CONNECT WITH US
Wednesday 4 June 2025
"Alpha Three" team optimizes data pre-processing to significantly improve AI assistant question-answering accuracy
Generative AI (GenAI) is swiftly revolutionizing corporate operations, product development, business models, and the overall ecosystem. According to a survey report published by Taiwan's Market Intelligence & Consulting Institute (MIC), in 2024, 19% of Taiwan's five major industries utilized GenAI or engaged in related activities, with the finance and insurance sector representing 25% and the manufacturing sector following at 22%. Amid the proliferation of Generative AI for developing AI assistants, some firms have found that their substantial investments in these assistants did not yield the expected results, leading them to terminate their AI projects and thus diminishing their overall competitiveness
Tuesday 3 June 2025
Eurosmart PP0117 protection profile: Response to the integrated security functions in SoC & MCU
IntroductionWith the increasing use of mobile devices, malware targeting smartphones and tablets has become more prevalent. Banking Trojans, in particular, are designed to steal banking credentials and financial information from mobile users.The modern trend in the Integrated Circuits industry is System on a Chip (SoC) and Microcontrollers (MCU), which integrate different discrete solutions, including security functions in a single IC. In particular, the Secure Element / Hardware Security Module (HSM)/UICC can be integrated into the SoC. The main motivations for this integration are reduced system cost, enhanced performance, and added-value functionality.The integrated security function in the SoC needs to meet the same security level as the discreet part. To address the security of integrated solutions and provide the industry with a unified set of security requirements to be fulfilled and clear to evaluate and asses, PP-0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile was developed.BackgroundCybersecurity statistics indicate that there are 2,200 cyber-attacks per day, with a cyber-attack happening every 39 seconds on average. In the US, a data breach costs an average of $9.44M, and cybercrime is predicted to cost $8 trillion by 2023.ENISA[1], in its "ENISA Threats Landscape 2022 Report", presented in several aspects that the segments which were affected the most were the Public Administration and the Finance sectors:Figure 1 ENISA: Reputational impact by sector[1] ENISA - European Union Agency for Cybersecurity, https://www.enisa.europa.eu/This figure points regarding the potential for negative publicity or an adverse public perception of the affected sector.At the following diagram, it can clearly be seen that the Public Administration and the Finance sectors suffered more seriously from damaged or unavailable systems, corrupted data files or exfiltration of data compared to the other sectors:Figure 2 ENISA: Digital Impact by SectorSecure Element is the technical solution for digital payment via credit cards and mobile and for identification/biometric purposes such as passports and personal IDs.Since this device secures critical data, governmental bodies and private bodies as the credit cards organization, EMVCo[2], mandate it to be certified for Common Criteria EAL 5+ while using PP0084 – Security IC Platform Protection Profile with Augmentation Packages (Eurosmart, 2014)[3]. Till today more than 250 product certifications were done claiming for this PP.With the integration of the Secure Element in SoC, new challenges/threats were raised on top of the existing challenges/threats of the secure device with high resistance to physical and logical attacks:• Preventing the insecure state of the product by disturbing the boot process and enabling manipulation of the product by hostile software or malicious code.• Preventing content abuse of the data and code stored at the external non-volatile\volatile memory which is part of the SoC architecture by the attacker which accesses the external memory for disclosing or modifying the content of the external memory used by the secure component and by compromising confidentiality and/or integrity of secure content to be protected by the secure component.• Preventing Cloning of the content stored in the external memory or physical replacement of the external memory of the data and code stored at the external non-volatile\volatile memory.[2] EMVCo - https://www.emvco.com/about-us/overview-of-emvco/[3] Security IC Platform Protection Profile with Augmentation Packages : https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf• Preventing the ability of replay commands, the write, erase or responses to the read commands between the security component and the external memory, to affect the freshness of the content read from or written to the external memory. Preventing Unauthorized rollback of content.• Preventing the attempting to read the content of the external memory, record it, and later write it back to the external memory after the original content was updated by the Security component.