PUFsecurity Corp.
PUFsecurity Corp.
  • Видео 92
  • Просмотров 44 215
Silicon-proven NVM & Security Solutions to Support Evolution of Modern Automotive
Rapid developments in connectivity, sensing, and other technologies are proliferating in the automotive industry. Technologies such as AI & ADAS are moving the industry closer to achieving autonomous driving. The tremendous boost of EVs also means more semiconductors are equipped with every new vehicle model from OEMs worldwide.
As more semiconductor components are adopted in modern vehicles, the demand for embedded non-volatile memories (eNVM) increases. From central control, processing platforms, ECU/MCU, and zonal control to display, sensor fusion, powertrain, and transmission system, the collaboration of these various functions helps the leading automotive companies deliver their late...
Просмотров: 87

Видео

PUFsecurity's Fireside Chat with Arm
Просмотров 134Год назад
In today's innovation-driven world, OEMs face formidable challenges in implementing robust security measures amidst fragmented global standards and regulations. We are excited to present an exclusive interview where we discuss and present the solution: Arm Corstone with PUF-based security IP. The integrated solution offers OEMs a revolutionary "secure by design" reference subsystem. It further ...
PUFcc - The Only Crypto Coprocessor Combines Hardware Root of Trust and Full-set Crypto Engine
Просмотров 681Год назад
PUFcc is the only Crypto Coprocessor available today to provide key generation, key storage, and a complete crypto engine as a single drop-in IP block. The Secure Coprocessor builds on the PUFrt’s Hardware Root of Trust with a comprehensive Crypto Accelerator providing Secure Boot, OTA, TLS, and Key Management. PUFcc also includes a complete set of NIST-CAVP-certified and OSCCA-compliant hardwa...
Keeping Digital Assets Safe: PUF-based Security Solutions for Flash Memory
Просмотров 5282 года назад
One of the major problems today is the security concerns of digital assets, especially those stored within non-volatile memory. Flash is a very popular non-volatile memory in consumer electronics, providing highly efficient storage solutions for code, data, etc. However, Flash is still facing threats brought by physical attacks with increasing connectivity. eMemory's subsidiary, PUFsecurity, ha...
PUFsecurity | 3 Years of Startup Achievement (2022) | 熵碼科技3週年回顧影片
Просмотров 4022 года назад
PUFsecurity is turning THREE!! 🎉🎈 Thanks to all the hard work from PUFsecurity team! Thanks to all the support and trust from our partners and clients. We won’t be here without you. “There is a dream, there is a way." said our Chairman Charles Hsu. Let’s secure the connected world with our PUF-based security solutions! #PUFsecurity #happybirthday #companyanniversary
Why Hardware Root of Trust Needs Anti-tampering Design
Просмотров 1,6 тыс.2 года назад
The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity au...
[Joint Webinar] Securing Andes RISC-V with PUFsecurity
Просмотров 3872 года назад
As metaverse took the spotlight in recent CES, it is made possible with advancement in computation and connectivity, which also empower many other aspects of people's lives from IoT, Automotive, and to all kinds of applications around us. While Andes RISC-V has continued to make ways into all applications, security in modern SoC design becomes inevitable. In this joint webinar, PUFsecurity and ...
Securing IoT and Device Onboard Using PUF-based Device Identity
Просмотров 4372 года назад
