SlideShare a Scribd company logo
DESIGNLINES | INTERNET OF THINGS DESIGNLINE< https://www.eetimes.com/designline/internet-of-things-designline/>
How PUF Technology is Securing IoT
By Nitin Dahad and Maurizio Di Paolo Emillio 03.23.2020 1
More IC vendors are beginning to explore a device-level technology approach for safeguarding data called physically unclonable function, or
PUF. Though silicon production processes are precise, this technology exploits the fact that there are still tiny variations in each circuit
produced. The PUF uses these tiny differences to generate a unique digital value that can be used as a secret keys. Secret keys are essential
for digital security.
Security is increasingly becoming one of the big concerns for developers of connected, or internet of things (IoT), devices, especially with the
huge risk they face from attacks by hackers, or compromises to information and security breaches.
One of the challenges for adding security in an IoT device is how to do so without adding silicon real estate or cost, given the resource
constraints in terms of maintaing minimum power consumption and optimizing the processing resources on the devies.
With an effective implementation of PUF, < https://www.eetimes.eu/why-medical-devices-need-security-and-how-to-achieve-it/> it is
possible to overcome the limits of conventional key storage: the PUF circuitry does not have a battery or other permanent power source.
Attempts to physically probe the key will drastically change the characteristics of that PUF circuit and thus produce a different number. The
PUF key can only be generated when it is needed for a cryptographic operation and can be instantly erased later.
The PUF technology provides advantages in terms of bill-of-materials (BOM) with the strong security of a tamper-proof SRAM. Although PUF
technology alone is not enough to ensure key security, it certainly minimizes the vulnerability of embedded devices.
Recently, we saw product announcements from Maxim Integrated and Silicon Labs for secure devices using PUF technology. Silicon Labs
added new hardware-based security < https://www.eetimes.com/silicon-labs-adds-hardware-security-to-wireless-socs/> for its wireless
systems on chip (SoCs) for IoT devices in its Wireless Gecko Series 2 platform combining security software features with PUF hardware
technology. Maxim Integrated introduced its MAX32520 ChipDNA Secure ARM Cortex-M4 Microcontroller <
https://www.eetimes.com/maxim-intros-mcu-with-puf-technology/> , which similarly incorporates PUF for multiple levels of protection; its
ChipDNA-generated key can be used directly for several functions such as symmetric secret to encrypt/decrypt data stored in the nonvolatile
memory of the secure IC.
A spokseperson for Maxim told EE Times, “The MAX32520 can be used for any applications — even though we pointed out the IoT
applications specifically in the announcement at embedded world, the IC is not limited to IoT applications.” The device addresses several
applications, including industrial, healthcare, computing and IoT.

 
The MAX32520 can implement secure boot for any processor based on its serial flash emulation feature, and provides two additional physical
layers: die shield and physical tamper detection. The chip offers internal flash encryption option. It is used for IP protection and flash data
protection. The strong functions of crypto increase the trust of the device — it supports strong SHA512, ECDSA P521 and RSA 4096. The
MAX32520 utilizes the ChipDNA output as key content to cryptographically secure all device stored data including user firmware. User
firmware encryption provides ultimate software IP protection.
The ChipDNA can also generate a private key for the ECDSA signing operation. The MAX32520 provides a FIPS/NIST compliant TRNG,
environmental and tamper detection circuitry to facilitate system-level security. Any attempt to probe or observe ChipDNA modifies the
characteristics of the underlying circuit, preventing the discovery of the unique value used by the chip’s cryptographic functions. In the same
way, more-exhaustive reverse-engineering attempts are canceled due to the factory conditioning necessary to make the ChipDNA circuit
operational.
Meanwhile, Mike Dow, senior product manager for IoT Security at Silicon Labs explained to
EE Times how they are utilizing PUF technology in its wireless SoCs for IoT devices. “For
the physically unclonable function (PUF) embedded in Silicon Labs’ secure vault and secure
element technologies, we use an SRAM PUF, meaning that it leverages the inherent
randomness of a block of SRAM bits as they are powered up to derive a single symmetric
key that’s unique to the device. We implemented SRAM PUF technology that has the longest
proven track record of reliability in the market. Since the devices our customers deploy in the
field often are operational for more than 10 years, we required PUF technology with a long
history of reliability.”
He said in Silicon Labs’ implementation, it limits the use of the PUF to create a Key
Encryption Key (KEK), which is used to wrap (encrypt) other keys in the system and store
them in internal or external memory. “Because this KEK is only used to access wrapped
keys, the amount of time it is in use is limited, which in turn limits its exposure to many types
of attacks. In addition, the process of reconstructing the KEK only occurs on Power on Reset
(POR) events, further limiting access to the process of generating the key.”
Simplified block diagram of Maxim’s ChipDNA microcontroller (Image: Maxim Integrated)
Mike Dow, Silicon Labs
“In this design, every other key generation besides the KEK is performed by a NIST-compliant true random generator (TRNG), and then the key
is wrapped with AES encryption. Both TRNG and AES technology is common, well understood, tested and verifiable in the security industry.
We also use 256-bit keys for added strength of the AES encryption. We then apply differential power analysis (DPA) side-channel protection on
the AES algorithm to strengthen it further against those attacks. All key material for the device is wrapped in this way including the ECC
private/public identity key pairs generated and stored in one time programmable (OTP) memory.
The ability to store key material securely in almost unlimited internal or external memory is a major advantage when implementing complex
cloud security schemes that require many multiple pairs of asymmetric keys. The alternative is to store the keys in plain text, but this approach
requires very physically secure memories, which are both complex and expensive to protect. Dow commented, “When designing the chip, you
must choose an optimal size of secure memory. Yet, whatever size you choose, it is almost guaranteed to be insufficient over the life of the
product.”
In Silicon Labs design, every other key generation besides the key encryption key is
performed by a NIST-compliant true random generator (TRNG). (Image Silicon Labs)
A PUF creates a secret, random and unique key; the PUF-key encrypts all keys in the
secure key storage, generated at startup and not stored in flash. (Image: Silicon Labs)
INFINEON
Intuitive Sensing – Giving Senses to
Things
Imagine you could interact with devices as you do
with humans. We develop sensor solutions that
give contextual awareness to all kind of smart
devices.
LEARN MORE
PARTNER:
 
