How Next-Gen Chips Are Unlocking RISC-V’s Customization Advantage By Marc Evans, Andes Technology July 24, 2025
Efficient Hardware-Assisted Heap Memory Safety for Embedded RISC-V Systems By Hyunjae Park, Inha University July 23, 2025
Automatically Retargeting Hardware and Code Generation for RISC-V Custom Instructions By Kari Hepola, Tampere University July 22, 2025
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection By Matej Bölcskei, ETH Zurich July 15, 2025
Understanding LTTPR: Enabling High-Speed DisplayPort Interconnects in Complex System Designs By Brandon LoGuercio, Trilinear Technologies July 15, 2025
Breaking the HBM Bit Cost Barrier: Domain-Specific ECC for AI Inference Infrastructure By Rui Xie, Rensselaer Polytechnic Institute July 11, 2025
Analyzing Collusion Threats in the Semiconductor Supply Chain By Sanjay (Jay) Rekhi, Computer Security Information Technology Laboratory July 7, 2025
FastPath: A Hybrid Approach for Efficient Hardware Security Verification By Lucas Deutschmann, RPTU Kaiserslautern-Landau July 2, 2025
TROJAN-GUARD: Hardware Trojans Detection Using GNN in RTL Designs By Kiran Thorat, University of Connecticut June 27, 2025
How a Standardized Approach Can Accelerate Development of Safety and Security in Automotive Imaging Systems By Philip Hawkes, MIPI Alliance June 26, 2025
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models By Dipayan Saha, University of Florida June 25, 2025
Enabling Chiplet Design Through Automation and Integration Solutions By Andy Nightingale, Arteris June 25, 2025
Shift-Left Verification: Why Early Reliability Checks Matter By Chun-hsiang Chang, OmniVision Technologies June 24, 2025