There are many challenges to achieving good “memory security,” especially in that the term “memory” could refer to on-chip SRAM, embedded non-volatile memory, or even off-chip memory (e.g., both DRAM or mass-storage non-volatile). We refer to data within non-executable NVM to be “data at rest,” while data within volatile memory like SRAM or DRAM to be “data in use.” In both domains, data within these memories is of interest to an adversary – it has either immediate value (e.g., passwords, secret keys, AI/ML datasets, etc.), or it can indirectly lead to exposure of those valuable assets. This presentation will focus on the key aspects of memory security for data-in-use applications: 1) data privacy, 2) data authenticity, and 3) data freshness, and how those security aspects weigh against critical performance metrics including latency and memory overhead.
Securing the Semiconductor Supply Chain with Silicon Provisioning and Cloud Key Management
The semiconductor industry is the lifeblood of the digital economy. The design, manufacturing and consumption of chips is a global ecosystem, and competition is fierce as scaling and cost reductions based on Moore’s law are diminishing. Counterfeit and other unauthorized chips create real risks in areas of reliability, functionality, performance and safety. Joseph Gow will discuss how semiconductor companies can protect their IP and business by securely provisioning silicon, and the means to provide the ecosystem-wide capabilities needed to verify the identity and provenance of semiconductor devices.
Building Trust Through Certification of Security Solutions
Certification is increasingly important across many vertical markets and, as systems become more integrated, across sectors. It is critical to trust the products you deploy and that they comply with international standards. Certification is a recognised and established methodology, and Stuart Kincaid will discuss the importance and methods of certifying security solutions to meet the increasing demand for trust.
The Growing Importance of Network Security at Full Line-rate with IPsec and MACsec
Network security at full line rate became de-facto requirement across multiple markets and applications. Layer 2 (MACsec) and Layer 3 (IPsec) are becoming the predominant security protocols for safeguarding network traffic. Rambus security expert, Maxim Demchenko, will discuss the use cases and implementation of hardware-based MACsec security and trends for high-performance inline encryption.
Securing Data in Motion with Hardware Security Engines
In modern communication networks, and especially moving to zero trust environments, all communication channels, including local memory interfaces must be secured. Hardware acceleration is essential to ensure the impact on performance, latency and power consumption is minimal and fundamental system operation is not degraded by the addition of security overhead. Gijs Willemse will discuss the architectural advantages, and in many use cases the necessity, for hardware-based encryption engines.
Hardware Security: Ask Me Anything
Whether it’s security technology trends, the latest cyberthreats, implementation issues or anything in between, our security experts are ready to tackle your questions in this Ask Me Anything session.