CONNECT WITH US
Friday 6 June 2025
Ensuring precision: Kuehne+Nagel's certified quality logistics for the semiconductor industry
In a world where semiconductors are the foundation of modern technology, powering everything from smartphones to satellites, their importance is widely acknowledged. While much attention is paid to chip design and fabrication, few recognize the critical role logistics providers play behind the scenes in keeping these complex global supply chains running smoothly
Wednesday 4 June 2025
'Alpha Three' team optimizes data pre-processing to significantly improve AI assistant question-answering accuracy
Generative AI (GenAI) is swiftly revolutionizing corporate operations, product development, business models, and the overall ecosystem. According to a survey report published by Taiwan's Market Intelligence & Consulting Institute (MIC), in 2024, 19% of Taiwan's five major industries utilized GenAI or engaged in related activities, with the finance and insurance sector representing 25% and the manufacturing sector following at 22%. Amid the proliferation of Generative AI for developing AI assistants, some firms have found that their substantial investments in these assistants did not yield the expected results, leading them to terminate their AI projects and thus diminishing their overall competitiveness.Alpha Three wins with a smarter AI assistant—boosting accuracy through improved data chunking for enterprise knowledge Q&A. Credit: CompanyThe primary cause of the poor performance of AI assistants, according to "Alpha Three," the winning team in the "2025 AI Wave: Taiwan Generative AI Applications Hackathon" from Walsin Lihwa's "Smart Manufacturing" group, is the excessively small data chunking during pre-processing. This can easily disrupt the original document paragraph context, resulting in the AI model's misunderstanding deviations and a response content that is not sufficiently accurate.The team recommended that the "amount of text in a single PDF page" be used as the unit of chunk in order to preserve the natural paragraph structure and comprehensive context, as well as to prevent semantic discontinuity. The review committee unanimously recognized this method for successfully achieving three substantial advantages: "optimizing user query experience," "reducing the risk of hallucinations," and "enhancing semantic coherence and search and answer accuracy."Pre-competition training proves valuable; effectively utilizing AI tools to realize creativity"Alpha Three" utilized a steel standard inquiry as a test case and posed the question, "Does ASTM A276 steel grade 316Ti comply with the EN 10088-3 standard?" The AI system retrieved comprehensive information covering the chemical composition and standard specifications of steel grades. The content of the response is highly focused and accurately reflects the primary data. The AI system demonstrated extraordinary reliability in the application of enterprise knowledge by achieving a perfect score (1.0 out of 1.0) across the three metrics of "search relevance," "answer solidity," and "answer relevance."To achieve these results, the team utilized Amazon Web Services (AWS) to develop a comprehensive enterprise knowledge question-answering framework.PDF, PNG, JPG, and other file formats are uploaded to Amazon S3, the cloud object storage service, during the initial phase. The second phase is providing quick query services with a comprehensive language model and the Flask API. In the third phase, the team leverages Amazon Bedrock, a fully managed service that makes high-performing foundation models, to connect extensive language models, thereby improving scalability and reaction speed. Amazon Elastic Compute Cloud (Amazon EC2) is employed in the fourth phase to expedite API processing, thereby guaranteeing system stability and efficiency.The extensive system design includes data uploading, management, retrieval, and response, allowing users to easily submit inquiries and obtain prompt professional responses, which became a crucial factor in their victory.The "Alpha Three" team, comprised of recent information engineering graduates from National Taiwan University in 2024, observed that, despite their degrees in information-related fields, they were completely unfamiliar with contemporary mainstream AI tools in the face of the rapid advancement of Generative AI technology. The project was successfully completed within 30 hours, and the award was secured, thanks to the professional training provided by the organizer, which included a series of enterprise data workshops and AWS Generative AI workshops, as well as Walsin Lihwa's explanation of the steel standards.
