Security is a complex topic that covers multiple technical disciplines and areas of focus based on the threats a customer is trying to protect against, the sophistication of the adversary they are concerned about, and the environment the end product is deployed in. The Venn diagram below shows the different disciplines that encompass the term "Platform Security" and which AMD invests heavily in.
Assurance: Focuses on the known pedigree and heritage of the system solution provided by AMD. Silicon, software, firmware and soft-IP must be "Trojan-free". Supply chain security and risk management are key focus areas.
Information Assurance (IA): Information Assurance is focused on protecting the information, or data, the device is handling or processing. This is done through standard cryptographic techniques (e.g. authentication and encryption) as well as fault tolerant design methods. Fault tolerant design methods ensure that security is not compromised in the face of a fault.
Cybersecurity: While Information Assurance assures all information in all forms of media, Cybersecurity is focused on the protection of information in the cyber domain. This effectively makes Cybersecurity a subset of Information Assurance in most applications.
Anti-Tamper (AT): Focused on protecting the customers’ intellectual property (IP) that is deployed in their product and contained within the device either as hardware or software. Our customers invest heavily in their products, and AMD devices must protect those investments from cloning, reverse engineering or other types of attacks that can extract the IP resident in AMD devices.
As the Venn diagram accurately reflects, there are areas of uniqueness as well as significant areas of overlap between the disciplines. Looking holistically across all disciplines provides the best Defense in Depth approach.
Security must be considered throughout the entire product lifecycle in order to maximize the protection of a system. As an example, developing fault tolerant application level security solutions deployed on a device that does not boot securely, is like building a mansion on a foundation of sand. As can be seen from the pyramid, AMD and their customers have a shared responsibility to ensure the security of a system. It is also important to recognize that no system is completely immune to attack - with enough time, energy, resources and money, any system can be compromised. Security is all about managing risk, and how much investment a customer wants to make to manage that risk.
AMD employs world-class best practices to establish the trustworthiness of its Silicon, Software and Development Tools. An array of countermeasures are integrated into Silicon which aid in protecting against a myriad of attack vectors. The secure boot, or configuration, of our products employ a Hardware Root of Trust with Authenticity, Confidentiality, and Integrity built in.
The device, after booting securely, must maintain the security that has been established. Run-time protections are a shared responsibility between AMD, the customer, and the rich AMD ecosystem.
The base of the pyramid is established to ultimately protect the customer’s end application.
The AMD Security Working Group is an annual multi-day FREE event in North America and Europe that brings together AMD customers from all markets, academic representatives, Alliance Partners, government agencies and authorities to discuss the latest security topics.
The unique aspect about this working group is that an NDA is required. This allows us to present roadmap and detailed design information that would not normally be presented in such a forum. ALL PARTICIPANTS WILL REQUIRE A CURRENT NDA.
The AMD Security Working Group 2022 will be held in three locations:
Washington D.C. USA
November 8-9, 2022
Washington Dulles Airport Marriott
These events are currently in the planning stage and we anticipate that registration will open early August. Check back on this page for updates!
For access to XSWG 2021 Presentations please go to our: Design Security Lounge. Please note that an NDA and Lounge access approval is required to obtain these presentations.
Cryptographic algorithm validation, via the NIST Cryptographic Algorithm Validation Program (CAVP) is an important aspect of the security solutions provided by AMD. The following table identifies the algorithm, and product, that has been validated with a link to the NIST website.
|AMD Device Family
||NIST Validation Description (Number)
|7 Series and Zynq 7000||7 Series and Zynq 7000-Hardware (HMAC 1465)||HMAC|
|7 Series and Zynq 7000 AES/MAC-Hardware (AES 2363)||AES|
|7 Series and Zynq 7000-Hardware (SHS 2034)||SHA2|
|Zynq 7000-Software (RSA 1481)||RSA|
|UltraScale/UltraScale+||UltraScale FPGAs-Firmware (AES 2800)||AES|
|UltraScale, UltraScale+ FPGAs-Firmware (SHA-3 19)||SHA3|
|Zynq UltraScale+||Zynq UltraScale+ MPSoC SHA3 Core-Firmware (SHA-3 20)||SHA3|
|Zynq UltraScale+MPSoC XilSecure Library-Hardware (C380)||AES, SHA3, RSA|
|Zynq UltraScale+ MPSoC AES-GSM Core-Firmware (AES 4438)||AES|
|Zynq UltraScale+ XilSecure Library 2019.1-Software (C1864)||AES, SHA3, RSA|
|Zynq UltraScale+ XilSecure Library 2019.2-Software (C1866)||AES, SHA3, RSA|
|Zynq UltraScale+ XilSecure Library 2020.1-Software (A1029)||AES, SHA3, RSA|
|Zynq UltraScale+ XilSecure Library 2020.2-Software (A1028)||AES, SHA3, RSA|
|Zynq UltraScale+ XilSecure Library 2021.1-Software (A1940)||AES, SHA3, RSA|
|Zynq Ultrascale+ MPSoC XilSecure Library, v2021.2 (AES 14955)||AES|
|Versal||Versal Architecture PMC Crypto Accelerators - Firmware (C1863)||AES|
|Versal Architecture PMC Crypto Accelerators-Hardware (C1865)||AES, SHA3|
|Versal™ ACAP 400G High Speed Channelized Cryptography Engine (HSC)-Firmware (A647)||AES|
|Versal™ ACAP 400G High Speed Channelized Cryptography Engine (HSC)-Hardware (A2614)||AES|
|Versal ACAP XilSecure Library 2021.1-Software (A1951)||AES, SHA3, RSA|
|Versal ACAP XilSecure SW Library, v2021.2 (AES 14954)||AES|
|IP||Versal ACAP PCIe IDE Security Engine (AES 14775)||AES|
|Versal ACAP Channelized AES-XTS Security Engine (AES 14790)||AES|
|Versal ACAP PCIe IDE 256-bit Security Engine (AES 14862)||AES|
|AMD 50Gb/s CH AES-GCM Crypto IP for MACsec-Firmware (AES 3896)||AES|
|AMD 50Gb/s Ch AES-GCM Crypto IP for MACsec-Firmware (AES 3954)||AES|
|AMD 50G/b CH AES GCM Crypto IP for MACsec-Hardware (AES 4847)||AES|
|AMD 100Gb/s AES-GCM Crypto IP for MACsec-Firmware (AES 3953)||AES|
|AMD Crypto IP 100 Gb/s AES-GCM for MACsec-Hardware (AES 4804)||AES|
|AMD LogiCORE IP - AES Lite v1.0 (C1609)||AES|
|Development Software||Vivado write bitstream Key Derivation Function (KDF) 2020.1 Software (C1849)||KDF|
|Bootgen Key Derivation Function (KDF) 2020.1 Software (C1850)||KDF|
|Vivado write bitstream Key Derivation Function (KDF) 2020.2 Software (A1147)||KDF|
|Bootgen Key Derivation Function (KDF) 2020.2 Software (A1148)||KDF|
Embedded System Design and Custom Application Software Services and Video related IP Cores for AMD Devices.
