The Inside Secure silicon provisioning platform enables enables the use of high security features and functions native in the System on Chip and module, provides hardware root of trust for authentication of third party sections, and enables customers to take control of security in their systems by owning their own keys.
Our CryptoManager Device Key Management is a cloud-based software platform enabling customers to build and deploy key management services for chips and devices. Learn more about our CryptoManager Device Key Management and how it enables secure services across the full device lifecycle.
This IDC Technology Spotlight Study, sponsored by Rambus, discusses key areas where manufacturers must address the growing demand for security and privacy built into connected devices. There is a growing belief that security is best done at the hardware level with layered security and implemented in a way that does not create complexity.
The counterfeit market for semiconductors is real, sizable and growing. Industry analysts peg the current market for fake semiconductors at $75B. Counterfeit chips pose great risk to driver comfort and safety, to say nothing of the severe negative consequences they present to automaker revenues and brand. The good news is there are immediate and cost-effective measures available to secure the semiconductor supply chain and stop counterfeiters in their tracks.
The counterfeit market for semiconductors is real, sizable and growing. The Senate Armed Services Committee found over 1,800 cases where counterfeit electronic components were introduced into U.S. military hardware including airplanes, helicopters and missiles. Counterfeit chips pose serious risk to military equipment and the service personnel who depend on that hardware to perform their mission.
When Jann Horn of Google’s Project Zero posted a detailed blog titled “Reading privileged memory with a side-channel,” it set off a firestorm of activity as the post confirmed that secret information inside a computer could be accessed via two different attacks, Meltdown and Spectre. Essentially, both attacks utilize CPU data cache timing to efficiently exploit and leak information from the system. This could lead to – at worst – arbitrary virtual memory read vulnerabilities across local security boundaries in various contexts.