Back to home
Technology

Webinar: Why AI-Assisted Security Verification For Chip Design is So Important

Source

SemiWiki

Published

TL;DR

AI Generated

AI-assisted security verification for chip design is crucial due to the increasing vulnerability of the hardware root of trust to attacks, as highlighted in a webinar by Caspia Technologies. The webinar will cover the risks faced by design teams, a live demonstration of Caspia's security-aware static verification solution, and the importance of integrating AI into chip design processes to prevent security flaws. The event, scheduled for January 28, 2026, will provide insights into addressing hardware security challenges and the role of AI in enhancing chip security. Attendees designing advanced chips for AI workloads are encouraged to register for this informative session.

Read Full Article

Similar Articles

Dr. L.C. Lu on TSMC Advanced Technology Design Solutions

Dr. L.C. Lu on TSMC Advanced Technology Design Solutions

Dr. L.C. Lu, a key figure at TSMC, focuses on design-technology co-optimization, packaging innovations, and AI-driven methodologies for next-gen semiconductor systems. TSMC emphasizes DTCO and DDCL innovations for scaling from N5 to A14 nodes, with NanoFlex and NanoFlex Pro architectures offering efficiency gains. N2P and N2U nodes incorporate advanced DTCO and power delivery optimizations, with hybrid dual-rail architectures achieving significant energy savings. TSMC collaborates with EDA partners for AI integration, enhancing productivity and design quality. Advanced packaging technologies like CoWoS and SoIC play a crucial role in enabling AI scaling, with memory bandwidth and interconnect performance scaling aggressively. TSMC addresses power delivery and thermal management challenges in AI systems through advanced solutions. TSMC's advancements in design methodologies and AI-driven automation promise improved productivity and scalability in chip-package co-design.

SemiWiki
MIT Technology Review

The Download: a new Christian phone network, and debugging LLMs

A new US phone network for Christians is launching, blocking porn and gender-related content with network-level controls. Goodfire, a San Francisco startup, released Silico, a tool for debugging AI models by allowing users to adjust parameters during training. The National Science Foundation faced mass firings, impacting US science funding and governance. China's AI labs are releasing open-source models, challenging the traditional Silicon Valley approach. Elon Musk admitted using OpenAI models for xAI training, sparking debate on AI ethics and practices.

MIT Technology Review
Mark Zuckerberg says Meta is cutting 8,000 jobs to pay for AI infrastructure — insatiable compute demand means the company can't rule out further headcount reductions

Mark Zuckerberg says Meta is cutting 8,000 jobs to pay for AI infrastructure — insatiable compute demand means the company can't rule out further headcount reductions

Meta CEO Mark Zuckerberg announced at a town hall that the company plans to cut 8,000 jobs due to the increasing costs of AI infrastructure. These layoffs will affect about 10% of Meta's workforce and are linked to the company's expanding AI budget. Zuckerberg mentioned that the focus on AI hardware is diverting funds from employee-related expenses, hinting at possible future reductions. Despite the layoffs, Meta reported strong Q1 earnings, raising questions about the necessity of the job cuts. The move highlights a broader debate about the role of AI in driving layoffs in the tech industry.

Tom's Hardware
Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

Linux exploit instantly grants administrator access on most distributions since 2017 — cryptography optimization snafu grants root privileges to local users

A recent Linux exploit, CVE-2026-31431, allows local unprivileged users to gain root access instantly on most Linux distributions since 2017. The exploit affects popular distros like Ubuntu, RHEL, Suse, and Amazon Linux, as well as Windows' WSL2. The vulnerability, discovered by Xint Code researchers, involves a cryptography optimization flaw that grants administrator privileges through a devious attack on the AF_ALG socket. While a patch has been released, some distributions may still be vulnerable, requiring mitigation methods like disabling AF_ALG sockets. The exploit occurs in memory without leaving detectable traces on disk, making it challenging to detect with security software.

Tom's Hardware

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.