Nowadays, IoT is has been profoundly impacting our daily living. While we are embracing the convenience brought by the IoT, the underlying security issues may be harmful, and hence security is one major consideration in IoT. Securely identifying devices is usually a prioritized requirement because it is the root of many security features. In a secure device identification scheme, having a uniqu...
PUFacademy | Security 303 | Ch 4-8: PUF-based Coprocessor (II)
Просмотров 3152 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
PUFacademy | Security 303 | Ch 4-7: PUF-based Coprocessor (I)
Просмотров 3302 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
PUFacademy | Security 303 | Ch 4-6: 實體攻擊與防護
Просмотров 2552 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
Solving Chip Security's Weakest Link with PUF-based RoT
Просмотров 2262 года назад
The most crucial element in chip security is the Root Key or Hardware Unique Key(HUK). The key is the starting point not only for protecting each chip but also the chain of trust that encompasses the entire system and associated services. Therefore, key generation, along with its storage and usage, must be well considered from the beginning of the design. With the invention of Physical Unclonab...
PUFacademy | Security 303 | Ch 4-5: 軟體攻擊與防護
Просмотров 2522 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
PUFacademy | Security 303 | Ch 4-4: 公開金鑰密碼系統
Просмотров 4152 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
PUFacademy | Security 303 | Ch 4-3: 對稱式密碼學演算法簡介
Просмотров 4292 года назад
[課程介紹] 熵碼科技為力旺電子之子公司,係致力於利用物理不可複製功能(PUF)發展創新安全解決方案的IP設計公司。基於教育市場的理念,熵碼科技集結內部各領域研發與行銷專長的專家,包括NeoPUF發明者吳孟益博士、以及其領導的團隊,依其專長擔 課程講師。 這門課程分為四大章節,能夠讓你 1) 快速讀懂常見硬體安全標準法規與規範 2) 了解物理不可複製功能(PUF)的種類與應用 3) 掌握各式硬體安全的實踐手法與商用考量 4) 熟悉晶片安全的設計架構、各項功能單元、實現方式、與攻擊/防護手段 每週更新兩集,有興趣的觀眾請訂閱我們的頻道、並開啟小鈴鐺,就不會錯過通知囉!
PUFacademy | Security 303 | Ch 4-2: HASH雜湊演算法簡介
Просмотров 1,2 тыс.2 года назад
PUFacademy | Security 303 | Ch 4-2: HASH雜湊演算法簡介
PUFacademy | Security 303 | Ch 4-1: 晶片安全-以PSA為例
Просмотров 4002 года назад
PUFacademy | Security 303 | Ch 4-1: 晶片安全-以PSA為例
PUFacademy | Security 303 | Ch 3-9: 晶片安全平台解決方案
Просмотров 2582 года назад
PUFacademy | Security 303 | Ch 3-9: 晶片安全平台解決方案
PUFacademy | Security 303 | Ch 3-8: 晶片安全解決方案
Просмотров 7552 года назад
PUFacademy | Security 303 | Ch 3-8: 晶片安全解決方案
PUFacademy | Security 303 | Ch 3-7: 基於PUF技術之硬體安全根密鑰(II)
Просмотров 3152 года назад
PUFacademy | Security 303 | Ch 3-7: 基於PUF技術之硬體安全根密鑰(II)
PUFacademy | Security 303 | Ch 3-6: 基於PUF技術之硬體安全根密鑰(I)
Просмотров 3182 года назад
PUFacademy | Security 303 | Ch 3-6: 基於PUF技術之硬體安全根密鑰(I)
PUFacademy | Security 303 | Ch 3-5: 敏感訊息與密鑰存儲之重要性
Просмотров 2002 года назад
PUFacademy | Security 303 | Ch 3-5: 敏感訊息與密鑰存儲之重要性
PUFacademy | Security 303 | Ch 3-4: 建立硬體信任根(II)
Просмотров 1762 года назад
PUFacademy | Security 303 | Ch 3-4: 建立硬體信 根(II)
PUFacademy | Security 303 | Ch 3-3: 建立硬體信任根
Просмотров 2272 года назад
PUFacademy | Security 303 | Ch 3-3: 建立硬體信 根
PUFacademy | Security 303 | Ch 3-2: 硬體安全之重要性(II)
Просмотров 2042 года назад
PUFacademy | Security 303 | Ch 3-2: 硬體安全之重要性(II)
PUFacademy | Security 303 | Ch 3-1: 硬體安全之重要性(I)
Просмотров 3302 года назад
PUFacademy | Security 303 | Ch 3-1: 硬體安全之重要性(I)
PUFrt - Solving Chip Security's Weakest Link with PUF-based Root of Trust
Просмотров 7472 года назад
PUFrt - Solving Chip Security's Weakest Link with PUF-based Root of Trust
PUFacademy | Security 303 | Ch 2-9: PUF-based硬體信任根(II)
Просмотров 2832 года назад
PUFacademy | Security 303 | Ch 2-9: PUF-based硬體信 根(II)
PUFacademy | Security 303 | Ch 2-8: PUF-based硬體信任根(I)
Просмотров 3702 года назад
PUFacademy | Security 303 | Ch 2-8: PUF-based硬體信 根(I)
PUFacademy | Security 303 | Ch 2-7: PUF的功能與應用(II)
Просмотров 4192 года назад
PUFacademy | Security 303 | Ch 2-7: PUF的功能與應用(II)

Комментарии

  • @AndersonSilva-dg4mg
    @AndersonSilva-dg4mg 2 месяца назад

    Add English subs, plz.

