{"id":20705,"date":"2017-12-20T16:42:55","date_gmt":"2017-12-21T00:42:55","guid":{"rendered":"https:\/\/www.rambus.com\/?page_id=20705"},"modified":"2023-05-11T14:31:09","modified_gmt":"2023-05-11T21:31:09","slug":"smart-home","status":"publish","type":"page","link":"https:\/\/www.rambus.com\/iot\/smart-home\/","title":{"rendered":"Smart Home: Threats and Countermeasures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20705\" class=\"elementor elementor-20705\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd37216 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd37216\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5542a4b\" data-id=\"5542a4b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17c0acf elementor-widget elementor-widget-breadcrumbs\" data-id=\"17c0acf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.rambus.com\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d724306 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d724306\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a04ba6f\" data-id=\"a04ba6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a22daa4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a22daa4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-467b716\" data-id=\"467b716\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43f320b elementor-widget elementor-widget-text-editor\" data-id=\"43f320b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Smart Home: Threats and Countermeasures<\/h1><p>An estimated 80% of IoT devices are vulnerable to a wide range of attacks. Clearly, connecting traditionally \u2018stand-alone\u2019 smart devices such as lights, appliances and locks introduces numerous cyber security risks. Even connected baby monitors are vulnerable to digital intruders, as a number of horrified parents belatedly discovered when hackers spoke to their young children via compromised devices. Common cyber security threats and attacks against smart home devices include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a7561a elementor-widget elementor-widget-image\" data-id=\"2a7561a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png\" class=\"attachment-large size-large wp-image-20707\" alt=\"Smart Home Threats and Countermeasures\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png 1024w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-150x84.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-300x169.png 300w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-768x432.png 768w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-200x113.png 200w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-400x225.png 400w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-600x338.png 600w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-800x450.png 800w, https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b3aaa19 elementor-widget elementor-widget-text-editor\" data-id=\"b3aaa19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Man-in-the-middle<\/strong>: An attacker breaches, interrupts or spoofs communications between two systems. For example, fake temperature data \u2018generated\u2019 by an environmental monitoring device can be spoofed and forwarded to the cloud. Similarly, an attacker can disable vulnerable HVAC systems during a heat wave, creating a disastrous scenario for service providers with affected models.<\/p><p><strong>Data and identity theft<\/strong>: Data generated by unprotected wearables and smart appliances provide cyber attackers with an ample amount of targeted personal information that can potentially be exploited for fraudulent transactions and identify theft.<\/p><p><strong>Device hijacking<\/strong>: The attacker hijacks and effectively assumes control of a device. These attacks are quite difficult to detect because the attacker does not change the basic functionality of the device. Moreover, it only takes one device to potentially re-infect all smart devices in the home. For example, an attacker who initially compromises a thermostat can theoretically gain access to an entire network and remotely unlock a door or change the keypad PIN code to restrict entry.<\/p><p><strong>Distributed Denial of Service (DDoS)<\/strong>: A\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Denial-of-service_attack\">denial-of-service attack\u00a0<\/a>(DoS attack) attempts to render a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. In the case of a distributed denial-of-service attack (DDoS), incoming traffic flooding a target originates from multiple sources, making it difficult to stop the cyber offensive by simply blocking a single source. In fact, DDoS attacks are rising rapidly, primarily due to the lack of security in IoT Devices. The Mirai botnet attack was a massive distributed DDoS attack that left much of the internet inaccessible on the US east coast.<\/p><p><strong>Permanent Denial of Service (PDoS)<\/strong>:Permanent denial-of-service attacks (PDoS), also known as phlashing, is an attack that damages the device so badly that it requires replacement or reinstallation of hardware.\u00a0<a href=\"https:\/\/www.rambus.com\/blogs\/brickerbot-targets-unsecured-iot-devices-for-permanent-denial-of-service-pdos\/\">BrickerBot<\/a>, coded to exploit hard-coded passwords in IoT devices and cause permanent denial of service, is one such example. Another example could see fake data fed to thermostats in an attempt to cause irreparable damage via extreme overheating.