Security Icon

Security

Anti-Counterfeiting

Providing hardware-based protections against counterfeiters, adversaries and competitors, Rambus anti-counterfeiting solutions protect safety, brand, and revenue by safeguarding valuable intellectual property.

OfferingProduct BriefApplications
CryptoFirewall Verifier and Consumable CoresDownload CryptoFirewall Verifier and Consumable Cores product briefPrinters, Consumable Electronics
Circuit Camouflage TechnologyDownload Circuit Camouflage Technology Product BriefGovernment, Semiconductor, AI/ML
superior security icon

Intellectual Property Security

Provides highest level of security and protection for anti-counterfeiting

Keeps designs secret from competitors and adversaries

Protects IP against state-of-the-art attacks

improved profitability icon

Improve Profitability

Reduces revenue loss to counterfeiters

Simplifies device validation to improve time-to-market

Significantly extends the secure life of products

high-flexibility

High Flexibility

Uses standard design flows

Integrates with standard manufacturing processes

Supports a wide array of end uses

Best Practices for Anti-counterfeiting Design

In order to best mitigate counterfeiting risks, chips should include four essential countermeasures:

  1. Anti-emulation: Make it impossible to mimic the chip with a low-cost MCU or easily rebuild it as an ASIC using a low-cost technology.
  2. Anti-reverse engineering: Make it as difficult as possible for reverse-engineers to correctly determine a chip’s circuitry, ROM or NVM contents.
  3. Latent Features: Latent countermeasures used to detect and revoke clones after they’ve been fielded.
  4. Anti-tamper: Make it difficult for an adversary to obtain secret data and/or analyze the chip’s internal operations.

 

Rambus anti-counterfeiting solutions provide semiconductor makers, authentication IC makers, and their OEM customers a path to easily to deploy our field-proven countermeasures in their products.

FREE Webinar: Understanding Fault Injection Attacks and Their Mitigation