shutterstock 1171329481 revised.png

Security on Chip Tech Forum​

​晶片安全技術論壇

日期: 2020年12月3日 (四)  9:00-17:00

地點: 國研院半導體研究中心 二樓國際會議廳​
地址: 新竹市東區展業一路26號

 

​免費報名參加,歡迎蒞臨

指導單位:     

主辦單位: 

協辦單位: ​IEEE CAS     

科技部半導體射月計畫

兩大熱門主題,從技術原理到應用一次講解

​論壇講題一

物理不可複製功能 – 從電路實現到安全應用


近年來隨著科技的發展以及逐漸受重視的安全需求,學界和產業界大量投入晶片指紋PUF (Physically Unclonable Functions)的研發。然而如何利用PUF優異的隨機特性輔助或搭配既有的安全功能,在產業界與學研兩界仍存有不小的落差。此一講題將依序介紹PUF的原理與運作、PUF具有的特性,以及數種不同PUF的電路實現,如早期的SRAM-PUF與近年問世的量子穿隧PUF。講題另將包含PUF的實際運用示例,並說明為何PUF在各應用場域都是不可或缺的重要安全基礎。
 

​論壇講題二

晶片安全信任根的組成、功能、與安全運作
 

在晶片中嵌入信任根而今已是全球共識。終端使用者可能因安全防護不足遭受財損、個資洩漏、乃至生命安全的威脅,因此越來越多產品被要求帶有硬體安全功能。不僅是使用者,晶片開發廠商也面臨供應鏈內外、如know-how被竊取、設計被竄改等風險。如何倚靠晶片信任根保護連網應用運作上的安全因此尤為重要。
資安建構在於密鑰的產生方式、儲存方式、與將密鑰用於安全功能當中。因此,晶片安全的根本技術也同樣圍繞在密鑰的產生與儲存,以及建基於此的認證、加密、完整性、與不可否認性等運作。本講題將會深入剖析晶片安全信任根從硬體層一路延伸至軟體與應用層的保護,並說明如何整合以上重要功能達到極高的安全強度與健全的安全邊界(Security Boundary)。

 

活動議程

報名辦法

  1. 本活動報名截止日為11月27日(五)。主辦單位將視報名狀況提前或延後線上報名時間。若報名者不克參加,可指派其他人選參加並通知主辦單位。

  2. 本活動採預先線上報名並完成登錄手續,請勿偽造他人身份資料進行報名以免觸犯法律,主辦單位保留報名資格之最後審核權利。

  3. 本活動將由主辦單位進行出席資格審核,與主題及屬性符合者為優先考量。

  4. 通過審核者,系統將於活動前一週以電子郵件方式寄發「報到通知」至您的電子信箱,以示您的出席資格,未通過審核者,亦會收到一封通知信。若您未收到任何通知信件,請來電03-560-1010查詢。

  5. 活動當日,請攜帶「報到通知郵件」至活動現場完成報到手續。

  6. 主辦單位視現場狀況保有開放現場報名與否之權利。

  7. 本次活動若適逢天災或疫情等不可抗拒之因素,將延期舉辦,時間另行通知。

  8. 若因不可預測之突發因素,主辦單位得保留論壇內容及講師之變更權利。

Learn from 3 Hot Topics in this Tech Forum

Talk 1

PUF-From Circuit Implementation to Security Applications

 

With the advancement of technology and increasing security requirements, chip fingerprint -- Physical Unclonable Function (PUF) has once again become a focus. This talk will introduce several kinds of PUF, such as the SRAM-PUF and the quantum tunneling PUF that has released in recent years. Through practical examples, PUF expert Dr. Kent will explain how PUF serves as an important security foundation in specific application fields.

Speaker Profile

Dr. Kent Chuang an engineer at PUFsecurity. He received his PhD in electrical engineering from KU Leuven University in Belgium in 2020 and joined the R&D department of PUFsecurity company in the same year. Prior to joining PUFsecurity, Dr. Zhuang worked as a researcher in the COSIC research group of KU Leuven and the imec research group in Belgium. His PhD research centers around developing highly reliable PUF circuits in CMOS and emerging memory technologies. Dr. Zhuang’s current research areas include hardware root of trust, PUF-based security solutions, and attack/protection technologies for password implementation.

