Real-time detector of zero-day attacks on processor - Cyber Escort Unit
To break the deadlock, Secure-IC is convinced that the hardware layer must cooperate more deeply with software layers to bridge this security gap. Hardware must become a security partner to prevent at the root ever-evolving cyber-attacks. In addition to its strategic position in the lowest OSI level, hardware IP presents outstanding properties in terms of reactivity, allowing to detect zero-day attacks before execution, and security, since it is much harder to compromise. We are not alone on this track, the US DARPA has recently launched a program called System Security Integrated Through Hardware and Firmware following the same reasoning.
The Cyber Escort Unit is designed to fill the security gap between software cybersecurity and hardware by escorting step by step the program execution to achieve high execution performances in a secure way, allowing advantageously real-time detection of zero-day attacks. Unique on the market, this product builds the foundation for hardware-enabled cybersecurity.
It is the only tool on the market that comprises technologies for detecting and deceiving cyberattacks. This technology acts on-the-fly. Precisely, Cyber Escort Unit (CyberEU in short) is a two-fold technology aiming to protect against four threats:
- Return oriented programming (ROP), Jump Oriented Programming (JOP): The attacker reuses chunks of code to assemble a malicious program as a patchwork.
- Stack Smashing, by exploiting a buffer over run or integer under-or-overflow etc.: the attacker crafts some fake stack frames in order to change the program context.
- Executable Code Modification, Overwrite: the attacker manages to change the genuine program into a malicious program.
- Control Flow hijacking: the attacker manipulates the program so that it calls an illicit function, or it takes an illicit branch.
Those threats represent a large amount of vulnerabilities encountered in practice. For instance, more than a quarter of the attacks on Supervisory control and Data Acquisition systems (Figure 1) consist in improper restrictions of operations within the bounds of a memory buffer.
View Real-time detector of zero-day attacks on processor - Cyber Escort Unit full description to...
- see the entire Real-time detector of zero-day attacks on processor - Cyber Escort Unit datasheet
- get in contact with Real-time detector of zero-day attacks on processor - Cyber Escort Unit Supplier
Block Diagram of the Real-time detector of zero-day attacks on processor - Cyber Escort Unit

security ip IP
- integrated Secure Element (iSE) for multiple applications - Hardware Security Module (HSM) - Security Enclave - Security Subsystem - PQC Ready
- integrated Secure Element (iSE) for automotive - Hardware Security Module HSM - Security Enclave - Security Subsystem - PQC Ready
- Securyzr integrated Security Services Platform (iSSP). Complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
- Root of Trust eSecure module for SoC security - PQC Ready
- RT-630 Hardware Root of Trust Security Processor for Cloud/AI/ML SoC FIPS-140
- RT-660 DPA & Fault Injection Resistant Hardware Root of Trust Security Processor for Govt/Aero/Defense FIPS-140