{"id":1980,"date":"2021-06-10T17:16:00","date_gmt":"2021-06-10T17:16:00","guid":{"rendered":"https:\/\/www.pufsecurity.com\/?p=1980"},"modified":"2023-01-03T06:08:35","modified_gmt":"2023-01-03T06:08:35","slug":"ememory-and-pufsecurity-join-darpa-toolbox-initiative","status":"publish","type":"post","link":"https:\/\/www.pufsecurity.com\/zh-hant\/ememory-and-pufsecurity-join-darpa-toolbox-initiative\/","title":{"rendered":"eMemory and PUFsecurity Join DARPA Toolbox Initiative"},"content":{"rendered":"\n

(Hsinchu Taiwan, June 8th<\/sup>, 2021) eMemory, the world\u2019s leading supplier of intellectual property for NVM and security solutions at the semiconductor level, and its subsidiary, PUFsecurity, today announced a partnership agreement with the\u00a0U.S. Defense Advanced Research Projects Agency (DARPA)<\/a>\u00a0to enable furthering of accelerated technology innovation for the agency\u2019s programs.<\/p>\n\n\n\n

The agreement makes eMemory\u2019s NeoFuse, NeoPUF and the advanced, integrated PUF-based security IP of its subsidiary, PUFsecurity, especially in advanced semiconductor process nodes, available to the researchers behind DARPA programs. They can now avail themselves of the integration of PUF, OTP, trng and other essentials found in PUFsecurity\u2019s flagship security solutions which have been proven popular with chip designers, and are likewise well suited for the mission-critical applications and conditions often faced by DARPA\u2019s researchers. Designers will find integration of anti-tampered Root of Trust to be fast and easy.<\/p>\n\n\n\n

eMemory\u2019s patented PUF (Physical Unclonable Function) technology uses micro variations and characteristics produced during the fabrication of a chip to create an inherent fingerprint. Like human fingerprints, each PUF is unique and cannot be simulated, copied or changed. eMemory\u2019s PUF is an ideal form of reliable identification that has been widely used for a root of trust, generation of secret keys, digital signatures and other security applications.<\/p>\n\n\n\n

With NeoPUF and PUF-based solutions, chip designers can generate truly random sequences for applications with high security requirements. Inherent radiation hardness and superior hamming weight and hamming distance without the need for pre- and post-processing, add to the attributes.<\/p>\n\n\n\n

In addition to PUF solutions, eMemory\u2019s NeoFuse will be included in this program. eMemory\u2019s NeoFuse is a small-form factor non-volatile memory technology with the advantages of low-power operation, high reliability and strong security.<\/p>\n\n\n\n

\u201cThis latest partnership agreement with DARPA adds to the increasing global recognition of our security solutions,\u201d said Rick Shen, President at eMemory. \u201cWe anticipate that more companies and organizations will adopt chip-level security as the strongest safeguard of electronic systems at this time when cybersecurity issues continue unabated worldwide.\u201d<\/p>\n\n\n\n

The DARPA Toolbox<\/a> initiative is an agency-wide effort to provide open licensing opportunities with commercial technology vendors to the researchers behind DARPA programs. Through DARPA Toolbox, defense contractors will receive greater access to commercial vendors\u2019 technologies and tools via pre-negotiated, low-cost, non-production access frameworks and simplified legal terms. For commercial vendors, DARPA Toolbox will provide an opportunity to leverage the agency\u2019s forward-looking research and a chance to develop new revenue streams based on programmatic achievements developed with their technologies.<\/p>\n\n\n\n

\u201cWith eMemory joining DARPA\u2019s Toolbox Initiative we are adding OTP (one time programmable) memories and unique identity enabling PUF (physical unclonable function)- related security solution IP\u2019s.\u201d said Serge Leef, Program Manager, leading DARPA Toolbox. \u201cOur researchers can use these IPs to accelerate development for their projects.\u201d<\/p>\n\n\n\n

eMemory is among a select group of technology companies that have engaged in partnership under DARPA Toolbox.<\/p>\n\n\n\n


\n\n\n\n

\u71b5\u78bc\u79d1\u6280\u8207\u529b\u65fa\u96fb\u5b50\u5408\u4f5c\u958b\u767c\u5168\u65b9\u4f4d\u786c\u9ad4\u5b89\u5168\u89e3\u6c7a\u65b9\u6848<\/h3>\n\n\n\n

(\u53f0\u7063\u65b0\u7af9,2021<\/strong>\u5e74<\/strong>6<\/strong>\u6708<\/strong>17<\/strong>\u65e5<\/strong>)<\/strong> \u53f0\u7063\u786c\u9ad4\u5b89\u5168IP\u4f9b\u61c9\u5546\u71b5\u78bc\u79d1\u6280\u806f\u624b\u5176\u6bcd\u516c\u53f8\u529b\u65fa\u96fb\u5b50\uff0c\u6191\u85c9\u786c\u9ad4\u5b89\u5168IP\u6280\u8853\u7372\u5f97DARPA (Defense Advanced Research Projects Agency)\u8a8d\u53ef\uff0c\u65d7\u4e0b\u591a\u9805\u7522\u54c1\u7372DARPA \u63a1\u7528\u5217\u5165Toolbox \u4f9b\u61c9\u93c8\uff0c\u672a\u4f86\u5c07\u9032\u4e00\u6b65\u53c3\u8207DARPA\u63a8\u52d5\u4e4b\u591a\u9805\u5b89\u5168\u67b6\u69cb\u767c\u5c55\u8a08\u5283\u3002<\/p>\n\n\n\n