• For SoC architecture that uses Secure Memory, the interface between the secure memory and the secure component should be protected from being blocked or intercepted by an attacker eavesdropping on the interconnection bus (e.g., by a man-in-the-middle attack), to disclose the user data and/or code data being written to or read from the secure external memory before security services are executed or finalized by the secure external memory.SoCs with integrated security functions appeared in the market and the security evaluation was done in a way of a mixture of PP0084 or part of it with extended requirements which might reflect the newly innovated device. No unified requirement. The challenge was to define all aspects of using and protecting the security functions when it is being integrated into the SoCThe methodEurosmart took the challenge and established a technical working group under its domain, ITSC. The subgroup includes Eurosmart members from the industry: semiconductor companies, software companies, ITSEF involved in evaluating security devices, Certification bodies, and consultants in this field.The national certification bodies were invited to the working group even though they are not Eurosmart members.On top of it, a liaisons\sharing was established with stakeholders who are referring \ interested \using this Protection Profile:A. Peers working groups: JHAS and ISCI-WG1.B. Organizations that reference the PP: FIDO, GlobalPlatform, GSMA.C. ENISA – for the alignment with CSA-EUCC which will be the scheme for this PP once the act will be implemented.The resultPP0117, Secure Sub-System in System-on-Chip (3S in SoC) Protection Profile includes the following:The TOE (Target of Evaluation) is "a Secure Sub-System (3S) implemented as a functional block of a System on Chip (SoC). The TOE implements a processing unit, security components, I/O ports and memories to provide a range of security functionalities covering a defined set of security objectives. The TOE provides its security features and security services isolated from the remaining SoC components, based on physical and/or logical isolation mechanisms. The TOE may rely on external memories to store content (data, code or both)."Figure 3: The Target of Evaluation (TOE)The TOE can be delivered as hard macro and/or programable macro, PL macro, as was defined in the team objectives.On top of it, the usage of external memory in different stages of the life cycle should be considered as well.The team strives to develop as generic as possible life cycle and highlight the new aspects of this architecture. It was clear that the new life cycle requires elaboration. With the cooperation with ISCI-WG1 a supplement guidance document, "Life-Cycle Model (LCM) Related Evaluation Aspects" was developed with more explanations related to the aspects that need to be fulfilled and assessed in the different phases of the life cycle.Figure 4: TOE Life CycleThe Protection Profile was structured with a base package of minimum requirements for any Secure Sub-System in a SoC, plus optional packages to address additional industry-specific needs arising from the architecture:• External Memory packages (Passive and Secure, volatile and non-volatile memory) – The restrictions related to the security of the data and code that are stored in the external memory.• Loader Package – The restrictions in loading functionality of the TOE Software or Composite Software from external memory.• Crypto Package - Framework for the integration of various cryptographic algorithms supported by the TOE. For addressing the need to be a generalized PP, this package, contrary to PP0084, doesn't define specific algorithms to implement but general instructions regarding the usage of recognized cryptographic algorithms.• Composite Software Isolation Package - The isolation features enable the separation between different software packages which may be delivered by different developers.Figure 5 PP Packages structureThe Security Problem Definition (SPD) which includes the assets to be protected, the threats, policies and assumptions were developed in light of the collaboration with JHAS group.At the Security Objectives section, dedicated objectives were defined related to the new approach of the TOE form (hardmacro\ PL macro).The base package of the Security Functional Requirements (SFRs) includes the PP0084 SFRs but for fulfilling the TOE need to be a Root of Trust, additional requirements for unique identification were included.The integration of the security sub-system in a non-secure SoC leads to the need to define the TOE as a way it provides its services isolated from the other SoC components based on physical and/or logical isolation mechanisms.The challenge in enabling integration of certified sub-system in non-secure system required new practice to be done by the developer and to be assessed by the ITSEF – the developer should instruct in which conditions the integration should be done and the ITSEF should verify that the integration was followed and no compromising of security was inspected during this process.Dedicated refinements related to the integration were added to the Security Assurance Requirements (SARs) for the ITSEF to verify the process was defined and done with no compromises.The evaluation was done by SGS with the supervision of BSI.SummaryPP0117 represents a significant advancement in cybersecurity certification for integrated systems. By providing a unified, flexible framework, it bridges the gap between traditional discrete certifications and modern integrated solutions, ensuring robust protection for sensitive data in an increasingly interconnected world.Winbond supports PP0117 by offering the W75F Secure Memory, which fulfilled the Secure External memory package. With Winbond EAL 5+ certified secure Flash, PP0117 can be claim in a composition with Winbond device and offer trusted external memory solution within SoC architectures. For more information, please visit Winbond website or download the latest Hardware Security White Paper.