He said the other advantage of its secure vault key management scheme is that by using AES encryption, you can also require an initial vector
to feed the algorithm. “This initial vector is like having an additional 128-bit password required to perform any security operation using that key.
This password could then be used by either a human or another application running on our chip to provide a two-factor authentication to use
the key.”
“As an added layer of protection, we have included a sophisticated tamper protection scheme in our secure vault technology that can destroy
the PUF reconstruction data if a tamper is detected. Once the reconstruction data is destroyed, the stored key material can never again be
accessed. This effectively “bricks” the device as no encryption algorithm can now be executed, preventing even a secure boot.”
Silicon Labs chose what it said is the most reliable PUF technology on the market and limited its function to providing only a single KEK to wrap
or unwrap key material. That key can be further protected by requiring another two-factor authentication password. Dow added, “Additionally,
we offer multiple tamper protection sources and can destroy the PUF key, making it useless for decrypting all other keys protected by it. Even if
hackers invest considerable time and resources to reengineer the device and recover the KEK, they have compromised only a single device.”
SPONSORED CONTENT
AD74412R/13R: Quad-
Channel, SW Configurable
Input/Output Circuit
The AD74412R is a quad-
channel software
configurable input/output
solution for building and
process control applications.
The AD74412R contains
functionality for analog output, analog input, digital input,
and resistance temperature detector (RTD) measurements
integrated into a single chip solution with an interface
compatible with the serial port interface (SPI).
Sponsored By Analog Devices

More Related Content

PDF
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
PPTX
The Future of Embedded and IoT Security: Kaspersky Operating System
PDF
RISC-V-Day-Tokyo2018-suzaki
PDF
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
PPTX
Enabling Data Protection through PKI encryption in IoT m-Health Devices
PDF
IoT – Breaking Bad
PDF
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
PPTX
RAT - Kill or Get Killed! by Karan Bansal
ACSAC2020 "Return-Oriented IoT" by Kuniyasu Suzaki
The Future of Embedded and IoT Security: Kaspersky Operating System
RISC-V-Day-Tokyo2018-suzaki
Hardware-assisted Isolated Execution Environment to run trusted OS and applic...
Enabling Data Protection through PKI encryption in IoT m-Health Devices
IoT – Breaking Bad
Next Generation Embedded Systems Security for IOT: Powered by Kaspersky
RAT - Kill or Get Killed! by Karan Bansal

What's hot (20)

