As chip designers face greater requirements for security, they also have a growing number of options for secure silicon IP. They can build it themselves, use “free” IP that comes along with other components, use something open source, or obtain it from an IP vendor that specializes in security. There are pros and cons to each approach, but one consideration that is often overlooked is the need for certification for security and functional safety. This webinar will examine some of the common certification regimes, their costs and benefits, and how this impacts the selection of security IP.
Security IP
Understanding Fault Injection Attacks and Their Mitigation
Fault injection is the art of manipulating hardware behavior through voltage spikes, electromagnetic transmissions or laser impulses. Successful fault injection attacks can allow adversaries to bypass complex security and protection mechanisms entirely. Join Rambus and our partners at Riscure for a webinar explaining fault injection attacks and their mitigation.
Harnessing Silicon-Based Security to Achieve a Competitive Advantage
27% of enterprise IT and business decision makers indicated a supplier’s proven security capabilities are the top factor in their selection criteria, according to IDC’s 2018 Global IoT Decision Maker Survey. And this strong preference for suppliers with a track record of strong security will only increase as the threat environment continues to evolve. There is a growing industry consensus that the path forward requires a philosophy of security by design with the implementation of device security anchored in hardware. Learn how hardware-based security can be harnessed to provide competitive advantage in a world where data is the most valuable commodity.
Understanding Side-channel Attacks, Their Implications, and How to Test a System’s Resistance
Side-channel attacks are low cost, non-invasive, and can completely subvert an electronic system’s security. Watch this webinar to learn more about the nature of side channel attacks and how testing can reveal a system’s ability to handle this threat.
Secure Silicon IP Series: When One is Not Enough: Multiple Roots of Trust (Part Three)
With a hardware root of trust, security protocols and applications can be run within a secure perimeter of an SoC, keeping keys and security assets protected from unauthorized access. This session will discuss how a secure co-processor with multiple roots of trust allow different entities or applications to have their own “virtual” security core in the SoC, but each with a private security domain.
Secure Silicon IP Series: Will the Real Root of Trust Please Stand Up? (Part Two)
In simple terms, a root of trust is the security foundation for a system-on-a-chip (SoC) or electronic system. Any functionality that needs to be secure relies in whole or in part on that root of trust. However, the term “root of trust” means different things to different people. In some cases, a root of trust is thought to be a single key that was either provisioned to a device or generated by the device itself. In other cases, a root of trust is seen as code, usually boot code, that is immutable and considered always trusted. A newer definition of a root of trust is a hardware module embedded in a chip or system that provides security functionality that keeps the entire chip or system secure.
