Found 204 Results

Anti-tamper protection: How to meet evolving threats

Scott Best, Technical Director of Anti-Counterfeiting Products at Rambus, recently penned an article for Semiconductor Engineering that details why it is critical to scale anti-tamper protection to meet escalating threats. What is an anti-tamper protection? As Best notes, anti-tamper tends to be one of the industry’s “catchall phrases” encompassing any countermeasure on a security chip. […]

Consumer Privacy and Safety at Risk from Unprotected IoT Devices

Rambus’ Paul Karazuba recently penned an article for Semiconductor Engineering that takes a closer look at how consumer privacy and safety continue to be at risk from unprotected IoT devices. As Karazuba notes, security cameras represent approximately 47 percent of vulnerable devices installed on home networks. Basic attack techniques that target these devices, says Karazuba, […]

Security is Critical at the Intersection of AI and 5G

Rambus’ Tim Messegee has penned an article for Semiconductor Engineering that takes an in-depth look at the importance of ensuring security at the intersection of AI and 5G. As Messegee notes, 5G represents nothing less than a revolution in mobile technology with performance that is poised to rival that of wireline networks. “Relative to its […]

Three Top Semiconductor Tech Trends for 2021

As a momentous 2020 fades into the history books, 2021 is expected to be a year of growth and evolution for the semiconductor industry across multiple market segments. Firstly, DDR5 DRAM is slated to enter volume production by the end of 2021, with initial deployments targeting hyperscale data centers. Secondly, AI/ML neural networks – which […]

MACsec Explained: Securing Data in Motion

Learn everything you need to know about MACsec, also known as Media Access Control Security. For end-to-end security of data, it needs to be secured when at rest (processed or stored in a device) and when in motion (communicated between connected devices). For data at rest, a hardware root of trust anchored in silicon provides […]

The Ultimate Guide to HBM2E Implementation & Selection

This is the most comprehensive guide to selecting and implementing a HBM2E memory IP interface solution. Recently, Frank Ferro and Joseph Rodriguez, Senior Directors Product Management at Rambus, hosted a webinar in our virtual Design Summit discussing about HBM2 and HBM2E memory technology. There’s a lot of decisions that need to be made when you’re […]

Root of Trust for FPGAs Product Brief

The Root of Trust for FPGAs is a fully-programmable embedded FIPS 140-2 certified hardware security Root of Trust co-processor integrated in programmable logic. The Root of Trust for FPGAs is a siloed hardware security block, offering secure execution of user applications, tamper detection and protection, secure storage and handling of keys and security assets, resistance […]

Root of Trust for FPGAs

Security Root of Trust for FPGAs FPGAs (Field Programmable Gate Arrays) are widely used in industries such as Defense, Telecommunications, Automotive and AI/ML (Artificial Intelligence/Machine Learning) because of their reconfigurability and flexibility. Whether functioning as the essential building blocks of avionics and spacecraft systems, controlling ADAS (Advanced Driver Assisted Systems) systems, or assisting inference workloads […]

A Modern Interpretation of Kerckhoff

In the late 19th century, Dutch cryptographer Auguste Kerckhoff postulated what has become known as “Kerckhoff’s Principle” — a cryptosystem should be secure even if everything about the system, except the key, is public knowledge. Since Kerckhoff’s days, cryptography has certainly evolved. A modern interpretation of Kerckhoff teaches that you shouldn’t rely on the obscurity of your crypto algorithm, […]

Understanding Anti-Tamper Technology: Part 3

Written by Scott Best for the Rambus Blog In part one of this three-part blog series, we discussed the low-cost attacks that target security chips such as protocol and software attacks, brute force glitch attacks, as well environmental attacks. In part two, we took a closer look at attacks executed by more sophisticated adversaries. These […]