Tuesday 3 June 2025
Eurosmart PP0117 protection profile: Response to the integrated security functions in SoC & MCU
IntroductionWith the increasing use of mobile devices, malware targeting smartphones and tablets has become more prevalent. Banking Trojans, in particular, are designed to steal banking credentials and financial information from mobile users.The modern trend in the Integrated Circuits industry is System on a Chip (SoC) and Microcontrollers (MCU), which integrate different discrete solutions, including security functions in a single IC. In particular, the Secure Element / Hardware Security Module (HSM)/UICC can be integrated into the SoC. The main motivations for this integration are reduced system cost, enhanced performance, and added-value functionality.The integrated security function in the SoC needs to meet the same security level as the discreet part. To address the security of integrated solutions and provide the industry with a unified set of security requirements to be fulfilled and clear to evaluate and asses, PP-0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile was developed.BackgroundCybersecurity statistics indicate that there are 2,200 cyber-attacks per day, with a cyber-attack happening every 39 seconds on average. In the US, a data breach costs an average of $9.44M, and cybercrime is predicted to cost $8 trillion by 2023.ENISA[1], in its "ENISA Threats Landscape 2022 Report", presented in several aspects that the segments which were affected the most were the Public Administration and the Finance sectors:Figure 1 ENISA: Reputational impact by sector[1] ENISA - European Union Agency for Cybersecurity, https://www.enisa.europa.eu/This figure points to the potential for negative publicity or an adverse public perception of the affected sector.In the following diagram, it can clearly be seen that the Public Administration and the Finance sectors suffered more seriously from damaged or unavailable systems, corrupted data files, or exfiltration of data compared to the other sectors:Figure 2 ENISA: Digital Impact by SectorSecure Element is a technical solution for digital payments via credit cards and mobile devices, as well as for identification and biometric purposes, such as passports and personal IDs.Since this device secures critical data, governmental bodies and private entities, such as credit card organizations, EMVCo[2], mandate that it be certified to Common Criteria EAL 5+ when using PP0084 – Security IC Platform Protection Profile with Augmentation Packages (Eurosmart, 2014)[3]. Till today more than 250 product certifications were done claiming for this PP.With the integration of the Secure Element in SoC, new challenges/threats were raised on top of the existing challenges/threats of the secure device with high resistance to physical and logical attacks:• Preventing the insecure state of the product by disturbing the boot process and enabling manipulation of the product by hostile software or malicious code.• Preventing content abuse of the data and code stored at the external non-volatile\volatile memory which is part of the SoC architecture by the attacker which accesses the external memory for disclosing or modifying the content of the external memory used by the secure component and by compromising confidentiality and/or integrity of secure content to be protected by the secure component.• Preventing Cloning of the content stored in the external memory or physical replacement of the external memory of the data and code stored at the external non-volatile\volatile memory.[2] EMVCo - https://www.emvco.com/about-us/overview-of-emvco/[3] Security IC Platform Protection Profile with Augmentation Packages : https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf• Preventing the ability of replay commands, the write, erase or responses to the read commands between the security component and the external memory, to affect the freshness of the content read from or written to the external memory. Preventing Unauthorized rollback of content.• Preventing the attempt to read the content of the external memory, record it, and later write it back to the external memory after the original content was updated by the Security component.• For SoC architecture that uses Secure Memory, the interface between the secure memory and the secure component should be protected from being blocked or intercepted by an attacker eavesdropping on the interconnection bus (e.g., by a man-in-the-middle attack), to disclose the user data and/or code data being written to or read from the secure external memory before security services are executed or finalized by the secure external memory.SoCs with integrated security functions appeared in the market and the security evaluation was done in a way of a mixture of PP0084 or part of it with extended requirements which might reflect the newly innovated device. No unified requirement. The challenge was to define all aspects of using and protecting the security functions when it is being integrated into the SoCThe methodEurosmart took the challenge and established a technical working group under its domain, ITSC. The subgroup includes Eurosmart members from the industry: semiconductor companies, software companies, ITSEF involved in evaluating security devices, Certification bodies, and consultants in this field.The national certification bodies were invited to the working group even though they are not Eurosmart members.On top of it, a liaisons\sharing was established with stakeholders who are referring \ interested \using this Protection Profile:A. Peers working groups: JHAS and ISCI-WG1.B. Organizations that reference the PP: FIDO, GlobalPlatform, GSMA.C. ENISA – for the alignment with CSA-EUCC which will be the scheme for this PP once the act will be implemented.The resultPP0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile includes the following:The TOE (Target of Evaluation) is "a Secure Sub-System (3S) implemented as a functional block of a System on Chip (SoC). The TOE implements a processing unit, security components, I/O ports and memories to provide a range of security functionalities covering a defined set of security objectives. The TOE provides its security features and security services isolated from the remaining SoC components, based on physical and/or logical isolation mechanisms. The TOE may rely on external memories to store content (data, code or both)."Figure 3: The Target of Evaluation (TOE)The TOE can be delivered as hard macro and/or programable macro, PL macro, as was defined in the team objectives.On top of it, the usage of external memory in different stages of the life cycle should be considered as well.The team strives to develop as generic as possible life cycle and highlight the new aspects of this architecture. It was clear that the new life cycle requires elaboration. With the cooperation with ISCI-WG1 a supplement guidance document, "Life-Cycle Model (LCM) Related Evaluation Aspects" was developed with more explanations related to the aspects that need to be fulfilled and assessed in the different phases of the life cycle.Figure 4: TOE Life CycleThe Protection Profile was structured with a base package of minimum requirements for any Secure Sub-System in a SoC, plus optional packages to address additional industry-specific needs arising from the architecture:• External Memory packages (Passive and Secure, volatile and non-volatile memory) – The restrictions related to the security of the data and code that are stored in the external memory.