5/16 (Thu.) 10:30 - 11:00 4F AIoT & Hardware Security Zone

The Role of Hardware Security in the Trust Chain and How it Supports AIoT Applications Resist Attacks.

Emerging security risks limit the Internet of Things' potential. The fundamental way to solve this problem is to combine the advantages of the most secure hardware, software, and operating system solutions to create an interlocking security ecosystem.

PUFsecurity developed a series of chip-level hardware security solutions based on the patented Physical Unclonable Function (PUF), including the hotly discussed hardware root of trust and the indispensable crypto coprocessor. We use the unique secret generated by PUF to develop robust technologies such as key management, encryption and decryption, authentication, and anti-tamper technologies and wrap them into a highly integrated IP that is easy to deploy and use, protecting and connects the entire security operation ecosystem from the hardware level.

In this speech, we will gradually explain the role of hardware security, that is, chip security, in the entire information security trust chain, and then explain the technology, operation, and critical designs against attacks.

Connie Chen
SPEAKER
Technical Marketing Manager
PUFsecurity Corporation

TOPIC / TRACK
AIoT & Hardware Security Summit

LOCATION
Taipei Nangang Exhibition Center, Hall 2
4F AIoT & Hardware Security Zone

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Hardware Security
Zero Trust Architecture
IoT Security