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-936697f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"936697f\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7115f6a\" data-id=\"7115f6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0a968a6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0a968a6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ef9ec7a\" data-id=\"ef9ec7a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-341447a elementor-widget elementor-widget-text-editor\" data-id=\"341447a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 data-inline-fontsize=\"true\" data-inline-lineheight=\"true\" data-fontsize=\"34\" data-lineheight=\"40\">Securing Smart Homes<\/h2><p>Connected smart home devices should be protected by a comprehensive IoT security solution (device to cloud) that does not disrupt a Service provider or OEMs profitability or time to market. A comprehensive IoT security solution should include the following capabilities:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ad48b04 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad48b04\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-176a21b\" data-id=\"176a21b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-998be9d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"998be9d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6364fa5\" data-id=\"6364fa5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-904d8c9\" data-id=\"904d8c9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c394833 elementor-widget elementor-widget-image\" data-id=\"c394833\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png\" class=\"attachment-large size-large wp-image-20855\" alt=\"Firmware integrity and secure boot icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-e3e827b\" data-id=\"e3e827b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-541deaa elementor-widget elementor-widget-text-editor\" data-id=\"541deaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Secure boot<\/span><\/h3><p>Secure boot utilizes cryptographic code signing techniques, ensuring that a device only executes code generated by the device OEM or another trusted party. Use of secure boot technology prevents hackers from replacing firmware with malicious versions, thereby preventing attacks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-dc1882d\" data-id=\"dc1882d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-cd59ae6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cd59ae6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7506ace\" data-id=\"7506ace\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-35dfbb1\" data-id=\"35dfbb1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c39998 elementor-widget elementor-widget-image\" data-id=\"8c39998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png\" class=\"attachment-large size-large wp-image-20856\" alt=\"Mutual authentication icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1abfaa9\" data-id=\"1abfaa9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3d4b7a elementor-widget elementor-widget-text-editor\" data-id=\"e3d4b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Mutual authentication<\/span><\/h3><p>Every time a smart home device connects to the network it should be authenticated prior to receiving or transmitting data. This ensures that the data originates from a legitimate device and not a fraudulent source. Cryptographic algorithms involving symmetric keys or asymmetric keys can be utilized for two-way authentication. This ensures that the data originates from a legitimate device and not a fraudulent source. Cryptographic algorithms involving symmetric keys or asymmetric keys can be utilized for two-way authentication. For example, the Secure Hash Algorithm (SHA-x) can be used for symmetric keys and the Elliptic Curve Digital Signature Algorithm (ECDSA) for asymmetric keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-db5e905\" data-id=\"db5e905\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7112a50 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7112a50\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-b8109c6\" data-id=\"b8109c6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-98aebb5\" data-id=\"98aebb5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e49c31f elementor-widget elementor-widget-image\" data-id=\"e49c31f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication.png\" class=\"attachment-large size-large wp-image-20858\" alt=\"Secure communication icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-20772dc\" data-id=\"20772dc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f2a6719 elementor-widget elementor-widget-text-editor\" data-id=\"f2a6719\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Secure communication (Encryption)<\/span><\/h3><p>Protecting data in transit between a device and its service infrastructure (the cloud). Encryption ensures that only those with a secret decryption key can access transmitted data. For example, a smart thermostat that sends usage data to the service operator must be able to protect information from digital eavesdropping.