AT Feature Implementation as Information Assurance

This is a slight sneak-preview of the presentation submitted by CPU Tech to the Department of Defense Anti-Tamper Conference happening this week. This overview is provided with no sensitive or proprietary information.

Another disclaimer as well: CPU Tech may change our presentation topic and content for this conference at the request of the conference hosts. If you are attending the conference, please stay tuned~

One of the conference themes this year is ‘Navigating the Technology Transition Gap’, or getting theoretical anti-tamper and software protection technologies into manufacturing flows and into the ‘field’. In light of this, one of the key transition technologies for the Acalis Secure Processor is the implementation of anti-tamper features in final systems.

As key software, encryption key, and other critical program information protection features are shrunk onto silicon die and integrated into Systems-on-a-Chip, implementing and verifying the anti-tamper settings becomes more difficult. Ensuring that thresholds, responses, and ‘traps’ are set is not going to be something visible to the naked eye, nor a simple quality assurance step for an untrained individual.

Ensuring the correct and final implementation of anti-tamper features becomes a very sophisticated design flow problem. In other words, it is not sufficient to design and provide customers with a secure processor — for true security, a complete assured and trusted design flow is the only way to provide security end solutions.

CPU Tech will be presenting a little bit about the secure design flow requirements and solutions necessary to provide configuration assurance to users of the secure processor. These solutions are centered around the Acalis Sentry Security Server, but also include processes and procedures surrounding the Acalis dedicated software development kit available for users.

Details of these solutions, unfortunately, are not available for public scrutiny, so prospective users will need to contact us for additional details. This screening is necessary in order to protect our Government and Federal customers, and their requirements to limit technology exposure in anti-tamper systems.

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s