Hardware Security gains unprecedented attention

Cybersecurity : Unconditionally important
             Undeniably, Cyber Security has become a buzzword of 21st century. An enterprise needs to look at the security in multiple dimensions to secure their resources.  As systems become more heterogeneous with the introduction of programmable fabric, general purpose processors, real time processors and graphical processors in one platform, vulnerability of the design also increases at multiple levels. Black hat hackers gain access to the system through multiple weak-entry points like an unnoticed bug in software application, vulnerabilities in kernel configuration, or even unnoticed unencrypted data transmission between multiple chips in a system.

Trend : Gradual Shift to offloading work to Hardware
            Enterprises are moving towards hardware implementation of algorithms for acceleration in computation and decision making. Hardware accelerators improve the execution of a specific algorithm by allowing greater concurrencies. Defense companies are also extensively opting for hardware implementation, primarily due to security reasons. Recent developments in EDA tools have also made it easy even for software developers to write programs in System C, C or C++ to directly target programmable devices without the need to manually create RTL. We are also witnessing a fast-paced improvement in network connectivity, which was a bottleneck in system design. Many similar factors are pushing the hardware based implementations at an extremely faster pace.

Hardware Implementation Challenges
            While hardware implementations eliminate a considerable number of software vulnerabilities, they are still prone to various side channel attacks like power analysis attacks, timing information attacks, and probing attacks. Hence, companies that offload an increasing number of computation tasks to hardware are exploring various solutions for hardware security. Counterfeiting, Tampering, Invasive Fault Injection and Non-Invasive probing are a few of the challenges designers need to address. Predicting the secret keys used by a system for trust and authentication through multiple methods like bus snooping, network sniffing and memory leakage is problematic in the cyber-world today.

Solutions Enthentica Offers  
            Companies from a broad range of business sectors recognize and now emphasize hardware security extensively. They are providing IIoT (Industrial Internet of Things) solutions, defense solutions, critical infrastructure solutions, automotive solutions and more. Providing a single solution to address multiple security challenges has been sought for a number of years. Physical Unclonable Functions (PUFs) provide the most secure means of addressing the market requirements.  By leveraging the manufacturing variations of a chip, PUFs support identity protection with dynamic key generation for trusted systems and authentication to prevent counterfeiting and tampering Enthentica, a leader in PUF technology announced at the HOST conference in May of this year that its newest Hardware-Embedded Delay PUF - HELP KG is now available. Please watch for our up-coming newsletters covering related topics on hardware security challenges and solutions.

Click here to sign up to receive news and updates from Enthentica.