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-e2b8e41\" data-id=\"e2b8e41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bb08bf8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bb08bf8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-735e06e\" data-id=\"735e06e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-6413d87\" data-id=\"6413d87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3881e56 elementor-widget elementor-widget-image\" data-id=\"3881e56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png\" class=\"attachment-large size-large wp-image-20857\" alt=\"Security monitoring and analysis\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-28f64a6\" data-id=\"28f64a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-866fb62 elementor-widget elementor-widget-text-editor\" data-id=\"866fb62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security monitoring and analysis<\/span><\/h3><p>Captures data on the overall state of the system, including endpoint devices and connectivity traffic. This data is then analyzed to detect possible security violations or potential system threats. Once detected, a broad range of actions formulated in the context of an overall system security policy should be executed, such as quarantining devices based on anomalous behavior. This monitor-analyze-act cycle may execute in real time or at a later date to identify usage patterns and detect potential attack scenarios. It is critical to ensure that endpoints devices are secured from possible tampering and data manipulation, which could result in the incorrect reporting of events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-c0773d0\" data-id=\"c0773d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0136bd6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0136bd6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-fd10589\" data-id=\"fd10589\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4231c99\" data-id=\"4231c99\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-191eda5 elementor-widget elementor-widget-image\" data-id=\"191eda5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png\" class=\"attachment-large size-large wp-image-20305\" alt=\"Security Lifecycle Management icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-66cc575\" data-id=\"66cc575\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f53b7a elementor-widget elementor-widget-text-editor\" data-id=\"9f53b7a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security lifecycle management<\/span><\/h3><p>The lifecycle management feature allows service providers and OEMs to control the security aspects of IoT devices when in operation. Rapid over the air (OTA) device key(s) replacement during cyber disaster recovery ensures minimal service disruption. In addition, secure device decommissioning ensures that scrapped devices will not be repurposed and exploited to connect to a service without authorization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-caa93a5\" data-id=\"caa93a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-715d2d2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"715d2d2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9350165\" data-id=\"9350165\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-87bf495 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"87bf495\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3107b63\" data-id=\"3107b63\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ded7ab6 elementor-widget elementor-widget-text-editor\" data-id=\"ded7ab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Rambus Security Solutions for Smart Home IoT Devices<\/h2><p><a href=\"https:\/\/www.rambus.com\/security\/root-of-trust\/\">Root of Trust<\/a> solutions provide the hardware-level foundation for security enabling functions such as secure boot, secure execution of applications, tamper detection and protection, and secure storage and handling of keys.<\/p><p><a href=\"http:\/\/[https:\/\/www.rambus.com\/security\/provisioning-and-key-management\/\" data-wplink-url-error=\"true\">Provisioning and Key Management<\/a> secure supply chain solutions for chip and IoT device manufacturers enable secure key insertion and cloud-based device key management services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Rambus CryptoManager IoT Security Service\u00a0is a turnkey solution for smart home service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":15280,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full.php","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"tags":[],"class_list":{"0":"post-20705","1":"page","2":"type-page","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Smart Home: Threats and Countermeasures - Rambus<\/title>\n<meta name=\"description\" content=\"An estimated 80% of IoT devices are vulnerable to a wide range of attacks. Clearly, connecting traditionally \u2018stand-alone\u2019 smart devices such as lights, appliances and locks introduces numerous cyber security risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rambus.com\/iot\/smart-home\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smart Home: Threats and Countermeasures\" \/>\n<meta property=\"og:description\" content=\"The Rambus CryptoManager IoT Security Service\u00a0is a turnkey solution for smart home service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rambus.com\/iot\/smart-home\/\" \/>\n<meta property=\"og:site_name\" content=\"Rambus\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RambusInc\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-11T21:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@rambusinc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/\",\"url\":\"https:\/\/www.rambus.com\/iot\/smart-home\/\",\"name\":\"Smart Home: Threats and Countermeasures - Rambus\",\"isPartOf\":{\"@id\":\"https:\/\/www.rambus.