Cyber Security featured image
The increasing need for cyber security in Automotive domain was discussed in our previous blog, We investigated different mechanisms by which a hacker could exploit an ECU, like compromising the in-vehicle communication network, gaining unauthorized access to vehicle, tampering ECU firmware and rogue software updates.

Software Crypto Stack for Automotive ECUs

The increasing need for cybersecurity in Automotive domain was discussed in our previous blog, Cybersecurity for Automotive ECUs – An Introduction. We investigated different mechanisms by which a hacker could exploit an ECU, like compromising the in-vehicle communication network, gaining unauthorized access to vehicle, tampering ECU firmware and rogue software updates. The blog covered threats that could be prevented by implementing features such as encrypting data transmitted within the vehicle (Secure On-Board Communication), securing access to vehicle diagnostics, authenticating the firmware before installation. These implementations make use of AUTOSAR Crypto Stack to facilitate cryptographic services like computation of hashes, asymmetrical signature verification, symmetric encryption of data, among others. Hardware and software-based implementation also makes use of additional hardware components like Hardware Security Module (HSM), Security Hardware Extension (SHE), to implement the cryptographic algorithms. These modules use stacks provided by third party vendors like Vector, Elektrobit & ETAS, to implement the firmware.

In this blog, we will deep dive into configurations that need to be done in AUTOSAR Crypto stack and the major crypto related configurations that a typical firmware stack of a hardware component like HSM will contain.

AUTOSAR Crypto Stack - General Configuration & Usage

AUTOSAR provides cryptographic services like computation of hashes, verification of asymmetrical signatures or symmetric encryption of data. This is done using Crypto stack which includes Crypto Service Manager (Csm), Crypto Interface (CryIf) and Crypto Driver (Crypto).

Fig 1
Fig 1: AUTOSAR Crypto Stack (Courtesy: AUTOSAR Utilization of Crypto Services)

Crypto Service Manager (CSM):

Topmost layer of Service layer provides abstraction to the lower layers and access to cryptographic services to applications via RTE port mechanism.

This module is initialized by BSWM (Basic Software Manager). Csm provides API for manual null initialization of RAM variables. CSM provides one main function which is called cyclically at a task level when asynchronous processing is enabled. The main function is responsible for dispatching new jobs to the underlying CryIf and Crypto layers.

The different parameters that are configured in Csm include:
CsmPrimitives: These are static configurations which are used to define a cryptographic operation. The main configurations include algorithm family, algorithm key length, data length, result length, processing mode (asynchronous/synchronous), key reference and more.

Fig 2
Fig 2: Example of Csm primitive for CMAC generation (Courtesy Davinci Configurator)

CsmJobs: Primitives are assigned to Jobs which in turn determine further attributes like priority, mode of execution (asynchronous/synchronous) and what keys to be used for operation.

CsmKeys: These are references to keys present in Crypto driver.

CsmQueues: CsmJobs are configured in queues according to configured job’s priority. It also contains reference to CryIf channel.

 

Crypto Interface (CryIf)

This module resides in hardware abstraction layer and is responsible for mapping the features requested by Csm to features provided by registered Crypto modules. Like Csm, initialization of CryIf is done by BSWM. CryIf does not provide a main function; so all calls are synchronous in nature.

The major parameters in CryIf module are:

CryIfChannels: These are paths from Csm queue via the CryIf to a specific Crypto driver object. The main configurations include a reference to the corresponding Crypto driver object and channel id.

 

CryIfCryptoModules: CryIf can handle multiple Crypto driver objects at the same time. For e.g., one could be an external hardware module, and another could be holding a software library. The main configurations include reference to Crypto driver object.

Fig 3: Example of CryIf Crypto module configuration (Courtesy Davinci Configurator)


CryIfKeys:
These are references to keys present in lower Crypto driver.

Crypto Driver (Crypto):

The Crypto driver is invoked by CryIf and performs the specific cryptographic functionality. It offers a superset of algorithms which can be extended by custom algorithms. Multiple crypto driver objects can be configured in crypto driver for e.g., one could be an external hardware module and other could be a software library. Each driver object can provide many crypto primitives. Each driver object can perform only on Crypto Primitive at the same time.

