Watch this webinar to learn about the components that move, accelerate, and store the data that enable the applications of the future including artificial intelligence (AI), Internet of Things (IoT) and 5G.
Webinars
Secure Silicon IP Series: When One is Not Enough: Multiple Roots of Trust (Part Three)
With a hardware root of trust, security protocols and applications can be run within a secure perimeter of an SoC, keeping keys and security assets protected from unauthorized access. This session will discuss how a secure co-processor with multiple roots of trust allow different entities or applications to have their own “virtual” security core in the SoC, but each with a private security domain.
Secure Silicon IP Series: Will the Real Root of Trust Please Stand Up? (Part Two)
In simple terms, a root of trust is the security foundation for a system-on-a-chip (SoC) or electronic system. Any functionality that needs to be secure relies in whole or in part on that root of trust. However, the term “root of trust” means different things to different people. In some cases, a root of trust is thought to be a single key that was either provisioned to a device or generated by the device itself. In other cases, a root of trust is seen as code, usually boot code, that is immutable and considered always trusted. A newer definition of a root of trust is a hardware module embedded in a chip or system that provides security functionality that keeps the entire chip or system secure.
Secure Silicon IP Series: Complexity vs. Security (Part One)
This webinar will explore some of the threats facing SoC and processor designers and how can SoCs be architected for both performance and security.
