Home > Blog
Rambus Blog

NetCat Exploits Intel’s DDIO
Targeting Intel’s DDIO White hat security researchers from Vrije Universiteit Amsterdam and ETH Zurich have

How 5G is Driving AI at the Edge
Written by Steven Woo Introduction The ongoing transition from 4G to 5G is driving major

White hat malware attack highlights SGX vulnerability
Researchers from the University of Iasi and the University of Switzerland have published a paper

Part 2: Steven Woo Explains GDDR6 – HBM2 Design Tradeoffs
In part one of this two-part series, Steven Woo, Rambus fellow and distinguished inventor, speaks

Hacking the vote
In late 2018, six researchers published a DEF CON report that detailed a range of

A Letter to Our Valued Northwest Logic Customers
A Letter to Our Valued Customers: Taking the Next Step to Comprehensive Interface Solutions Dear

Part 1: Steven Woo Explains GDDR6 – HBM2 Design Tradeoffs
Steven Woo, Rambus fellow and distinguished inventor, recently spoke with Ed Sperling of Semiconductor Engineering

Counterfeit Semiconductors in Military Equipment
Here’s a fact: the counterfeit market for semiconductors is real, sizable and growing. Here’s a

The HPC Bottlenecks of Amdahl’s Other Law
Written by Steven Woo As we discussed in our previous blog post, there is a

Protecting medical devices with a hardware-based root of trust
Nicole Wetsman of The Verge recently penned an in-depth article about the many security issues

DARPA wants secure silicon and scalable defense mechanisms
Automatic Implementation of Secure Silicon (AISS) The Defense Advanced Research Projects Agency (DARPA) recently published

Reassessing the HPC Memory Hierarchy
Written by Steven Woo As we’ve discussed in previous Rambus blog posts, high-performance computing (HPC)

An Introduction to HPC computing
Written by Steven Woo Dominated by the United States, Japan and China, the high-performance computing

Silex malware bricks unprotected IoT devices
Earlier this summer, a new strain of destructive malware known as Silex began to spread

Side-channel attack targets deep neural networks (DNNs)
All physical electronic systems routinely leak information about the internal process of computing via fluctuating

FIPS 140-3 and DPA: A Winning Combination
Recently, Rambus blogged about a large number of our DPARC and Crypto Accelerator Hardware Cores

Selfblow exploits Tegra chipset vulnerability
A white hat researcher by the name of Triszka Balázs recently identified a security vulnerability

Autonomous Vehicles: Memory Requirements & Deep Neural Net Limitations
Written by Steven Woo Introduction According to the National Highway Traffic Safety Administration (NHTSA), various

Taking the Show on the Road
Starting later this month, Rambus will host a series of lunch & learns around the

Let’s talk about neuromorphic computing
The term ‘neuromorphic computing’ can be traced back to the 1980s when Caltech researcher Carver

Securing the Infrastructure with the Global Semiconductor Alliance
By Paul Karazuba, Senior Director of Product Marketing, Cryptography Security, as always, was a hot