Using Out-of-Band Monitoring & Machine Learning
Detect differences, counterfeit, tampering & malware in microelectronics
From Supply Chain Risk to Advanced Persistent Threats
Detect differences, counterfeit, or tampering in discrete integrated
Proven to detect tampering throughout the supply chain and live attacks during operation, examples include IP surveillance cameras, PLC, and more. PFP could be air-gapped, in power supply or embedded.
PFP can be used for incoming inspection, spot checking, and continuous monitoring of server motherboards, SSD, power supply and add ons, including BMC, BIOS/UEFI, USB, NIC, and more
PFP can create a snapshot from approved or known-good configurations, to screen other devices. Without gold samples, cluster analysis can be used to find outliers within many devices.
PFP can protect telecommunication such as baseband of radio, Software Defined Radio in RAN, also servers and network infrastructure.
PFP can detect boards with counterfeit chips, firmware changes, and more.