Below are the major configurations to be done in the Crypto driver:

Pre-Configuration: Vendor of the Crypto driver will provide a pre-configuration file which will represent the capabilities of the Crypto driver. The file will be in BSWMD file format.

CryptoDriverObjects: A Crypto driver object represents an instance of independent crypto hardware device. There could be multiple driver objects configured. Some of the major configurations for driver objects include buffer size [size of the buffer allocated in global RAM for each driver object] and queue size [maximum number of jobs supported by the driver object queue].

CryptoKeyElements:  KeyElements contain the configurations for each cryptographic key. For example, seed state for random number generation, an initialization vector, and so on. A single key can have more than one key element. Major configurations for key elements include initialization value which will be used during initialization, key element size and configuration for persisting key elements in NV memory. Another major configuration includes read & write access for the key elements i.e., if the key elements can be accessed from outside the Crypto driver or not.

CryptoKeyTypes: Key types consist of references to the Cryptokey elements. These are pre-configured by the Crypto driver vendor.

CryptoKeys: Here key configurations just include references to the key types configured.

CryptoPrimitives: These are instances of configured cryptographic algorithms realized in Crypto driver. Configurations for Crypto primitives include algorithm family (AES, MD5, RSA) algorithm mode (ECB, CBC) primitive service to be used (Signature Verification, Key generation).

NvMKeyConfigurations: For each Crypto key element which requires persisting NV storage requires an NV block to be configured in NVRAM Manager. The corresponding NVM blocks are referenced in the NvMKeyConfigurations.

Fig 4: Structural overview and basic workflow

The application component requests a cryptographic service of the Csm providing the necessary data and the id of the CsmJob which will be performed in the underlying CryptoDriverObject. The CsmJob contains all computational parameters for performing the cryptographic operation. At configuration time, each CsmJob is assigned to a CsmQueue, regardless of processing type (synchronous or asynchronous) of the job. Each CsmQueue is mapped to CryIfQueue and a CryIfQueue itself is mapped to a CryptoDriverObject of a crypto driver. At the crypto layer, multiple Crypto driver objects can exist simultaneously and do not interfere each other. The CryptoDriverObject must allocate the required workspace and support the cryptographic operational in general. A job in computation occupies the cryptographic workspace of the cryptographic service; therefore, jobs running in the same crypto driver object are processed in serialized fashion, whereas jobs running in different crypto driver objects or jobs of different cryptographic type may run in parallel.

HSM Crypto Stack - General Configuration

The advantage of using a hardware component like HSM to facilitate cryptographic algorithms is multifold, as it can:

  • provide security services for the application
  • store keys and certificates there by isolating them from the rest of the application
  • manage keys and certificates
  • execute cryptographic algorithm using hardware/software implementations
 
      Hardware components such as HSM use the firmware provided by the third-party vendors which includes multiple stacks based on the use cases. Most of the stacks are implemented in a modular and flexible manner which makes it easier to integrate into an AUTOSAR environment.
 

Now let’s look at the major configurations that are needed for facilitating cryptographic algorithms in a typical firmware stack of HSM.

Communication Registers: Generally, two registers are used to share information between application and HSM core, HSM2HOST register and HOST2HSM register. These are used to indicate startup of HSM, HSM is ready to receive interrupts, the initialization of the IPC memory etc. The addresses of these two registers need to be configured based on the controller and it must be ensured that no other software entity is using these registers.

HSM IPC: HSM uses Inter Process Communication (IPC) for communicating between application core and HSM core. The interface is placed in a shared RAM of microcontroller to which both HSM and application cores have access to. Each core using the security services needs to have a separate IPC instance. Parameters like number of IPC channels to be used, IPC protocol version etc., need to be configured for each IPC instance.

Memory Access: The memory areas that should be accessible by the HSM core should be whitelisted and should be regarded as valid memory for input/output depending on configuration. Parameters like memory priority, access rights, users, start and stop addresses should be configured for these memory regions.

 

Fig 5: Example of memory region configurations (Courtesy Davinci Configurator)

HSM Interrupts: The application core triggers the interrupts when a new job is issued to the HSM. The HSM notifies the application core about a completed operation with the response interrupt. This interrupt communication is needed if OS is used. In that case, the interrupt set address, clear address etc., needs to be configured. Further, the interrupt mode, category should also be configured.

