X Tutup

Ultra Ethernet Security (UET‑TSS) Tailored For AI And HPC


As AI and high‑performance computing (HPC) systems scale from racks to entire data centers, the network has become both a performance enabler and a growing attack surface. Modern AI fabrics interconnect thousands of GPUs and CPUs, move massive volumes of sensitive model data, and increasingly rely on direct memory access rather than host‑mediated communication. These trends exposed a fundam... » read more

Limiting AI/ML Tools To Ensure Physical AI Safety, Security


Key Takeaways: AI-based tools can help monitor physical AI systems and LLMs, but human oversight is still needed to avoid false positives, bias, and other anomalies. For autonomous vehicles and robots, edge case scenarios and understanding human values are weak points, especially as moral and social values change over time. AI tools are growing and becoming increasingly helpful for c... » read more

Learnings From The Polish Energy Sector Attacks


On 29 December 2025, coordinated cyberattacks targeted Polish energy infrastructure. The attacks coincided with severe winter weather and appear to have aimed at disrupting heat supply to end users by targeting renewable energy farms. The attackers succeeded in disabling controllers linking generation and distribution facilities but, thankfully, were unable to halt electricity production. Th... » read more

Verifying Scale-Up And Scale-Out In Data Centers


Semiconductor Engineering sat down to discuss challenges and solutions for data center build-out and build-up with Gordon Allan, Siemens EDA director of verification IP; Rishi Chugh, vice president of product marketing for network switching at Marvell; Saravanan Kalinagasamy, senior director of ASIC design and validation at Astera Labs; and Jalaj Gupta, product engineering lead at Siemens EDA. ... » read more

From Monolithic SoCs To Chiplets: A New Hardware Security Paradigm


Chiplet architectures are quickly becoming the dominant approach for building scalable, heterogeneous SoCs. By disaggregating a monolithic die into multiple interoperable chiplets, silicon designers gain flexibility in process node choices, reuse of proven functions, and faster time-to-market. At the same time, disaggregation breaks one of the most fundamental assumptions in traditional SoC sec... » read more

Securing UALink: Introducing A UALinkSec Security Module


By Dana Neustadter and Vincent van der Leest Over the next decade, artificial intelligence will dominate computing, driving profound changes in both hardware and software architectures. This transformation will reshape data center design and interconnect technologies, creating new opportunities for innovation. As AI workloads scale, the need for high-speed, low-latency communication between ... » read more

Building Trust At The Silicon Level: Secure Storage Solution For OTP IP


As semiconductor designs advance into cutting-edge nodes, the complexity of integrated IP blocks from diverse sources is expanding the attack surface. Traditional software-only security measures are increasingly inadequate, as attackers exploit vulnerabilities beneath the software layer. To counter these risks, designers of AI accelerators, automotive domain controllers, aerospace systems, a... » read more

Navigating FIPS 140-3


FIPS 140‑3 is a U.S. federal standard. Validations are issued under the Cryptographic Module Validation Program (CMVP), jointly managed by the National Institute of Standards (NIST) and the Canadian Center for Cyber Security (CCCS). These validations are accepted by both U.S. and Canadian federal agencies. The standard imposes strict requirements on security boundaries, operational environmen... » read more

Airbus A320 Recall: Rethinking Fault Testing In Aerospace


Fault injection is usually discussed in the context of security, where adversaries deliberately induce faults to bypass protections or extract sensitive information. In safety engineering, by contrast, faults are often treated as rare, random events driven by natural or environmental factors. The recent Airbus A320 recall is a good example of how a primarily safety incident can still benefit fr... » read more

Securing Terabit Ethernet Networks With 1.6T MACsec Security Modules


By Dana Neustadter and Vincent van der Leest In the realm of high-performance computing (HPC) and data centers, Ethernet is one of the interfaces of choice due to its scalability, reliability, and broad industry support. Ethernet's ability to efficiently handle large volumes of data makes it ideal for HPC environments that require high-speed data transmission and seamless integration with ex... » read more

← Older posts
X Tutup