The use of CMRT mitigates the risk of critical vulnerabilities such as Meltdown and Spectre (see Security IP available for RISC-V) and allows designers to optimize the primary processor for high performance, low power, or other characteristics while optimizing security in the siloed core, Rambus claims. The CMRT embedded security core is suitable for applications from networking to automotive to IoT.
“The CryptoManager Root of Trust also embeds features that enable semiconductor manufacturers and device OEMs to insert hardware keys, and enables IoT service providers to manage IoT endpoints throughout their lifecycle in the field,” said Bret Sewell, general manager of the Rambus security division, in a statement.
With solutions like the Rambus CryptoManager Root of Trust, the extensible RISC-V ISA enables developers to build connected products with a fundamentally more robust approach to security,” said RISC-V Foundation’s executive director, Rick O’Connor, in the same statement.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.