Burlington MA US
Implementation of algorithms on FPGAs, Security and Cryptography
|The Athena Group, Inc.
Athena is a leading provider of security, cryptography, anti-tamper, and signal processing IP cores to many of the world’s largest semiconductor companies, defense contractors, and OEMs, as well as emerging providers. Embedded in millions of ASIC and FPGA devices, Athena technologies enable high-value solutions where security and performance are mission critical ─ defense and aerospace, vehicle safety (V2V, V2X, telematics), networking and communications, satellites, cellular base stations, handsets, the Internet of Things (IoT), and more.
|Member||Gainesville FL US|
Avnet is an operating group of Phoenix-based Avnet, Inc. that serves electronic original equipment manufacturers
|Premier||Phoenix AZ US|
|Bottom Line Technologies, Inc.
FPGA, board, and system designs for commercial, industrial, and military/IC clients. TS-SCI cleared personnel AMD exclusive regional Authorized Training Partner
Columbia MD US
Ellicott City MD US
CAST developes and supports over 100 different popular and standards-based IP cores.
|Certified||Woodcliff Lake NJ US
Curtiss-Wright is a technology leader in development of rugged COTS electronic modules and systems for defense & aerospace applications. Curtiss-Wright's FPGA solutions include VPX, XMC, PMC, & FMC.
|Member||Kanata ON CA
Ashburn VA US
Newton PA US
DornerWorks provides expertise and a development plan to help developers create amazing products so that they are free to focus on what they do best.
|Premier||Grand Rapids MI US|
|Extreme Engineering Solutions (X-ES)
Extreme Engineering Solutions, Inc. (X-ES) is a leader in the design, manufacture, and support of standard and custom embedded computing solutions.
|Member||Middleton WI US|
|Fidus Systems, Inc.
Electronic product development and consulting services. Capabilities: Hardware, FPGA, Signal Integrity, Embedded Software, PCB Layout, Wireless, DSP, and Mechanical design.
|Premier||Ottawa ON CA
Fremont CA US
Waterloo ON CA
Graf Research unleashes innovation by developing ideas into disruptive technologies.
|Member||Blacksburg VA US|
|Green Hills Software, Inc.||Member||Santa Barbara CA US|
Helion Technology Limited
|Idaho Scientific LLC
Idaho Scientific provides Secure IP and design services tailored to meet DoD Anti-Tamper, Export, and Cyber Security requirements. Additionally, Idaho Scientific provides an inline encryption solution for Zynq UltraScale+ MPSoC/RFSoC as well as Versal.
|Member||Boise ID US|
intoPIX enables its customers with leading-edge image compression (J2K, TICO,...), security (AES,RSA,...), video transport (AVB, MPEG2-TS,...) and hardware enforcement IP-cores for audiovisual markets.
Logicircuit provides DO-254 compliant IP for Xilinx devices and also supports the general DO-254 and DO-178C compliance requirements of Xilinx Aerospace and Defense customers.
|Member||Alpharetta GA US|
Mercury Systems is a global commercial technology company serving the aerospace and defense industry. Headquartered in Andover, MA, the company delivers trusted and secure solutions powering a broad range of mission-critical applications in the most challenging and demanding environments. Additionally, Mercury provides an inline encryption solution for Zynq UltraScale+ MPSoC/RFSoC and Versal.
|Missing Link Electronics, Inc.
Turn FPGAs into Programmable Systems with a configurable applications processors running a full GNU/Linux software stack integrated into a pre-validated platform.
|Premier||San Jose CA US
Neu-Ulm DE DE
|Rincon Research Corporation
Rincon Research Corporation (RRC) is a world leader of innovative, cutting-edge Digital Signal Processing (DSP) products and solutions targeting the aerospace, defense, and communication industries.
|Member||Tucson AZ US|
SoC-e offers specialized design services and products based on reconfigurable devices. SoC-e is focused on Industrial Networking, Sofware-Defined Radio and VPX Rugged FPGA based systems.
|Tortuga Logic, Inc.
HW Security Solution and Verification
|Member||San Jose, CA US|
WIND RIVER SYSTEMS, INC.
|Member||Alameda CA US|