PDF
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
PDF
Fixing the Last Missing Piece in Securing IoT
PDF
IoT Security: How Your TV and Thermostat are Attacking the Internet
PDF
Sb securing-industrial-control-systems-with-fortinet
PPTX
Secure Channels Presentation
PPTX
IoT Security - Preparing for the Worst
PDF
Secure Embedded Systems
PDF
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PPTX
Safe and secure autonomous systems
PDF
An overview of the samsung knox platform v1 14
PDF
IoT Security, Mirai Revisited
PDF
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
PDF
IPv6 Security Potpourri
PDF
Creating a successful IoT product with MediaTek Labs
PDF
PDF
01_Metasploit - The Elixir of Network Security
PDF
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
PDF
The samsung knox platform 0
PDF
IoT security is a nightmare. But what is the real risk?
KazHackStan Doing The IoT Penetration Testing - Yogesh Ojha
Fixing the Last Missing Piece in Securing IoT
IoT Security: How Your TV and Thermostat are Attacking the Internet
Sb securing-industrial-control-systems-with-fortinet
Secure Channels Presentation
IoT Security - Preparing for the Worst
Secure Embedded Systems
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Safe and secure autonomous systems
An overview of the samsung knox platform v1 14
IoT Security, Mirai Revisited
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
IPv6 Security Potpourri
Creating a successful IoT product with MediaTek Labs
01_Metasploit - The Elixir of Network Security
Open Source IDS - How to use them as a powerful fee Defensive and Offensive tool
The samsung knox platform 0
IoT security is a nightmare. But what is the real risk?
Ad

Similar to How PUF Technology is Securing Io (20)

PPTX
PDF
Review on security techniques for field programmable gate array
PDF
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
PDF
PUF_lecture1.pdf
PDF
PUF_lecture2.pdf
PDF
PUF_lecture3.pdf
PDF
Physically Unclonable Digital ID
PDF
PUF_lecture4.pdf
PDF
Random Numbers Generator Using Microcontroller PUF
PDF
Digital Security by Design: Physical Unclonable Functions - Gavin McWilliams,...
 
PDF
Design and implementation of secured scan based attacks on ic’s by using on c...
PDF
Design and implementation of secured scan based attacks on ic’s by using on c...
PPTX
A PUF-FSM Binding Scheme for FPGA IP PROTECTION
PPTX
Physically Unclonable Digital ID
PPTX
Physically Unclonable Digital ID
PDF
Synthesis of nanoparticals
PDF
Wrapped rsa cryptography check on window
PDF
IRJET- Enhanced SIT Algorithm for Embedded Systems
PPTX
PUF-Based-Authentication IOB Hackathon PPT
PPTX
PUF-Based-Authentication IOB Hackathon 1
Review on security techniques for field programmable gate array
Modeling arbiter-PUF in NodeMCU ESP8266 using artificial neural network
PUF_lecture1.pdf
PUF_lecture2.pdf
PUF_lecture3.pdf
Physically Unclonable Digital ID
PUF_lecture4.pdf
Random Numbers Generator Using Microcontroller PUF
Digital Security by Design: Physical Unclonable Functions - Gavin McWilliams,...
 
Design and implementation of secured scan based attacks on ic’s by using on c...
Design and implementation of secured scan based attacks on ic’s by using on c...
A PUF-FSM Binding Scheme for FPGA IP PROTECTION
Physically Unclonable Digital ID
Physically Unclonable Digital ID
Synthesis of nanoparticals
Wrapped rsa cryptography check on window
IRJET- Enhanced SIT Algorithm for Embedded Systems
PUF-Based-Authentication IOB Hackathon PPT
PUF-Based-Authentication IOB Hackathon 1
Ad

More from Abacus Technologies (20)

