Dedicated accelerator hardware for artificial intelligence and machine learning algorithms are increasingly prevalent in data centers and endpoint devices. These accelerators handle important data which has value and must be protected. Many security threats exist that can compromise these assets. Fortunately, there are security techniques which can mitigate these threats.
Webinars
Challenges and Benefits of Certification of Security Hardware
As chip designers face greater requirements for security, they also have a growing number of options for secure silicon IP. They can build it themselves, use “free” IP that comes along with other components, use something open source, or obtain it from an IP vendor that specializes in security. There are pros and cons to each approach, but one consideration that is often overlooked is the need for certification for security and functional safety. This webinar will examine some of the common certification regimes, their costs and benefits, and how this impacts the selection of security IP.
Understanding Fault Injection Attacks and Their Mitigation
Fault injection is the art of manipulating hardware behavior through voltage spikes, electromagnetic transmissions or laser impulses. Successful fault injection attacks can allow adversaries to bypass complex security and protection mechanisms entirely. Join Rambus and our partners at Riscure for a webinar explaining fault injection attacks and their mitigation.
Harnessing Silicon-Based Security to Achieve a Competitive Advantage
27% of enterprise IT and business decision makers indicated a supplier’s proven security capabilities are the top factor in their selection criteria, according to IDC’s 2018 Global IoT Decision Maker Survey. And this strong preference for suppliers with a track record of strong security will only increase as the threat environment continues to evolve. There is a growing industry consensus that the path forward requires a philosophy of security by design with the implementation of device security anchored in hardware. Learn how hardware-based security can be harnessed to provide competitive advantage in a world where data is the most valuable commodity.
Pushing the Envelope for AI and ADAS with GDDR6
Building on a strong history as the go-to solution for PC and gaming console graphics, the latest iteration of GDDR is an increasingly attractive solution for leading-edge applications in artificial intelligence (AI) and advanced driver-assistance systems (ADAS). This webinar will outline how the latest technology innovations enable GDDR6 to reach speeds where no memory has gone before, meeting the voracious demand for bandwidth of applications on the frontier of computing.
Understanding Side-channel Attacks, Their Implications, and How to Test a System’s Resistance
Side-channel attacks are low cost, non-invasive, and can completely subvert an electronic system’s security. Watch this webinar to learn more about the nature of side channel attacks and how testing can reveal a system’s ability to handle this threat.
