Safe Hardware Development: From Physical Layer to Software

We are in a period where cyber attacks are no longer restricted to the software layer, and hardware vulnerabilities are also targeted. To develop a secure hardware, the "Root of Trust" concept must be included in the design from the very beginning.

Secure Element (SE) chips store cryptographic keys in an environment protected against physical attacks. In addition, checking the digital signature of the software (firmware) before it runs on the device (Secure Boot) prevents malicious interventions. At the design stage, closing JTAG ports or making them physically inaccessible is a simple but effective security measure.