Talk 2

Chip security requirements, functions and mechanism

 

In addition to algorithm as an important core in chip security, protecting the encryption and decryption keys depends on the secure key storage mechanism. It involves key generation, secure storage, and proper use of keys in algorithms. It also includes operations such as signature authentication required for secure connections, data transmission integrity, data encryption, and data non-repudiation. Our experienced FAE Aken Wang of PUFsecurity will provide an overview of the usage scenarios and mechanisms related to hardware chip security before diving deeper into the topic.

Speaker Profile

Aken Wang is an FAE at PUFsecurity. He has a background in electronic and electrical engineering, and his work in the security field mainly focuses on hardware chip security market analysis and security silicon intellectual property product specification research. On the application side, he is responsible for discussing security silicon intellectual property applications with end customers of various chip applications in IC design. Furthermore, his expertise lies in integrating hardware chip security and design with relevant specifications, trends, and applications of chip security requirements in different markets.

Talk 3

The composition, function, and security operation of the root-of-trust

 

When it comes to chip security, the global consensus is to establish a secure and effective root-of-trust. End users may suffer financial losses, personal information leakage, and even life safety threats due to insufficient security protection. Therefore, more and more products are required to have hardware security functions. Hence, enhancing the operation security of IoT applications by leveraging the chip root-of-trust is particularly important. Our Director of R&D MY Wu will provide an in depth analysis of secure chip root-of-trust from the fundamental hardware layer protection, and discuss how to achieve high security strength and complete security boundary (Security Boundary) with the support of anti-attack digital design.

Dr. Meng-Yi Wu is the director of R&D at PUFsecurity. His expertise lies in the technology development of embedded flash memory, OTP memory and physical unclonable functions (PUF) and its derivative security chip design. Prior to joining PUFsecurity, Dr. Wu spent ten years at eMemory. In 2018, his invention, NeoPUF, won the ISSCC Takuo Sugano Award. Dr. Wu currently leads the R&D department of Entropy Code Technology in focusing on the development of PUF-based hardware root of trust, chip security cooperator and other security function products.

Speaker Profile

活動議程

主辦單位

熵碼科技為晶片安全解決方案之IP研發公司,承襲母公司力旺電子的NeoPUF(物理不可複製功能) 與 NeoFuse (一次性編程非揮發性記憶體)的技術,長期致力於PUF應用之開發與推廣。熵碼科技曾受邀參與多次兩岸硬體資安論壇活動,包括2019年由科技部射月計畫主辦的國際硬體資安大會 (相關文章請見: 連結)、VLSI Design / CAD Symposium 技術演講 (相關文章請見: 連結)、ETCC中國嵌入式技術大會、台灣物聯網協會與電腦公會協辦之硬體安全工作坊等,亦受邀為特聘講師於清華大學開設硬體資安課程,獲得優良課程獎。

此次技術論壇,除了導覽晶片安全需求與功能機制,更是針對業內想深入了解PUF及PUF衍伸應用解決方案之技術設計內涵的人員所設計,歡迎各方業界人士蒞臨指教。

報名辦法

  1. 活動報名請填線上報名表,如需諮詢,歡迎寫信或來電。活動報名窗口:黃韋云 | wendyhuang@pufsecurity.com |  03-560-1010 #2101

  2. 本活動報名截止日為11月25日(三)。主辦單位將視報名狀況提前或延後線上報名時間。若報名者不克參加,可指派其他人選參加並通知主辦單位。

  3. 本活動採預先線上報名並完成登錄手續,請勿偽造他人身份資料進行報名以免觸犯法律,主辦單位保留報名資格之最後審核權利。

  4. 本活動將由主辦單位進行出席資格審核,與主題及屬性符合者為優先考量。

  5. 通過審核者,系統將於活動前一週以電子郵件方式寄發「報到通知」至您的電子信箱,以示您的出席資格,未通過審核者,亦會收到一封通知信。若您未收到任何通知信件,請來電03-560-1010 #2101查詢。

  6. 活動當日,請攜帶「報到通知郵件」至活動現場完成報到手續。

  7. 主辦單位視現場狀況保有開放現場報名與否之權利。

  8. 本次活動若適逢天災或疫情等不可抗拒之因素,將延期舉辦,時間另行通知。

  9. 若因不可預測之突發因素,主辦單位得保留論壇內容及講師之變更權利。

© 2019 PUFsecurity  All Rights Reserved