Crypto Driver Objects: Multiple driver objects that provide different functionality for e.g., secure start up implementation, software library, access to hardware accelerators, key storage etc. can be configured in HSM. Each driver will be providing access to different primitives. A primitive is a description of a cryptographic algorithm. Each primitive has certain parameters like algorithm family, mode etc. These primitives must be mapped for each driver object.

CryptoKeys: As with the AUTOSAR Crypto stack, new keys can be added, and it should include a reference to the key type. Apart from this, a reference to the non-volatile memory block can also be provided for persistent storage. Persistence of crypto keys could be achieved through an AUTOSAR like memory stack containing NvM, Fls, Fee modules.

CryptoKeyTypes: A key type is a structure containing a list of key elements.

CryptoKeyElements: Each key element has parameters like size, initialization value, read/write access, persistency configuration etc. The details of the NV block like the descriptor, id of the block, size etc., also need to be configured.

CryIf: This is responsible for dispatching crypto jobs internally to different crypto drivers by defining CryIf channels. These channel configurations do not have to match the host channel configurations. CryIf is also the source for key configuration exported to pre-config file. Each CryIf channel should be mapped to a corresponding Crypto driver object.

Csm: As with the AUTOSAR Crypto stack, HSM stack can also have a CSM module in which jobs & primitives for internal usage can be configured.

 

All these crypto configurations will be available in the pre-config file generated with the above-mentioned configurations. This pre-config file is then loaded in the host side to establish proper communication between the HSM and the application. In normal use cases, this pre-config file is first loaded, and the crypto stack configuration is done using a bottom-up approach at the host side i.e., the configurations are started from the lower most layer (Crypto driver) and then propagated to the upper layers (CryIf, Csm).

Conclusion

In the above sections, we discussed the major configurations to be done in AUTOSAR Crypto stack and how crypto configurations in a typical firmware stack of a hardware component like HSM look like. These stacks facilitate implementation of cryptographic algorithms for Secure On-Board Communication, Secure Diagnostics and Secure Boot.

Watch out for our upcoming blog where we will explore how Secure On-Board Communication can be implemented in AUTOSAR with the help of the stacks discussed here.

References

  • AUTOSAR Specification of Crypto Service Manager
  • AUTOSAR Specification of Crypto Driver
  • AUTOSAR_EXP_UtilizationOfCryptoServices
  • AUTOSAR_SRS_CryptoStack.pdf
Scroll to Top

Human Pose Detection & Classification

Some Buildings in a city

Features:

  • Suitable for real time detection on edge devices
  • Detects human pose / key points and recognizes movement / behavior
  • Light weight deep learning models with good accuracy and performance

Target Markets:

  • Patient Monitoring in Hospitals
  • Surveillance
  • Sports/Exercise Pose Estimation
  • Retail Analytics

OCR / Pattern Recognition

Some Buildings in a city

Use cases :

  • Analog dial reading
  • Digital meter reading
  • Label recognition
  • Document OCR

Highlights :

  • Configurable for text or pattern recognition
  • Simultaneous Analog and Digital Dial reading
  • Lightweight implementation

Behavior Monitoring

Some Buildings in a city

Use cases :

  • Fall Detection
  • Social Distancing

Highlights :

  • Can define region of interest to monitor
  • Multi-subject monitoring
  • Multi-camera monitoring
  • Alarm triggers

Attire & PPE Detection

Some Buildings in a city

Use cases :

  • PPE Checks
  • Disallowed attire checks

Use cases :

  • Non-intrusive adherence checks
  • Customizable attire checks
  • Post-deployment trainable

 

Request for Video





    Real Time Color Detection​

    Use cases :

    • Machine vision applications such as color sorter or food defect detection

    Highlights :

    • Color detection algorithm with real time performance
    • Detects as close to human vison as possible including color shade discrimination
    • GPGPU based algorithm on NVIDIA CUDA and Snapdragon Adreno GPU
    • Extremely low latency (a few 10s of milliseconds) for detection
    • Portable onto different hardware platforms

    Missing Artifact Detection

    Use cases :

    • Detection of missing components during various stages of manufacturing of industrial parts
    • Examples include : missing nuts and bolts, missing ridges, missing grooves on plastic and metal blocks

    Highlights :

    • Custom neural network and algorithms to achieve high accuracy and inference speed
    • Single-pass detection of many categories of missing artifacts
    • In-field trainable neural networks with dynamic addition of new artifact categories
    • Implementation using low cost cameras and not expensive machine-vision cameras
    • Learning via the use of minimal training sets
    • Options to implement the neural network on GPU or CPU based systems

    Real Time Manufacturing Line Inspection

    Use cases :

    • Detection of defects on the surface of manufactured goods (metal, plastic, glass, food, etc.)
    • Can be integrated into the overall automated QA infrastructure on an assembly line.