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png\",\"datePublished\":\"2017-12-21T00:42:55+00:00\",\"dateModified\":\"2023-05-11T21:31:09+00:00\",\"description\":\"An estimated 80% of IoT devices are vulnerable to a wide range of attacks. Clearly, connecting traditionally \u2018stand-alone\u2019 smart devices such as lights, appliances and locks introduces numerous cyber security risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rambus.com\/iot\/smart-home\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures.png\",\"width\":1200,\"height\":675,\"caption\":\"Smart Home Threats and Countermeasures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rambus.com\/iot\/smart-home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rambus.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT\",\"item\":\"https:\/\/www.rambus.com\/iot\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Smart Home: Threats and Countermeasures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rambus.com\/#website\",\"url\":\"https:\/\/www.rambus.com\/\",\"name\":\"Rambus\",\"description\":\"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.\",\"publisher\":{\"@id\":\"https:\/\/www.rambus.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rambus.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rambus.com\/#organization\",\"name\":\"Rambus\",\"url\":\"https:\/\/www.rambus.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"width\":200,\"height\":62,\"caption\":\"Rambus\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RambusInc\",\"https:\/\/x.com\/rambusinc\",\"https:\/\/www.linkedin.com\/company\/rambus\",\"https:\/\/www.youtube.com\/user\/RambusWeb\"],\"description\":\"Rambus is a provider of industry-leading chips and silicon IP.\",\"email\":\"ebiz@rambus.com\",\"telephone\":\"+1-408-462-8000\",\"legalName\":\"Rambus Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Smart Home: Threats and Countermeasures - Rambus","description":"An estimated 80% of IoT devices are vulnerable to a wide range of attacks. Clearly, connecting traditionally \u2018stand-alone\u2019 smart devices such as lights, appliances and locks introduces numerous cyber security risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rambus.com\/iot\/smart-home\/","og_locale":"en_US","og_type":"article","og_title":"Smart Home: Threats and Countermeasures","og_description":"The Rambus CryptoManager IoT Security Service\u00a0is a turnkey solution for smart home service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).","og_url":"https:\/\/www.rambus.com\/iot\/smart-home\/","og_site_name":"Rambus","article_publisher":"https:\/\/www.facebook.com\/RambusInc","article_modified_time":"2023-05-11T21:31:09+00:00","og_image":[{"url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@rambusinc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rambus.com\/iot\/smart-home\/","url":"https:\/\/www.rambus.com\/iot\/smart-home\/","name":"Smart Home: Threats and Countermeasures - Rambus","isPartOf":{"@id":"https:\/\/www.rambus.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage"},"image":{"@id":"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures-1024x576.png","datePublished":"2017-12-21T00:42:55+00:00","dateModified":"2023-05-11T21:31:09+00:00","description":"An estimated 80% of IoT devices are vulnerable to a wide range of attacks. Clearly, connecting traditionally \u2018stand-alone\u2019 smart devices such as lights, appliances and locks introduces numerous cyber security risks.","breadcrumb":{"@id":"https:\/\/www.rambus.com\/iot\/smart-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rambus.com\/iot\/smart-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/iot\/smart-home\/#primaryimage","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2017\/12\/Smart-Home-Threats-and-Countermeasures.png","width":1200,"height":675,"caption":"Smart Home Threats and Countermeasures"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rambus.com\/iot\/smart-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rambus.com\/"},{"@type":"ListItem","position":2,"name":"IoT","item":"https:\/\/www.rambus.com\/iot\/"},{"@type":"ListItem","position":3,"name":"Smart Home: Threats and Countermeasures"}]},{"@type":"WebSite","@id":"https:\/\/www.rambus.com\/#website","url":"https:\/\/www.rambus.com\/","name":"Rambus","description":"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.","publisher":{"@id":"https:\/\/www.rambus.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rambus.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rambus.com\/#organization","name":"Rambus","url":"https:\/\/www.rambus.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","width":200,"height":62,"caption":"Rambus"},"image":{"@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RambusInc","https:\/\/x.com\/rambusinc","https:\/\/www.linkedin.com\/company\/rambus","https:\/\/www.youtube.com\/user\/RambusWeb"],"description":"Rambus is a provider of industry-leading chips and silicon IP.","email":"ebiz@rambus.com","telephone":"+1-408-462-8000","legalName":"Rambus Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/comments?post=20705"}],"version-history":[{"count":0,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20705\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/15280"}],"wp:attachment":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/media?parent=20705"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/tags?post=20705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}