\u529b\u65fa\u96fb\u5b50\u6240\u7814\u767c\u4e4bNeoFuse (One-Time Programmable Memory; OTP) \u548cNeoPUF (Physical Unclonable Function; PUF) \u4e43\u786c\u9ad4\u5b89\u5168\u5132\u5b58\u53ca\u7522\u751f\u5bc6\u9470\u6240\u9700\u4e4b\u57fa\u77f3\u3002\u800c\u71b5\u78bc\u79d1\u6280\u5229\u7528\u529b\u65fa\u96fb\u5b50\u4e4bOTP\u53caPUF\u958b\u767c\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839PUFrt\u4ee5\u53ca\u786c\u9ad4\u5b89\u5168\u8655\u7406\u5668PUFiot\uff0c\u5728\u786c\u9ad4\u5b89\u5168\u6700\u91cd\u8981\u7684\u95dc\u9375\u6280\u8853\u4e0a\u8de8\u51fa\u5275\u65b0\u7684\u4e00\u6b65\u3002<\/p>\n\n\n\n

\u71b5\u78bc\u79d1\u6280\u4e0d\u65b7\u62d3\u5c55\u3001\u5275\u65b0PUF\u61c9\u7528\uff0c\u5229\u7528\u6b64\u7368\u7279\u4e14\u4e0d\u53ef\u8907\u88fd\u7684\u300c\u6676\u7247\u6307\u7d0b\u300d\u6280\u8853\uff0c\u958b\u767c\u51fa\u517c\u5177\u539f\u751f\u786c\u9ad4\u6307\u7d0bPUF\u3001\u5b89\u5168\u5b58\u5132OTP\u3001\u9ad8\u54c1\u8ceatRNG\uff08\u771f\u4e82\u6578\u7522\u751f\u5668\uff09\u3001\u65b9\u4fbf\u7cfb\u7d71\u6574\u5408\u7684\u63a7\u5236\u5668\u8207\u7cfb\u7d71\u63a5\u53e3 (APB)\u3001\u8207\u5168\u65b9\u4f4d\u7684\u9632\u7ac4\u6539\u8a2d\u8a08\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839IP –PUFrt\uff0c\u70ba\u5e02\u5834\u5e36\u4f86\u6613\u6574\u5408\u3001\u6027\u50f9\u6bd4\u9ad8\u7684\u786c\u9ad4\u5b89\u5168\u65b9\u6848\u9078\u64c7\u3002PUFiot\u5247\u662f\u5728\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839\u6280\u8853\u4e0a\u7d0d\u5165\u52a0\u5bc6\u6f14\u7b97\u6cd5\u5354\u52a9\u5ba2\u6236\u52a0\u901f\u8a2d\u8a08\u6574\u5408\uff0c\u53ef\u642d\u914dCPU\u6838 (\u5982RISC-V)\uff0c\u626e\u6f14\u5b89\u5168\u5354\u540c\u8655\u7406\u5668\u89d2\u8272\u4f86\u57f7\u884c\u61c9\u7528\u7a0b\u5f0f\u6240\u9700\u5b89\u5168\u529f\u80fd\uff0c\u5be6\u73fe\u5168\u65b9\u4f4d\u7684\u5b89\u5168\u4e2d\u592e\u8655\u7406\u5668\u3002<\/strong><\/p>\n\n\n\n

DARPA\u4e3b\u8981\u8ca0\u8cac\u958b\u767c\u7528\u65bc\u570b\u9632\u61c9\u7528\u4e4b\u65b0\u6280\u8853\uff0c\u5176\u8ca0\u8cac\u7684\u5c08\u6848\u5206\u5225\u7531\u4e03\u500b\u8fa6\u516c\u5ba4\u4f86\u57f7\u884c\uff0c\u8fd1\u5e7e\u5e74\u6301\u7e8c\u63a8\u52d5\u786c\u9ad4\u5b89\u5168\uff08Hardware security\uff09\u7684\u8a08\u756b\u5373\u7531\u5176\u4e2dMicrosystem Technology Office (MTO)\u8ca0\u8cac\u57f7\u884c\uff0c\u76f8\u95dc\u8a08\u756b\u5982\u4e0b\uff1a<\/p>\n\n\n\n

