Analog IP for low-power, SoC physical attack mitigation

September 24, 2020 //By Jean-Pierre Joosting
Analog IP for low-power, SoC physical attack mitigation
IP specifically designed to aid in physical attack mitigation, such as fault injection, in SoC applications, especially in the IoT field.

Vidatronic, Inc., has announced an addition to its low-power analog IP portfolio, the 22 nm Series, to mitigate physical attack techniques, such as fault injection, in ASIC and systems on a chip (SoC) applications. Leveraging Vidatronic’s 22 nm IP will enable customers to achieve unparalleled levels of performance, security, and reliability while minimizing cost. With nearly a decade of experience delivering advanced analog and power management IP solutions globally, this new IP strengthens the company’s position as a leader in innovative analog technologies in advanced processes.

Vidatronic recently entered into a partnership with Open Five, a self-contained custom silicon business unit of SiFive that offers customizable and differentiated SoC IP. As a partner, Open Five now offers Vidatronic’s analog IP alongside their own to enhance their portfolio for segment-specific silicon based on optimized processor and SoC IP targeted to customers’ requirements.

“As physical security attacks on SoCs become more prevalent, it has become increasingly important to implement technology within the chip aimed to prevent these types of threats,” said Moises Robinson, Vidatronic President and Co-Founder. “Some physical security attacks involve perturbation techniques used to cause unintended behavior of the silicon. These techniques, like fault injection attacks that involve voltage and clock manipulation, can often be prevented by using hardware-security cores. Vidatronic’s 22 nm IP Series was specifically designed to aid in physical attack mitigation on SoCs.”

See also: Virtualised 5G security protects subscribers at the network level
See also: Security platform protects 5G private networks and edge IoT
See also: Researchers create tool to find Bluetooth cyber vulnerabilities

Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.