Securing System-on-Chips: Hardware Protection in the Age of Chiplets
It seems that almost weekly, the semiconductor industry’s all-encompassing barometer, Moore’s Law, is pronounced dead, dying, or actually healthier than ever. As the debate continues to speculate on its health, there is an unequivocal certainty that singular monolithic chip designs are simply becoming unsustainable as FinFET technology replaces a larger slice of the traditional 2D […]
Set-Top Boxes are a growing Cybersecurity Threat
The Set-top box (STB) market is, in many ways, the perfect case study of the challenges facing IoT security today. It is a mature market valued globally at $22.6B in 2020 (by Grand View Research) and appears unlikely to see significant upheaval over the coming years. Take a step back, however, and the picture becomes […]
Securing the AIoT: Safeguarding AI at the Edge
Edge AI computing has been a trending topic in recent years. The market was already valued at $9 billion in 2020, projected to surpass $60 billion by 2030 (Allied Market Research). Initially driven by computer vision systems (particularly for use in autonomous vehicles – no pun intended), the proliferation of other edge applications, such as […]
Software-Defined Everything doesn’t mean Software-Only Security
Computing power has reached the point where once “hardware-only” functions can now be handled by the software layer running on top of the hardware, with negligible performance difference for users. Applications once only seen in science fiction are becoming present-day science reality, such as the rise of the Metaverse and smart cars that approach the […]
RoT: The Foundation of Security
The goal of this white paper is to provide a primer introduction to RoT and how to choose a right RoT as the trust anchor for a novel hardware based security architecture.