  1. Supply Chain Integrity for Electronics Defense (SHIELD)
    \u65e8\u5728\u5efa\u7acb\u5b89\u5168\u4f9b\u61c9\u93c8\uff0c\u9632\u6b62\u76dc\u7248\u6676\u7247\u6216\u662f\u672a\u7d93\u8a8d\u8b49\u7684\u6676\u7247\u9032\u5165\u786c\u9ad4\u7cfb\u7d71\u8a2d\u5099\u3002<\/li>
  2. System Security Integration Through Hardware and Firmware (SSITH)
    \u76ee\u6a19\u70ba\u958b\u767c\u786c\u9ad4\u7684\u5b89\u5168\u67b6\u69cb\u4e26\u7d50\u5408\u8edf\u9ad4\u4ee5\u63d0\u5347\u7cfb\u7d71\u6574\u9ad4\u5b89\u5168\uff0c\u9632\u6b62\u99ed\u5ba2\u5f9e\u9060\u7aef\u7834\u58de\u3002\u540c\u6642\u4ea6\u958b\u767c\u8a55\u4f30\u5de5\u5177\u4f86\u6e2c\u8a66\u6240\u63d0\u7684\u786c\u9ad4\u5b89\u5168\u67b6\u69cb\u662f\u5426\u6709\u6548\u3002<\/li>
  3. Automatic Implementation of Secure Silicon (AISS)
    \u4e3b\u8981\u4efb\u52d9\u70ba\u958b\u767cEDA tool\uff0c\u76ee\u6a19\u5728\u8a2d\u8a08\u968e\u6bb5\u5373\u80fd\u6aa2\u8996\u53ef\u80fd\u88ab\u99ed\u7684SoC\u8a2d\u8a08\u6f0f\u6d1e\uff08\u5982\u690d\u5165\u6728\u99ac\u6216\u662f\u932f\u8aa4\u8a0a\u865f\uff09\u4e26\u8003\u91cf\u9632\u79a6\u5c0d\u7b56\u3002<\/li>
  4. Asset Management Infrastructure (AMI)
    \u65e8\u5728\u7522\u54c1\u751f\u547d\u9031\u671f\u5b89\u5168\u7ba1\u7406\uff08Product lifecycle security management\uff09\u7684\u958b\u767c\uff0c\u7d50\u5408\u5340\u584a\u93c8\u6280\u8853\u4f86\u9054\u5230\u7ba1\u7406\u5bc6\u9470\u3001\u7c3d\u7ae0\u3001\u8a8d\u8b49\u5b89\u5168\u653f\u7b56\u4ee5\u53ca\u8cc7\u6599\u8ffd\u8e64\uff0c\u4f86\u78ba\u4fdd\u6676\u7247\u5728\u6574\u500b\u7522\u54c1\u751f\u547d\u9031\u671f\u5167\u7684\u5b89\u5168\u3002<\/li><\/ol>\n\n\n\n

    \u71b5\u78bc\u79d1\u6280\u548c\u529b\u65fa\u96fb\u5b50\u7684OTP\u3001PUF\u3001PUFrt\uff08\u786c\u9ad4\u5b89\u5168\u4fe1\u4efb\u6839\uff09\u53caPUFiot\uff08\u786c\u9ad4\u5b89\u5168\u8655\u7406\u5668\uff09\u7b49\u5275\u65b0IP\u80fd\u5f37\u5316\u667a\u6167\u9023\u7db2\u4e16\u4ee3\u6240\u9700\u7684\u786c\u9ad4\u5b89\u5168\u67b6\u69cb\u3001\u5be6\u73fe\u6574\u5408\u89e3\u6c7a\u65b9\u6848\uff0c\u5354\u52a9\u5ba2\u6236\u63d0\u5347\u7522\u54c1\u9632\u507d\u80fd\u529b(anti-counterfeit)\u3001\u9632\u6b62\u8d85\u91cf\u751f\u7522(anti-overproduction) \u4ee5\u53ca\u5f37\u5316\u6574\u9ad4\u751f\u547d\u9031\u671f\u4e2d\u7684\u5b89\u5168\u7ba1\u7406\uff0c\u56e0\u800c\u53d7DARPA\u80af\u5b9a\u3002\u672a\u4f86\u5c07\u9032\u4e00\u6b65\u53c3\u8207DARPA\u63a8\u52d5\u4e4b\u5b89\u5168\u67b6\u69cb\u767c\u5c55\u8a08\u5283\uff0c\u5305\u62ec\u4f9b\u61c9\u93c8\u7684\u5b89\u5168 \uff08SHIELD Program\uff09\u3001\u786c\u9ad4\u5b89\u5168\u7684\u65b0\u67b6\u69cb\uff08SSITH\/AISS Program\uff09\u3001\u8cc7\u7522\u7ba1\u7406\u67b6\u69cb \uff08AMI Program\uff09\u7b49\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"

    The agreement makes NeoFuse, NeoPUF and PUF-based security IPs available to the researchers behind DARPA programs.<\/p>\n","protected":false},"author":3,"featured_media":1871,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[217,26,36],"class_list":["post-1980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-crypto-coprocessor","tag-puf","tag-root-of-trust"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1980"}],"collection":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/comments?post=1980"}],"version-history":[{"count":7,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1980\/revisions"}],"predecessor-version":[{"id":4694,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/posts\/1980\/revisions\/4694"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media\/1871"}],"wp:attachment":[{"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/media?parent=1980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/categories?post=1980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pufsecurity.com\/zh-hant\/wp-json\/wp\/v2\/tags?post=1980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}