WP_Term Object
(
    [term_id] => 20510
    [name] => Secure-IC
    [slug] => secure-ic
    [term_group] => 0
    [term_taxonomy_id] => 20510
    [taxonomy] => category
    [description] => 
    [parent] => 97
    [count] => 10
    [filter] => raw
    [cat_ID] => 20510
    [category_count] => 10
    [category_description] => 
    [cat_name] => Secure-IC
    [category_nicename] => secure-ic
    [category_parent] => 97
)
            
Banniere SIC SemiWiki V2
WP_Term Object
(
    [term_id] => 20510
    [name] => Secure-IC
    [slug] => secure-ic
    [term_group] => 0
    [term_taxonomy_id] => 20510
    [taxonomy] => category
    [description] => 
    [parent] => 97
    [count] => 10
    [filter] => raw
    [cat_ID] => 20510
    [category_count] => 10
    [category_description] => 
    [cat_name] => Secure-IC
    [category_nicename] => secure-ic
    [category_parent] => 97
)

Secure-IC Presents AI-Powered Cybersecurity

Secure-IC Presents AI-Powered Cybersecurity
by Mike Gianfagna on 05-29-2024 at 10:00 am

Secure IC Presents AI Powered Cybersecurity

Design & Reuse held its IP-SoC Silicon Valley 24 event on April 25th, 2024, at the Hyatt Regency Santa Clara. The agenda was packed with many relevant and compelling presentations from companies large and small. I attended one presentation on security that stood out for me. Secure-IC presented “AI-powered cybersecurity: Securyzr™ Intrusion Detection System (IDS)”. The presentation discussed a comprehensive approach to system security that includes both hardware and software. The addition of AI makes it even more potent. Security is a growing issue in our industry, and we need more focus on the problem. I’ll review one example of this needed focus as Secure-IC presents AI-powered cybersecurity.

Presentation Overview

Yathiendra Vunnam
Yathiendra Vunnam

Yathiendra Vunnam gave the presentation. He is a Field Application Engineer at Secure-IC.  This allows him to participate in Secure-IC’s development in the United States in various verticals such as automotive, semiconductor, defense, space, and IoT.  He holds an MS degree in Cybersecurity from Georgia Institute of Technology, so security is something he has a passion for.

His presentation began with a description of the problem and the mission of Secure-IC:

IoT devices being interconnected, each and every object could be a threat for the whole network. Therefore, the security of the objects or the devices with their lifecycle management is key, and so is their data. To ensure the integrity of this data, the whole system must be secured and managed. Trusted devices enable trusted data.

Secure-IC partners with its clients to provide them with the best end-to-end cybersecurity solutions for embedded systems and connected objects, from Chip to Cloud

The “punch line” of this statement in the presentation is the graphic at the top of this post. Sercure-IC is a unique company that provides a wide array of security solutions. You can get a feeling for the breadth of the company’s impact here.

Intrusion Detection

Next, Yathiendra discussed Secure-IC’s Securyzr™ intrusion detection system (IDS). The goal of this technology is to maintain trust throughout the whole device lifecycle. Features of this technology include:

  • Threat Detection: Monitors CPU and memory activity, network traffic (CAN bus, Ethernet) and more
  • Threat Analysis: Rule-based or AI methodology to discriminate alerts and eliminate false positives
  • Threat Response: Immediate local threat response based on pre-defined rules and leveraging edge AI computing
  • Life Cycle Management: The acquired data from IDS are sent to the Securyzr Server in the cloud, facilitating device life cycle management for the entire fleet of devices
  • Securyzr iSSP Integration: IDS can be employed in the monitoring service of iSSP, providing a comprehensive solution for fleet-wide security management.

Next, Yathiendra discussed the Intrusion Detection System (IDS), which is a pure software solution that offers:

  • Answer to new cybersecurity regulations
    • Real-time monitoring of cybersecurity threats on a fleet of edge devices with alarms
    • Cloud-based dashboards
    • Cloud-based fleet data aggregation and processing for global updates based on rich data sets edge processing for fast mitigation
  • Minimal cost of implementation and integration in existing hardware solutions
  • Integration with Securyzr Server services
  • Leveraging of Secure-IC Securyzr integrated Secure Elements features

Next, AI-powered cybersecurity was discussed. This technology was summarized as follows:

Data collection

  • Collecting information coming from host CPU (buses, sensors, and security components such as the integrated secure element Securyzr iSE which may be included in the system SoC)

Threat Detection

  • Real-time anomaly detection on advanced techniques using rule-based & AI/ML methodology with the reduced rates of FN/FP (false negative / false positive)
    • Novelty detection (with nominal behavior)
  • In case Secure-IC Digital Sensors are implemented in the SoC, AI ML-based SW smart monitor is used to analyze the answers from these sensors and reach a conclusion on the detected threat

Threat Response

  • Immediate threat response based on pre-defined alert detection
  • Based on full software AI with model stored in the host for fast simple response
  • More complex situations may be managed by software AI module at the server side

Automotive Use Case

Yathiendra then described an automotive use case for the technology. He went into a lot of detail regarding where and how the technology is deployed. The diagram below summarizes how IDS is part of an end-to-end detection and response solution.

End to end detection and response solution
End to end detection and response solution

Final Thoughts and to Learn More

Yathiendra conclude his talk with the following points:

  • Intrusion Detection System is included in an edge device and can monitor network buses, sensors,…
  • The system verifies in real time whether each of your connected devices is attacked and sends information to your supervising infrastructure
  • The system is hardware agnostic – it runs on a CPU with OS
  • The system can easily interface with security component Securyzr ISE and take advantage of its features (sensors)

This was a very relevant and useful presentation on a holistic approach to security. You can learn more about the breadth of technology solutions offered by Secure-IC here. And that’s how Secure-IC presents AI-powered cybersecurity.

WEBINAR: Redefining Security – The challenges of implementing Post-Quantum Cryptography (PQC)

Also Read:

How Secure-IC is Making the Cyber World a Safer Place

2024 Outlook with Hassan Triqui CEO of Secure-IC

Rugged Security Solutions For Evolving Cybersecurity Threats

Share this post via:

Comments

There are no comments yet.

You must register or log in to view/post comments.