  • @user-yu1se2lu4h
    @user-yu1se2lu4h 3 месяца назад

    您好,想請問可以提供ppt 作為學習用途嗎? 我是大學生,目前對puf 有興趣

  • @ellypark7557
    @ellypark7557 5 месяцев назад

    🎉

  • @petercheung63
    @petercheung63 8 месяцев назад

    老師講得很好。多謝

  • @olicui3139
    @olicui3139 Год назад

    hi, would you mind share name of the mentioned paper related to the video? the ISSCC 2018 best paper?

  • @benjamindunn1298
    @benjamindunn1298 2 года назад

    🌹 𝓟Ř𝔬𝓂𝔬𝐒ϻ

  • @kekejann
    @kekejann 2 года назад

    11:31 講者說的內容跟PPT上的內容對不起來,PPT中的Data Integrity 跟 Non-repudiation兩個應該寫反了?

    • @rickiechang7931
      @rickiechang7931 Год назад

      是的,講者說的是對的,但是投影片上的放錯了。

  • @adeliolima7224
    @adeliolima7224 2 года назад

    I was researching about PUF at the end of my assignment or thesis, the video was quite helpful for me to understand about PUF

  • @goodstock8888
    @goodstock8888 2 года назад

    感謝 再請教 如果用NIST GIT 上的tool 跑出IID pass 可以代表RNG亂數夠亂嗎? 是符合800-90B的規格? 如果是IID fail 是表示non-IID的意思是嗎? 謝謝

  • @saegchen5624
    @saegchen5624 2 года назад

    ความเคลื่อนไหงวของคนร้าย

  • @saegchen5624
    @saegchen5624 2 года назад

    ปกป้องทรัพย์สิน

  • @goodstock8888
    @goodstock8888 2 года назад

    請教一下 100萬筆資料 指的是要100萬筆byte 還是bit呢? 感謝

    • @PUFsecurity
      @PUFsecurity 2 года назад

      如果您是問SP800-90B的最小輸入要求,那麼是至少100萬"bit"喔! 不過多給是有機會讓分析出來的min-entropy更貼近實際狀況一點。 順帶一提,SP800-90B分析都是以100萬bit為單位,所以要以100萬bit的倍數去給入輸入資料大小, 否則不足100萬bit的部分都會被直接忽略掉喔。 希望有解答到您的問題 : )

    • @goodstock8888
      @goodstock8888 2 года назад

      @@PUFsecurity 再請教一下 如果亂數出現的型態是以byte表示 那我需要由byte改為bit的型式嗎? 像是我的亂數有 0x12 ,我要把它轉換成 00 00 00 01 00 00 01 00 這樣後存入bin檔 用這樣的data進入tool中驗證,是這樣嗎? 目前我是使用 SP800-90B_EntropyAssessment NIST官方提供的工具 對於輸入的data格式有些疑惑 謝謝 感謝

    • @PUFsecurity
      @PUFsecurity 2 года назад

      @@goodstock8888 SP800-90B的其中一個輸入格式確實是如你所說的轉換規則 決定data輸入格式的是bits_per_symbol 這個變數 當你把bits_per_symbol設定為1時 轉換的格式就會如你所說的例子喔

  • @previll
    @previll 2 года назад

    if only this was in English

  • @sophia1420
    @sophia1420 2 года назад

    27:28 how

  • @Wayne-bx9qe
    @Wayne-bx9qe 2 года назад

    這部影片的標題應該是誤值了,應該是「PUFacademy | Security 303 | Ch1-9: 英國 DCMS 實踐準則簡介」才對。 碩班研究剛好需要自修硬體安全的知識,感謝熵碼科技佛心提供優質教育資源!

    • @PUFsecurity
      @PUFsecurity 2 года назад

      謝謝Wayne的提醒! 標題已修改! 也謝謝你留言讓我們知道這系列影片對你有幫助:)

  • @user-zl2iv9sq6b
    @user-zl2iv9sq6b 2 года назад

    有没有联系方式?

    • @PUFsecurity
      @PUFsecurity 2 года назад

      您好,有任何问题都欢迎写信到 info@pufsecurity.com,谢谢您!

  • @alanlee5448
    @alanlee5448 2 года назад

    您好,非常棒的分享! 請問在NIST "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications"中的第4.2.2節中,有提到至少需要55條sequences才能保證P value的uniformity,請問NeoPUF在Universal、Linear Complexity、Random Excursions、Random Excursions Variant的 bit streams為3條,是否足夠?