PDF
Cloud Technology Is the Underdog Of The Tech World
PDF
Small Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
PDF
How to Improve Your Cloud and Container Security
PDF
Controlling cloud infrastructure costs: Tips & tricks
PDF
Does AI-driven cloud computing need ethics guidelines?
PDF
How the hybrid cloud is key to enterprise AI infrastructure strategies
PDF
Cloud Computing in Defence: Defence Trends
PDF
Remote Work Trends: How Cloud Computing Security Changed
PDF
Overcoming Digital Transformation Challenges With The Cloud
PDF
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
PDF
5 best cloud computing certification courses in the U.S.
PDF
The 9 Best Cloud Computing Events and Conferences to Attend in 2021
PDF
Top 7 security mistakes when migrating to cloud-based apps
PDF
5 programming languages cloud engineers should learn
PDF
10 Fastest-growing cybersecurity skills to learn in 2021
PDF
Cybersecurity Is Not (Just) a Tech Problem
PDF
9 Tips to Prepare for the Future of Cloud & Network Security
PDF
Hybrid cloud strategy: 5 expert tips
PDF
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
PDF
The way a team functions and communicates
Cloud Technology Is the Underdog Of The Tech World
Small Business Owners: Eight Impactful Reasons To Leverage Cloud Technology
How to Improve Your Cloud and Container Security
Controlling cloud infrastructure costs: Tips & tricks
Does AI-driven cloud computing need ethics guidelines?
How the hybrid cloud is key to enterprise AI infrastructure strategies
Cloud Computing in Defence: Defence Trends
Remote Work Trends: How Cloud Computing Security Changed
Overcoming Digital Transformation Challenges With The Cloud
Why is Cloud Computing Important for Companies that Want to Deploy IoT Soluti...
5 best cloud computing certification courses in the U.S.
The 9 Best Cloud Computing Events and Conferences to Attend in 2021
Top 7 security mistakes when migrating to cloud-based apps
5 programming languages cloud engineers should learn
10 Fastest-growing cybersecurity skills to learn in 2021
Cybersecurity Is Not (Just) a Tech Problem
9 Tips to Prepare for the Future of Cloud & Network Security
Hybrid cloud strategy: 5 expert tips
14 Pro Tips For Efficiently Tracking Tech Bugs And Issues
The way a team functions and communicates

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Encapsulation theory and applications.pdf
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
cuic standard and advanced reporting.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Network Security Unit 5.pdf for BCA BBA.
Encapsulation theory and applications.pdf
Teaching material agriculture food technology
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Agricultural_Statistics_at_a_Glance_2022_0.pdf
cuic standard and advanced reporting.pdf

