Form of digital memory where the setting of each bit is locked by a fuse or antifuse. It is one type of read-only memory (ROM). The data in them are permanent and cannot be changed. OTPs are used in digital electronic devices to store permanent data, usually low level programs such as firmware or microcode. The key difference from a standard ROM is that the data is written into a ROM during manufacture, while with a OTP the data is programmed into them after manufacture. In security, it is usually used to store keys.
Original Equipment Manufacturer (OEM)
An original equipment manufacturer (OEM) is generally perceived as a company that produces parts and equipment that may be marketed by another manufacturer. It can mean the maker of a system that includes other companies' subsystems, an end-product producer, an automotive part that is manufactured by the same company that produced the original part used in the automobile's assembly, or a value-added reseller.
Pen-testing (penetration testing)
Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.
Physically Unclonable Function (PUF)
Physically Unclonable Functions or Physical Unclonable Functions are functions implemented in a device that is produced or configured with the security objective that random fluctuations in the production process lead to different behaviors and are difficult to reproduce physically. PUF is usually used to generate keys
POCGI (Power & Clock Glitch Injector)
POwer and Clock Glitch Injector (POCGI) is a solution of Secure-IC used to perform modifications of voltage and clock frequency such as underfeeding (voltage can be finely tuned to a lower value to make the target more sensitive to injection keeping the target fully functional), Power Glitch (sudden modification of the system power supply modifies the behavior of the target which will not work properly) and Clock Glitch (frequency change of the internal clock for a short period generates errors).
Probing
Attack methodology consisting in reading the values that can be transmitted on a wire in the electronic system, this can be done for example with a focused ion beam
Public Key Infrastructure (PKI)
Set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.
Register-Transfert Level (RTL)
Design abstraction which models a synchronous digital circuit in terms of the flow of digital signals (data) between hardware registers, and the logical operations performed on those signals. Register-transfer-level abstraction is used in hardware description languages (HDLs) like Verilog and VHDL to create high-level representations of a circuit, from which lower-level representations and ultimately actual wiring can be derived.