance data security by protecting devices through authentication and encryption.

Continue Reading...

Posted in IP, Security


How AI Helps Cameras See More Clearly

Learn how AI-powered cameras and neural network image processing enable everything from smartphone portraits to machine vision and automotive safety features.

Continue Reading...

Posted in Artificial Intelligence, Automotive, Internet of Things, IP, Robotics, Security


Robust Security for Cloud-Based Chip Design and Verification

We explore the importance of cloud security in cloud-based chip design and verification, and unpack the key pillars of security in our cloud EDA tools.

Continue Reading...

Posted in Cloud, EDA, IP, Security, Verification