Security IP: CyberCPU

Secure-IC provide Chip Security Protection IP Cores: Cryptographic algorithm IP such as AES, DES, 3-DES, ECC, RSA, SM2, SM3, SM4, SHA1, SHA2, SHA3, HMAC, countermeasure IP such as TRNG, CTR-DRBG RNG, Digital Sensor, Active Shield, PUF, Smart Monitor, Scrambled Bus, Memory Ciphering, Cyber CPU, Secure Clock, Secure Book, Secure Monitor, Secure JTAG, etc.

Security IP: CyberCPU

CPU-agnostic Cyber Attack Sensor, Fully Digital. Work with all kings of other CPU. Not a CPU.


Product Details

Security IP CyberCPU:

1. GLOBAL OVERVIEW
The CyberCPU comprises technologies for detecting cyber-attacks targeted to hijack and take the control of the CPU. Cyber-attacks covered by the CyberCPU technologies include the alteration of the program's control flow and memory corruption. CyberCPU technologies are available as portable security features to be integrated in a targeted CPU architecture or as a ready to use IP Core. 
The security features provide anomalies detection capabilities that trigger alarms in the form of security exceptions.
Properties
• Hardware-enabled cyber-security
• Just-in-time cyber-attack detection
Availability
• Portable security features for other CPU architectures
• Ready to use CyberCPU IP core

About Secure-IC Security IP Cores

Secure-IC provide various security IP cores as following list (keep updating).

AESEncryption, against Side-Channel Attacks
DES / 3-DESEncryption, against Side-Channel Attacks
RSAEncryption, against Side-Channel Attacks
ECCEncryption, against Side-Channel Attacks
HASH (SHA-1/MD-5)Encryption, against Side-Channel Attacks
SM2Encryption, against Side-Channel Attacks
SM3Encryption, against Side-Channel Attacks
SM4Encryption, against Side-Channel Attacks
TRNGTrue Random Number Generator,Digital,against Harmonic EM Attacks
PUFDigital, Anti Cloning/Counterfeiting,100% Unique, Random and Steady ID Generation
Digital Sensor Anti Fault Injection Attacks, All-in-one Fault Injection Detector, Entirely Digital
Active ShieldActive Protection against Intrusive Attacks on ASIC, Anti Intrusive Hardware Modification.
Scrambled BUSEncrypted Information to Prevent Probing on BUS, Anti Eavesdroping
Memory CipheringMemory Protection Against Reverse Engineering and Tampering
Secure ClockAnti Synchronization to prevent efficient SCA and FIA
Secure JTAGAuthentication System to Secure the debugging channel on chip, Anti JTAG Violation
Secure BootMaximum security-enabling root-on-trust, Anti Firmware Tampering
Secure MonitorMaximum security-enabling monitoring, Security policy bypass
CyberCPU CPUCPU-agnostic Cyber Attack Sensor


Request a Quote

Current Products:Security IP: CyberCPU

  • I have carefully read and agree toPrivacy Statement

  • I agree to receive the Newsletters from Elbe Technologies

  • Submit