The Ideal Crypto Coprocessor with Root of Trust to Support Customer Complete Full Chip Evaluation: PUFcc gained SESIP and PSA Certified™ Level 3 RoT Component Certification
How PUFcc and Corstone Form a Comprehensive Security Architecture that Passed SESIP and PSA Certified Building on the success of achieving PSA Certified™ Level 2 Ready through the integration of PUFcc with Arm’s CPU, Corstone platform, and TF-M, PUFsecurity and Arm move forward to the next level and successfully attain SESIP and PSA Certified™ Level […]
Hardware Security Book Series 3: Anti-Tampering Designs in Hardware Security
Lead Author: Dr. Meng-Yi Wu, Dr. Kai-Hsin Chuang In a secure chip, the keys, which constitute the hardware root of trust (HRoT) of the chip, must be fully protected. An HRoT is the most important design in chip security, providing fundamental trust (root keys), hardware identification code (UID), hardware unique keys (HUK), and entropy. Consequently, […]
Hardware Security Book Series 2: PUF-based Solutions and Applications
Lead Author: Lawrence Liu A portion of this book is based on the customer document package included in every set of deliverables from PUFsecurity. To make this book more accessible, all technical concepts and terms were examined to determine if they could be further expanded. The goal is to create an easy-to-follow guide for readers […]
Hardware Security Book Series 1: Quantum Tunneling PUF
Lead Author: Dr. Kent, Kai-Hsin Chuang I still remember the first time I heard about Physically Unclonable Function (PUF), it was a complete fascination. Even without thinking deeply about how to use it, the fact that it can turn the undesired device variability into good use is already a shock in the head. After spending […]
The Challenge of Automotive Hardware Security Deployment
A complete reinvention of the automotive industry is currently underway. Autonomous driving, connected vehicles, and the electrification of the powertrain all represent a once-in-a-generation shift in the manufacturing process. Traditional carmakers are repositioning themselves as technology companies, inserting upwards of three thousand chips in a new car today. These changes put tremendous pressure on delivering […]
Safeguarding the Arm Ecosystem with PSA Certified PUF-based Crypto Coprocessor
Co-authors Lawrence Liu (劉持志) / Dr. Evans Yang (楊青松)/ Stephanie Smith Silicon-to-System Security For the past five years, Arm has reaffirmed its commitment to safeguarding its architecture with their Security Manifesto. It outlines a clear “call to arms” for the semiconductor industry to address the rising threats facing computing today. Software alone can only mitigate […]
Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory
One of the major problems today is the security concerns of digital assets, especially those stored within the non-volatile memory. Flash is a very popular non-volatile memory in consumer electronics, providing highly efficient storage solutions for code, data, etc. However, Flash is still facing threats brought by physical attacks with increasing connectivity. eMemory’s subsidiary, PUFsecurity, […]
How PUF-based RoT Can Solve IoT Security Issues
The security issues surrounding the internet of things (IoT) devices range from tiny semiconductors to global supply chains. PUFsecurity, a key provider of intellectual property (IP) that helps strengthen security at the chip level, hosted a forum of IoT experts to discuss the industry’s challenges and outlook. We Need to Build Trust for each IoT […]
Vital Ways to Prevent a Cyberattack
Vital Ways to Prevent a Cyberattack In mid-December last year, SolarWinds, a company specializing in IT management solutions, was at the center of a software supply chain attack. Not only did attackers damage SolarWinds’ software development environment and code signing infrastructure, but they also implanted malicious backdoors around the world. The attackers released fake software […]
Security Innovations That Are Helping Businesses in 2021
More people are now online than ever before. According to Time, internet use is up 35%, and it’s mostly due to how we’re home for longer than usual right now. Organizations, too, have had to adapt and shift their operations online, and now more businesses than ever are operating via a remote setup. This may seem like a […]