SEMICON West showed a distinct thematic shift away from preserving Moore's Law to assessing the architectural implications of AI, as EDA was brought into the event.
The challenge for designers is to find ways of providing high levels of security in low-cost devices that have become worthwhile targets because of their role as gateways to more valuable information.
When developing its security guidelines and checklists for consumer IoT and similar devices, the IoT Security Foundation's working groups tested their recommendations against what is known about real-world hacks and attacks.
USB 2.0 could become an integration standard for IoT SoCs, due to its ubiquity, available drivers, support for rapid prototyping, and area efficiency.
A look at implementing Bluetooth low energy interfaces into a design and the trade-offs involved in making different levels of integration
IoT security is critical. Embedding a root of trust in hardware can provide the firm foundation necessary for a more secure IoT implementation.
An analysis of what it takes to build true random number generators that can provide a strong cryptographic basis for systems security, especially for IoT devices.
A quick look at Bluetooth Smart and how it can be used to provide network connections in certain classes of IoT application.
Many IoT applications have a very strict energy budget. SoC designers targeting the IoT have to trade off providing the features that the market demands with the power budget the applications demand. What are their options?
Achieving IoT security means addressing every link in the chain, from the quality of your application code to embedding a root of trust in the hardware.
View All Sponsors