• Loader Package – The restrictions in loading functionality of the TOE Software or Composite Software from external memory.• Crypto Package - Framework for the integration of various cryptographic algorithms supported by the TOE. For addressing the need to be a generalized PP, this package, contrary to PP0084, doesn't define specific algorithms to implement but general instructions regarding the usage of recognized cryptographic algorithms.• Composite Software Isolation Package - The isolation features enable the separation between different software packages which may be delivered by different developers.Figure 5 PP Packages structureThe Security Problem Definition (SPD) which includes the assets to be protected, the threats, policies, and assumptions was developed in light of the collaboration with the JHAS group.In the Security Objectives section, dedicated objectives were defined related to the new approach of the TOE form (hardmacro\ PL macro).The base package of the Security Functional Requirements (SFRs) includes the PP0084 SFRs but for fulfilling the TOE need to be a Root of Trust, additional requirements for unique identification were included.The integration of the security sub-system in a non-secure SoC leads to the need to define the TOE as a way it provides its services isolated from the other SoC components based on physical and/or logical isolation mechanisms.The challenge in enabling integration of certified sub-systems in a non-secure system required new practices to be done by the developer and to be assessed by the ITSEF – the developer should instruct in which conditions the integration should be done and the ITSEF should verify that the integration was followed and no compromising of security was inspected during this process.Dedicated refinements related to the integration were added to the Security Assurance Requirements (SARs) for the ITSEF to verify the process was defined and done with no compromises.The evaluation was done by SGS with the supervision of BSI.SummaryPP0117 represents a significant advancement in cybersecurity certification for integrated systems. By providing a unified, flexible framework, it bridges the gap between traditional discrete certifications and modern integrated solutions, ensuring robust protection for sensitive data in an increasingly interconnected world.Winbond supports PP0117 by offering the W75F Secure Memory, which fulfilled the Secure External memory package. With Winbond EAL 5+ certified secure Flash, PP0117 can be claim in a composition with Winbond device and offer trusted external memory solution within SoC architectures. For more information, please visit Winbond website or download the latest Hardware Security White Paper.
Tuesday 3 June 2025
'Otter Coding' team unveils next-generation AI-powered financial fraud detection system to combat criminal organizations
As criminal organizations expand their use of information technology, the frequency of global financial fraud rises to historic levels each year, posing significant challenges for governments and the financial system. According to a Nasdaq Verafin research report, global financial and bank crime generated US$485.6 billion in losses in 2023, with total unlawful money transfers totaling US$3.1 trillion.The "Otter Coding" team discovered during the "2025 AI Wave: Taiwan Generative AI Applications Hackathon" that conventional financial institutions frequently employ manual review and outmoded model screening to prevent such incidents from occurring. This method is both time-consuming and difficult to address in a timely manner. The team proposed a financial fraud detection system that enhances financial institutions' anti-fraud response capabilities by integrating AI and other advanced technologies.The "Otter Coding" team ultimately triumphed in the highly competitive "Financial Innovation" group of Taishin Financial Holding.Otter Coding claims victory in the Financial Innovation category with an AI-driven fraud detection system built to outsmart global financial crime. Credit: CompanyAI-powered anti-fraud detection targets suspicious accountsThe "Otter Coding" team initiated a two-pronged approach to address the challenges associated with conventional financial fraud prevention. The first step is to employ the bank transaction records and fundamental account information supplied by Taishin Financial Holding to implement AI models for the identification of potential warning accounts. These accounts should be swiftly designated as warning accounts to enhance anti-fraud awareness and alleviate the staffing strain. The secondary purpose is to perform a comprehensive reverse analysis of the existing detection system utilizing large-scale language models to pinpoint possible areas for model enhancement. This will facilitate the ongoing development and enhancement of the anti-fraud system's accuracy.Following the completion of the Generative AI Workshop offered by Amazon Web Services (AWS) and the analysis of the data content provided by Taishin Financial Holding, the "Otter Coding" team members utilized their after-work hours a week prior to the official competition to convene and contemplate the direction of AI model design. They proposed the concepts of data-driven, model optimization, and automation, and ultimately resolved to design and construct the model from five major stages.During the model training phase, the team employed Amazon SageMaker Data Wrangler to integrate transaction records, essential account information, and alert data, perform feature engineering, and train and optimize the XGBoost classification model to achieve high precision and recall. Secondly, in the fraud prediction phase, transaction data is converted into feature vectors and input into the model for risk assessment, enabling the swift identification of high-risk accounts.During the third phase of result evaluation, the "Otter Coding" team computed Precision, Recall, and F1-score by juxtaposing the predictions with the actual list of fraudulent accounts and performed a comprehensive study of the error types.In the fourth round of AI analysis, the team utilized Anthropic Claude 3.5 Sonnet v2 model on Amazon Bedrock, a fully managed service that makes high-performing foundation models, to conduct second-level risk analysis, provide model optimization recommendations, and assist financial specialists in identifying deception patterns.Ultimately, the team employed AWS Amplify, the frontend development tool, to deploy the frontend UI and stored the data in Amazon S3, resulting in an immediate and user-friendly visual analysis interface, during the cloud deployment and presentation phase."Otter Coding" commended the comprehensiveness of both AWS's Generative AI Workshop and DIGITIMES' event planning and venue preparation. Building on this success, the team aims to achieve similar outstanding results in future competitions.