Your browser does not support JavaScript!

A hardware root of trust (HRoT) creates a strong foundation for system security, reducing the likelihood of full system compromise. While a HRoT provides valuable security features, it is important to ensure that they are secure features. Vulnerabilities can have a major impact, including:

  • Unprivileged access to your customers’ proprietary or confidential data
  • Side-channel leakages of critical customer information
  • Unauthorized access to device keys, allowing adversaries to steal
  • Modifications of authentication keys for execution of unauthorized software