Tuesday 3 June 2025
'Otter Coding' team unveils next-generation AI-powered financial fraud detection system to combat criminal organizations
As criminal organizations expand their use of information technology, the frequency of global financial fraud rises to historic levels each year, posing significant challenges for governments and the financial system. According to a Nasdaq Verafin research report, global financial and bank crime generated US$485.6 billion in losses in 2023, with total unlawful money transfers totaling US$3.1 trillion.The "Otter Coding" team discovered during the "2025 AI Wave: Taiwan Generative AI Applications Hackathon" that conventional financial institutions frequently employ manual review and outmoded model screening to prevent such incidents from occurring. This method is both time-consuming and difficult to address in a timely manner. The team proposed a financial fraud detection system that enhances financial institutions' anti-fraud response capabilities by integrating AI and other advanced technologies.The "Otter Coding" team ultimately triumphed in the highly competitive "Financial Innovation" group of Taishin Financial Holding.Otter Coding claims victory in the Financial Innovation category with an AI-driven fraud detection system built to outsmart global financial crime. Credit: CompanyAI-powered anti-fraud detection targets suspicious accountsThe "Otter Coding" team initiated a two-pronged approach to address the challenges associated with conventional financial fraud prevention. The first step is to employ the bank transaction records and fundamental account information supplied by Taishin Financial Holding to implement AI models for the identification of potential warning accounts. These accounts should be swiftly designated as warning accounts to enhance anti-fraud awareness and alleviate the staffing strain. The secondary purpose is to perform a comprehensive reverse analysis of the existing detection system utilizing large-scale language models to pinpoint possible areas for model enhancement. This will facilitate the ongoing development and enhancement of the anti-fraud system's accuracy.Following the completion of the Generative AI Workshop offered by Amazon Web Services (AWS) and the analysis of the data content provided by Taishin Financial Holding, the "Otter Coding" team members utilized their after-work hours a week prior to the official competition to convene and contemplate the direction of AI model design. They proposed the concepts of data-driven, model optimization, and automation, and ultimately resolved to design and construct the model from five major stages.During the model training phase, the team employed Amazon SageMaker Data Wrangler to integrate transaction records, essential account information, and alert data, perform feature engineering, and train and optimize the XGBoost classification model to achieve high precision and recall. Secondly, in the fraud prediction phase, transaction data is converted into feature vectors and input into the model for risk assessment, enabling the swift identification of high-risk accounts.During the third phase of result evaluation, the "Otter Coding" team computed Precision, Recall, and F1-score by juxtaposing the predictions with the actual list of fraudulent accounts and performed a comprehensive study of the error types.In the fourth round of AI analysis, the team utilized Anthropic Claude 3.5 Sonnet v2 model on Amazon Bedrock, a fully managed service that makes high-performing foundation models, to conduct second-level risk analysis, provide model optimization recommendations, and assist financial specialists in identifying deception patterns.Ultimately, the team employed AWS Amplify, the frontend development tool, to deploy the frontend UI and stored the data in Amazon S3, resulting in an immediate and user-friendly visual analysis interface, during the cloud deployment and presentation phase."Otter Coding" commended the comprehensiveness of both AWS's Generative AI Workshop and DIGITIMES' event planning and venue preparation. Building on this success, the team aims to achieve similar outstanding results in future competitions.
