shutterstock 1171329481 revised.png

2020 Security on Chip Tech Forum​

Learn from 3 Hot Topics in this Tech Forum

101014_黃logo_有底色(已去底).jpg
射月計畫logo.png
MOST+logo+white.png
logo-cas-white-276x300.png

兩大熱門主題,從技術原理到應用一次講解

​論壇講題一

物理不可複製功能 – 從電路實現到安全應用


近年來隨著科技的發展以及逐漸受重視的安全需求,學界和產業界大量投入晶片指紋PUF (Physically Unclonable Functions)的研發。然而如何利用PUF優異的隨機特性輔助或搭配既有的安全功能,在產業界與學研兩界仍存有不小的落差。此一講題將依序介紹PUF的原理與運作、PUF具有的特性,以及數種不同PUF的電路實現,如早期的SRAM-PUF與近年問世的量子穿隧PUF。講題另將包含PUF的實際運用示例,並說明為何PUF在各應用場域都是不可或缺的重要安全基礎。
 

​論壇講題二

晶片安全信任根的組成、功能、與安全運作
 

在晶片中嵌入信任根而今已是全球共識。終端使用者可能因安全防護不足遭受財損、個資洩漏、乃至生命安全的威脅,因此越來越多產品被要求帶有硬體安全功能。不僅是使用者,晶片開發廠商也面臨供應鏈內外、如know-how被竊取、設計被竄改等風險。如何倚靠晶片信任根保護連網應用運作上的安全因此尤為重要。
資安建構在於密鑰的產生方式、儲存方式、與將密鑰用於安全功能當中。因此,晶片安全的根本技術也同樣圍繞在密鑰的產生與儲存,以及建基於此的認證、加密、完整性、與不可否認性等運作。本講題將會深入剖析晶片安全信任根從硬體層一路延伸至軟體與應用層的保護,並說明如何整合以上重要功能達到極高的安全強度與健全的安全邊界(Security Boundary)。

 

活動議程

論壇議程.png

報名辦法

Talk 1

PUF-From Circuit Implementation to Security Applications

 

With the advancement of technology and increasing security requirements, chip fingerprint -- Physical Unclonable Function (PUF) has once again become a focus. This talk will introduce several kinds of PUF, such as the SRAM-PUF and the quantum tunneling PUF that has released in recent years. Through practical examples, PUF expert Dr. Kent will explain how PUF serves as an important security foundation in specific application fields.

Speaker Profile

Dr. Kent Chuang an engineer at PUFsecurity. He received his PhD in electrical engineering from KU Leuven University in Belgium in 2020 and joined the R&D department of PUFsecurity company in the same year. Prior to joining PUFsecurity, Dr. Zhuang worked as a researcher in the COSIC research group of KU Leuven and the imec research group in Belgium. His PhD research centers around developing highly reliable PUF circuits in CMOS and emerging memory technologies. Dr. Zhuang’s current research areas include hardware root of trust, PUF-based security solutions, and attack/protection technologies for password implementation.

​Download Slide:  PUF-From Circuit Implementation to Security Applications

Talk 2

Chip security requirements, functions and mechanism

 

In addition to algorithm as an important core in chip security, protecting the encryption and decryption keys depends on the secure key storage mechanism. It involves key generation, secure storage, and proper use of keys in algorithms. It also includes operations such as signature authentication required for secure connections, data transmission integrity, data encryption, and data non-repudiation. Our experienced FAE Aken Wang of PUFsecurity will provide an overview of the usage scenarios and mechanisms related to hardware chip security before diving deeper into the topic.

Speaker Profile

Aken Wang is an FAE at PUFsecurity. He has a background in electronic and electrical engineering, and his work in the security field mainly focuses on hardware chip security market analysis and security silicon intellectual property product specification research. On the application side, he is responsible for discussing security silicon intellectual property applications with end customers of various chip applications in IC design. Furthermore, his expertise lies in integrating hardware chip security and design with relevant specifications, trends, and applications of chip security requirements in different markets.

​Download Slide:  Chip security requirements, functions and mechanism

Talk 3

The composition, function, and security operation of the root-of-trust

 

When it comes to chip security, the global consensus is to establish a secure and effective root-of-trust. End users may suffer financial losses, personal information leakage, and even life safety threats due to insufficient security protection. Therefore, more and more products are required to have hardware security functions. Hence, enhancing the operation security of IoT applications by leveraging the chip root-of-trust is particularly important. Our Director of R&D MY Wu will provide an in depth analysis of secure chip root-of-trust from the fundamental hardware layer protection, and discuss how to achieve high security strength and complete security boundary (Security Boundary) with the support of anti-attack digital design.

Speaker Profile

Dr. Meng-Yi Wu is the director of R&D at PUFsecurity. His expertise lies in the technology development of embedded flash memory, OTP memory and physical unclonable functions (PUF) and its derivative security chip design. Prior to joining PUFsecurity, Dr. Wu spent ten years at eMemory. In 2018, his invention, NeoPUF, won the ISSCC Takuo Sugano Award. Dr. Wu currently leads the R&D department of PUFsecurity in focusing on the development of PUF-based hardware root of trust, chip security cooperator and other security function products.

​Download Slide:  The Composition, Function, and Security Operation of the Root-of-Trust

Thanks for visiting!

If you have any questions, you're welcome to contact us through info@pufsecurity.com