PUFs, physically unclonable functions, are mixed-signal circuits which rely on variations unique to a specific chip in order to self-generate a digital “fingerprint.” These fingerprints can be used as the basis of cryptographic keys. While that’s useful, the real power of PUFs is leveraging their unclonable transformation function to enable a challenge-response mechanism that can distinguish an authentic chip from a perfect adversarial clone at any time after the original chip is fielded. In this webinar, Scott Best, Technical Director of Rambus Security IP, will describe the methods that PUF helper-data images generated during the chip manufacturing process can be employed to end the risk of undetectable counterfeit chips.
Root of Trust
Securing Data Center AI/ML Workloads
Security for Design Approach for Semiconductors
Choosing the Right Root of Trust
よりセキュアなシリコンサプライチェーン (A More Secure Silicon Supply Chain)
Counterfeit chips are large and growing problem putting both civilian and military supply chains at risk. Estimates of the size of the counterfeit market run to $75B and more. With electronics at the heart of so many of the products we depend upon, the risks of counterfeit semiconductors range from inconvenience to loss of property and life.
AIと5Gにより高まるIoT機器の脅威 (5G and AI Raise Security Risks for IoT Devices)
5G represents a revolution in mobile technology with performance that will rival that of wireline networks. 5G’s Ultra-reliable Low Latency Communication (uRLLC) links will enable a profusion of artificial intelligence (AI)-powered IoT devices from delivery drones to smart cities. The rapid rise in the number of smart IoT devices, coupled with expanded connectivity, will greatly escalate the growth of data and network traffic.