Tuesday 3 June 2025
AI smart salesperson reshapes telemarketing: Cloud Science Network Management team enhances sales performance
Telemarketing, a conventional sales channel, faces substantial challenges, such as a persistent attrition of qualified personnel, elevated labor costs, variable sales quality, and obstacles in scaling operations, despite the widespread adoption of digital transformation in numerous industries.At the second "2025 AI Wave: Taiwan Generative AI Applications Hackathon," the "Cloud Science Network Management" team presented an innovative solution that merges AI with user-centric design to transform telemarketing. This groundbreaking approach won the Eastern Home Shopping & Leisure's "Next-Gen Retail" competition.The "Cloud Science Network Management" team comprises individuals from the departments of Electronics, Computer Science and Engineering, Information Management, and Electrical Engineering at National Yunlin University of Science and Technology in Taiwan. Break away from conventional thinking, they leverage their professional expertise to develop an intelligent sales system addressing market challenges. This system uses AI technology to resolve long-standing industry pain points, while maintaining a humanized interactive experience.Cloud Science Network Management wins “Next-Gen Retail” award with their AI Smart Salesperson that transforms telemarketing through natural voice and real-time strategy. Credit: CompanyThe team discovered that traditional telemarketing is confronted with three significant challenges following extensive market research. Initially, corporate profits are significantly impacted by the high costs of labor and training. Secondly, the performance levels of salesmen are inconsistent, and it is exceedingly challenging to standardize sales scripts. Thirdly, personnel recruitment bottlenecks that severely limit sales expansion.Although telemarketing continues to be a significant promotional channel, market research indicates that consumers are evidently opposed to interactions that appear to be overly mechanical. Consequently, the optimal solution must strike a balance between the efficacy of AI and the humanization of interaction in order to establish a sales process that is both strategic and highly consistent, while also ensuring consumers cannot detect they are interacting with an AI system rather than a human representative.To address these challenges, the team developed the "AI Smart Salesperson," a sophisticated solution employing AI technology for telemarketing. The system transforms AI into a highly effective telephone sales representative by incorporating data-driven analysis, real-time emotional assessment, and natural voice interaction technology. The operational workflow consists of four phases: first, inputting basic customer and product information; second, developing personalized sales strategies based on customer backgrounds; third, initiating the calling process where the customer's voice is transcribed using speech-to-text (STT) technology, dynamic responses are generated through a dialogue large language model (LLM), and these responses are converted into natural speech using text-to-speech (TTS) technology; and finally, using an analytical LLM to simultaneously assess customer emotions and responses, enabling real-time adjustments to sales strategy based on immediate feedback.The "AI Smart Salesperson" substantially reduces labor and training expenses while ensuring uniformity and consistency in sales methodologies, significantly enhancing both sales success rate and customer experience. The system's technical architecture is built on Amazon Web Services (AWS) and leverages multiple innovative technologies to ensure reliability and natural interaction. The core technologies include large language models responsible for dialogue generation, strategy planning, and real-time analysis, along with bidirectional text-to-speech (TTS) and speech-to-text (STT) conversion capabilities.For the AWS implementation, the team utilized Amazon Bedrock, a fully managed service that makes high-performing foundation models, to integrate models such as Anthropic Claude for dialogue generation. They employed Amazon SageMaker for machine learning model training and inference, and Amazon Transcribe for automatic speech recognition to enable speech-to-text functionality. The solution's data storage uses MySQL databases, while Amazon CloudFront handles web request delivery. The entire infrastructure runs on Amazon Elastic Compute Cloud (Amazon EC2) instances, providing the scalability and reliability needed for production deployments.This groundbreaking approach received unanimous recognition from judges in Eastern Home Shopping & Leisure's "Next-Gen Retail" category. The system features natural voice simulation for a genuine interactive experience indistinguishable from human interaction, standardized speech, and dynamic adjustment capabilities to maintain consistent and adaptable sales quality, along with a data-driven recommendation mechanism that significantly enhances the likelihood of a successful transaction.Furthermore, customers can promptly activate the platform by importing product information and listings, without the need to construct additional complex infrastructure, as a result of the out-of-the-box design. These benefits not only resolve the telemarketing dilemma that contemporary enterprises encounter, but they also establish a new paradigm for the application of AI throughout the entire industry.