How PUF Technology is Securing Io

  • 1. DESIGNLINES | INTERNET OF THINGS DESIGNLINE< https://www.eetimes.com/designline/internet-of-things-designline/> How PUF Technology is Securing IoT By Nitin Dahad and Maurizio Di Paolo Emillio 03.23.2020 1 More IC vendors are beginning to explore a device-level technology approach for safeguarding data called physically unclonable function, or PUF. Though silicon production processes are precise, this technology exploits the fact that there are still tiny variations in each circuit produced. The PUF uses these tiny differences to generate a unique digital value that can be used as a secret keys. Secret keys are essential for digital security. Security is increasingly becoming one of the big concerns for developers of connected, or internet of things (IoT), devices, especially with the huge risk they face from attacks by hackers, or compromises to information and security breaches. One of the challenges for adding security in an IoT device is how to do so without adding silicon real estate or cost, given the resource constraints in terms of maintaing minimum power consumption and optimizing the processing resources on the devies. With an effective implementation of PUF, < https://www.eetimes.eu/why-medical-devices-need-security-and-how-to-achieve-it/> it is possible to overcome the limits of conventional key storage: the PUF circuitry does not have a battery or other permanent power source. Attempts to physically probe the key will drastically change the characteristics of that PUF circuit and thus produce a different number. The PUF key can only be generated when it is needed for a cryptographic operation and can be instantly erased later. The PUF technology provides advantages in terms of bill-of-materials (BOM) with the strong security of a tamper-proof SRAM. Although PUF technology alone is not enough to ensure key security, it certainly minimizes the vulnerability of embedded devices. Recently, we saw product announcements from Maxim Integrated and Silicon Labs for secure devices using PUF technology. Silicon Labs added new hardware-based security < https://www.eetimes.com/silicon-labs-adds-hardware-security-to-wireless-socs/> for its wireless systems on chip (SoCs) for IoT devices in its Wireless Gecko Series 2 platform combining security software features with PUF hardware technology. Maxim Integrated introduced its MAX32520 ChipDNA Secure ARM Cortex-M4 Microcontroller < https://www.eetimes.com/maxim-intros-mcu-with-puf-technology/> , which similarly incorporates PUF for multiple levels of protection; its ChipDNA-generated key can be used directly for several functions such as symmetric secret to encrypt/decrypt data stored in the nonvolatile memory of the secure IC. A spokseperson for Maxim told EE Times, “The MAX32520 can be used for any applications — even though we pointed out the IoT applications specifically in the announcement at embedded world, the IC is not limited to IoT applications.” The device addresses several applications, including industrial, healthcare, computing and IoT.   
  • 2. The MAX32520 can implement secure boot for any processor based on its serial flash emulation feature, and provides two additional physical layers: die shield and physical tamper detection. The chip offers internal flash encryption option. It is used for IP protection and flash data protection. The strong functions of crypto increase the trust of the device — it supports strong SHA512, ECDSA P521 and RSA 4096. The MAX32520 utilizes the ChipDNA output as key content to cryptographically secure all device stored data including user firmware. User firmware encryption provides ultimate software IP protection. The ChipDNA can also generate a private key for the ECDSA signing operation. The MAX32520 provides a FIPS/NIST compliant TRNG, environmental and tamper detection circuitry to facilitate system-level security. Any attempt to probe or observe ChipDNA modifies the characteristics of the underlying circuit, preventing the discovery of the unique value used by the chip’s cryptographic functions. In the same way, more-exhaustive reverse-engineering attempts are canceled due to the factory conditioning necessary to make the ChipDNA circuit operational. Meanwhile, Mike Dow, senior product manager for IoT Security at Silicon Labs explained to EE Times how they are utilizing PUF technology in its wireless SoCs for IoT devices. “For the physically unclonable function (PUF) embedded in Silicon Labs’ secure vault and secure element technologies, we use an SRAM PUF, meaning that it leverages the inherent randomness of a block of SRAM bits as they are powered up to derive a single symmetric key that’s unique to the device. We implemented SRAM PUF technology that has the longest proven track record of reliability in the market. Since the devices our customers deploy in the field often are operational for more than 10 years, we required PUF technology with a long history of reliability.” He said in Silicon Labs’ implementation, it limits the use of the PUF to create a Key Encryption Key (KEK), which is used to wrap (encrypt) other keys in the system and store them in internal or external memory. “Because this KEK is only used to access wrapped keys, the amount of time it is in use is limited, which in turn limits its exposure to many types of attacks. In addition, the process of reconstructing the KEK only occurs on Power on Reset (POR) events, further limiting access to the process of generating the key.” Simplified block diagram of Maxim’s ChipDNA microcontroller (Image: Maxim Integrated) Mike Dow, Silicon Labs
  • 3. “In this design, every other key generation besides the KEK is performed by a NIST-compliant true random generator (TRNG), and then the key is wrapped with AES encryption. Both TRNG and AES technology is common, well understood, tested and verifiable in the security industry. We also use 256-bit keys for added strength of the AES encryption. We then apply differential power analysis (DPA) side-channel protection on the AES algorithm to strengthen it further against those attacks. All key material for the device is wrapped in this way including the ECC private/public identity key pairs generated and stored in one time programmable (OTP) memory. The ability to store key material securely in almost unlimited internal or external memory is a major advantage when implementing complex cloud security schemes that require many multiple pairs of asymmetric keys. The alternative is to store the keys in plain text, but this approach requires very physically secure memories, which are both complex and expensive to protect. Dow commented, “When designing the chip, you must choose an optimal size of secure memory. Yet, whatever size you choose, it is almost guaranteed to be insufficient over the life of the product.” In Silicon Labs design, every other key generation besides the key encryption key is performed by a NIST-compliant true random generator (TRNG). (Image Silicon Labs) A PUF creates a secret, random and unique key; the PUF-key encrypts all keys in the secure key storage, generated at startup and not stored in flash. (Image: Silicon Labs)
  • 4. INFINEON Intuitive Sensing – Giving Senses to Things Imagine you could interact with devices as you do with humans. We develop sensor solutions that give contextual awareness to all kind of smart devices. LEARN MORE PARTNER:   He said the other advantage of its secure vault key management scheme is that by using AES encryption, you can also require an initial vector to feed the algorithm. “This initial vector is like having an additional 128-bit password required to perform any security operation using that key. This password could then be used by either a human or another application running on our chip to provide a two-factor authentication to use the key.” “As an added layer of protection, we have included a sophisticated tamper protection scheme in our secure vault technology that can destroy the PUF reconstruction data if a tamper is detected. Once the reconstruction data is destroyed, the stored key material can never again be accessed. This effectively “bricks” the device as no encryption algorithm can now be executed, preventing even a secure boot.” Silicon Labs chose what it said is the most reliable PUF technology on the market and limited its function to providing only a single KEK to wrap or unwrap key material. That key can be further protected by requiring another two-factor authentication password. Dow added, “Additionally, we offer multiple tamper protection sources and can destroy the PUF key, making it useless for decrypting all other keys protected by it. Even if hackers invest considerable time and resources to reengineer the device and recover the KEK, they have compromised only a single device.” SPONSORED CONTENT AD74412R/13R: Quad- Channel, SW Configurable Input/Output Circuit The AD74412R is a quad- channel software configurable input/output solution for building and process control applications. The AD74412R contains functionality for analog output, analog input, digital input, and resistance temperature detector (RTD) measurements integrated into a single chip solution with an interface compatible with the serial port interface (SPI). Sponsored By Analog Devices