  • @user-dt4ed3lg3n
    @user-dt4ed3lg3n 2 года назад

    讲解的很棒

  • @normanhuang3358
    @normanhuang3358 2 года назад

    Thanks for the video. What does SQC stand for?

    • @PUFsecurity
      @PUFsecurity 2 года назад

      Hi Norman, thanks for the message! SQC is a sequencer, so PUFiot does not need a processor or boot ROM. BTW, we renamed the product as PUFcc. You're welcome to visit the production intro webpage if you have interests. www.pufsecurity.com/pufcc

    • @normanhuang3358
      @normanhuang3358 2 года назад

      @@PUFsecurity I got it. Thank you very much.

  • @wa-people1707
    @wa-people1707 2 года назад

    晶片指紋,重要的技術!

  • @wa-people1707
    @wa-people1707 2 года назад

    晶片指紋,重要的技術!!

  • @yulingkang199
    @yulingkang199 3 года назад

    Hi,I downloaded the pdf from the Pufsecurity website, but the password which the website gives doesn't working. Other chapter pdf files with that password are all ok except ch3-3 pdf. Could you update it? thanks a lot.

    • @PUFsecurity
      @PUFsecurity 2 года назад

      Hi Yuling, Sorry for the late reply. We fixed the password issue and update the file. Please try to download the handout again. Thank you! blog.pufsecurity.com/wp-content/uploads/2022/03/Ch3-3-Introduction-to-Asymmetric-key-Algorithm.pdf

  • @ellypark7557
    @ellypark7557 3 года назад

    Great!!

  • @chungminghsieh9771
    @chungminghsieh9771 3 года назад

    講的非常好, 謝謝. 不過對我來說有個小缺憾點 就是這些視頻的外部有著不斷重複變化的圖案, 會突然的閃爍一下, 有點讓我分心, 謝謝.

    • @PUFsecurity
      @PUFsecurity 3 года назад

      謝謝您的觀看!也感謝您提出您的感受,未來我們的版面設計會去做調整:)

  • @claytonroy9826
    @claytonroy9826 3 года назад

    Bitcoin is the future of crypto and the questions traders ask themselves now is if this is right time to invest? before jumping into conclusion i think you should take a look at things first. for the past few days the price of BTC has been fluctuating which means the market is currently unstable and you cant tell if it is going bearish or bullish.While others still continue to trade without the fear of making losses, others are being patient. it all depends on the pattern with which you trade with and also the source of your signals. I would say trading has been going smoothly for me after accumulating over 8.5 BTC in just two weeks, with the trading strategy given to me by Mr Luis His methods are top notch and profitable and he can be contacted easily on Telegram @LuisT62 cheers.

  • @石國標
    @石國標 3 года назад

    已經打開了,謝謝

    • @PUFsecurity
      @PUFsecurity 3 года назад

      太好了,謝謝您的支持! 有任何建議都歡迎回覆給我們!

  • @石國標
    @石國標 3 года назад

    有電話可以聯絡?如果有問題要請教...

    • @PUFsecurity
      @PUFsecurity 3 года назад

      抱歉晚回覆,以後有任何問題歡迎聯繫李小姐,電話: 03-560-1010 #2102

  • @石國標
    @石國標 3 года назад

    演講文件檔下載後需要密碼,要如何申請?影音檔講稿看不清楚,謝謝

    • @PUFsecurity
      @PUFsecurity 3 года назад

      您好,抱歉晚回覆! 講亦可以到我們的部落格下載: blog.pufsecurity.com/2019/11/14/introduction-to-hardware-security-%e7%a1%ac%e9%ab%94%e5%ae%89%e5%85%a8%e5%b0%8e%e8%ab%96/ 在文末有email和姓名欄位,只要留下資料按submit送出,按鈕旁馬上就會出現講義密碼囉! 關於內容的問題,歡迎寫信至info@pufsecurity.com做詢問喔! 我們會針對您的問題,安排合適的人做解說,謝謝您!

    • @石國標
      @石國標 3 года назад

      @@PUFsecurity 我還是不會得到正確的密嗎?友那個電話可請教一下嗎?0931138199

    • @石國標
      @石國標 3 года назад

      “ PUFsecurity @ Academy” 式密碼嗎? copy 過去 說密碼錯誤

  • @raymondhernandez
    @raymondhernandez 4 года назад

    👊👊👊

  • @calvin8766
    @calvin8766 4 года назад

    Nice channel! About to subscribe! By the way, go and search for smzeus . c o m!! Really think that it could help you grow your channel quicker!!!