Menu

IoT FEATURE NEWS

PFP Cybersecurity Uses Power Analysis and AI for IoT Security

By Ken Briodagh September 01, 2017

According to a recent announcement, PFP Cybersecurity, a developer of embedded cybersecurity solutions for IoT devices, will present "IoT Security – Power Analysis and AI" at the ST Developers Conference, where the company’s CEO, Steven Chen, will join other cyber security thought leaders to present a new approach to IoT security challenges.

“PFP Cybersecurity's unique approach for embedded integrity assessment utilizes side channel information, such as instantaneous power consumption to derive information about the internal execution status of the user's ST Micro processor," said Chen.

Steven's presentation showcases a security solution based on power analysis and Artificial Intelligence (AI) called Power Fingerprinting (PFP). Current hardware security features focus on protecting chip integrity. PFP protects the applications running on the chip. Power analysis has been used to steal cryptographic keys; PFP, however, uses it for detection, leveraging AI for scalability. Current MSSP security tools do not identify that a device has been hijacked. PFP can detect intrusions in machine time, enabling remediation within milliseconds, likely before damage can be done. Steven will look at how PFP technology works, its history, strengths and weaknesses, and its application on real IoT designs, as well as potential chip-level implementations to further reduce cost.

PFP Cybersecurity will also showcase its PowerIQ – Power Analytics through AI, which provides IoT security using machine learning to ferret out known good behavior. PFP's embedded solution is effective for detecting both hardware and software threats and for detecting zero-day attacks on day zero, including malware, kernel rootkits, hardware Trojans and counterfeits. The PFP approach is independent of hardware, operating systems, applications, and context. While others attempt to "recognize" the attack signature, PFP detects minute changes in the electronic power profile to instantly detect and alert that an IoT device has changed its behavior.


Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

Smart Cities for All: City Leaders in Brazil Discuss Accessibility

By: Ken Briodagh    9/25/2017

Rio de Janeiro has invited G3ict and World Enabled to assist with the city's efforts to ensure that persons with disabilities and older persons can be…

Read More

The Future of the IoT: From Smart Cities to Cyborgs

By: Special Guest    9/25/2017

The IoT is the largest technological expansion in the history of humankind and will lead to the creation of cities controlled by artificial intelligen…

Read More

CIS Controls Says Its Best Practices Could Prevent Equifax-style Breach

By: Ken Briodagh    9/25/2017

According to CIS, attacks such as WannaCry and Equifax could have been prevented.

Read More

Pros and Cons of IoT: Why Some Businesses Are Slow to Adopt

By: Special Guest    9/22/2017

Why won't business leaders recognize the boons of IoT and bring IoT devices into the workplace? The answer seems to be: Speed.

Read More

IoT Evolution Health: Areta Health in South Africa to Use Medsphere Healthcare Solutions

By: Ken Briodagh    9/22/2017

Network of Areta Specialist Day Hospitals supported by remote clinics and in-home monitoring brings Medsphere's EHR and services to the African contin…

Read More