Play Video

PFP: How It Works

Play Video

Supermicro Integrity Assessment

Play Video

ARM Pelion Partner Demo

Play Video

Mirai Botnet Demo

Play Video

Memory Chip Detection in Gateway Demo

Play Video

Supply Chain Demo with EMI Sensing

Play Video

Xilinx Demo: AI and Analog Analysis

Frequently Asked Questions

PFP can use data from signals on the Washington, D.C. power line to a device, ground loop, current, RF, acoustic, etc.

PFP senses the EMI coming off of a chip, board or device through a probe connected to the pMon device.

PFP has 2 pMon products that work in conjunction with PFP’s patented power analytics to detect malware in machine time. The pMon-801 is a rack-mount security appliance that continuously monitors and detects anomalies in routers and other devices and is ideal for data centers and router farms. The pMon-751 allows the user to monitor a wide variety of target devices, from chips, to boards, and to systems, directly EMI, or via DC using an inductive current probe. 

PFP supports commonly used instruments such as the Keysight 3324 Current Analyzer, National Instruments, HP, Tektronix, and other interfaces. Embedded designers could use the analog-to-digital converter (ADC) on a chip or in the device to collect data from side-channel signals.

P3Scan is PFP’s open platform software that lives in the cloud (on AWS) or on-premise. The product is web-enabled and dashboard accessible from any location. Users can log-on and monitor their data through the web. 

The P2Scan travel kit is a PC-based software containing PFP’s patented power analytics algorithms. The kit provides a user friendly interface with point-and-click simplicity and fully customizable monitoring parameters, sensitivity and metrics. The P2Scan kit includes all of the necessary probes, amplifiers, and analysis software to immediately begin using PFP capability.

PFP’s PowerIQ Analytics can be embedded into ARM-based devices and FPGAs using the eMon embedded SDK.

PFP could be inside the power supply, in between the D.C. power source and the device, or inside the devices. PFP provides a reference design to implement PFP inside a USB Power Adapter and PFP offers breakout boxes or splitters to monitor the signal in between existing power supply and the devices. To be inside the devices, PFP provides reference material which show how to use on-chip ADC or ARM based SoC (system-on-chip) to collect data and connect with the PFP cloud analytics on Amazon Web Services.

PFP technology can be applied to detect intrusions and insider tampering at any point in the product’s lifecycle, from its infancy during manufacturing, through distribution, and even after installation.

Detection with PFP technology is instantaneous, i.e., literally in milliseconds. With a predefined policy, PFP can detect and stop an attack before injury or data loss can occur.

Remediation is a policy-based function. The user sets the policy of what is to happen if a change is detected. For example, reboot, shutdown, re-flash, block all traffic, send alert, reroute traffic, switch control to a clone, etc.

Although TPM and secure boot technologies are good, they are not foolproof. Top data hackers seem to be able to penetrate even the latest cyber security. PFP is a last line of defense, detecting the execution change as soon as the attack first starts.

Make an Inquiry

Close Menu