    Highlights :

    • Custom neural network and algorithms to achieve high accuracy and inference speed
    • Use of consumer or industrial grade cameras
    • Requires only a few hundred images during the training phase
    • Supports incremental training of the neural network with data augmentation
    • Allows implementation on low cost GPU or CPU based platforms

    Ground Based Infrastructure analytics

    Some Buildings in a city

    Use cases :

    • Rail tracks (public transport, mining, etc.)
    • Highways
    • Tunnels

    Highlights :

    • Analysis of video and images from 2D & 3D RGB camera sensors
    • Multi sensor support (X-ray, thermal, radar, etc.)
    • Detection of anomalies in peripheral areas of core infrastructure (Ex: vegetation or stones near rail tracks)

    Aerial Analytics

    Use cases :

    • Rail track defect detection
    • Tower defect detection: Structural analysis of Power
      transmission towers
    • infrastructure mapping

    Highlights :

    • Defect detection from a distance
    • Non-intrusive
    • Automatic video capture with perfectly centered ROI
    • No manual intervention is required by a pilot for
      camera positioning

    SANJAY JAYAKUMAR

    Co-founder & CEO

     

    Founder and Managing director of Ignitarium, Sanjay has been responsible for defining Ignitarium’s core values, which encompass the organisation’s approach towards clients, partners, and all internal stakeholders, and in establishing an innovation and value-driven organisational culture.

     

    Prior to founding Ignitarium in 2012, Sanjay spent the initial 22 years of his career with the VLSI and Systems Business unit at Wipro Technologies. In his formative years, Sanjay worked in diverse engineering roles in Electronic hardware design, ASIC design, and custom library development. Sanjay later handled a flagship – multi-million dollar, 600-engineer strong – Semiconductor & Embedded account owning complete Delivery and Business responsibility.

     

    Sanjay graduated in Electronics and Communication Engineering from College of Engineering, Trivandrum, and has a Postgraduate degree in Microelectronics from BITS Pilani.

     

    Request Free Demo




      RAMESH EMANI Board Member

      RAMESH EMANI

      Board Member

      Ramesh was the Founder and CEO of Insta Health Solutions, a software products company focused on providing complete hospital and clinic management solutions for hospitals and clinics in India, the Middle East, Southeast Asia, and Africa. He raised Series A funds from Inventus Capital and then subsequently sold the company to Practo Technologies, India. Post-sale, he held the role of SVP and Head of the Insta BU for 4 years. He has now retired from full-time employment and is working as a consultant and board member.

       

      Prior to Insta, Ramesh had a 25-year-long career at Wipro Technologies where he was the President of the $1B Telecom and Product Engineering Solutions business heading a team of 19,000 people with a truly global operations footprint. Among his other key roles at Wipro, he was a member of Wipro's Corporate Executive Council and was Chief Technology Officer.

       

      Ramesh is also an Independent Board Member of eMIDs Technologies, a $100M IT services company focused on the healthcare vertical with market presence in the US and India.

       

      Ramesh holds an M-Tech in Computer Science from IIT-Kanpur.

      MALAVIKA GARIMELLA​

      General Manager - Marketing

      A professional with a 14-year track record in technology marketing, Malavika heads marketing in Ignitarium. Responsible for all branding, positioning and promotional initiatives in the company, she has collaborated with technical and business teams to further strengthen Ignitarium's positioning as a key E R&D services player in the ecosystem.

      Prior to Ignitarium, Malavika has worked in with multiple global tech startups and IT consulting companies as a marketing consultant. Earlier, she headed marketing for the Semiconductor & Systems BU at Wipro Technologies and worked at IBM in their application software division.

      Malavika completed her MBA in Marketing from SCMHRD, Pune, and holds a B.E. degree in Telecommunications from RVCE, Bengaluru.

       

      PRADEEP KUMAR LAKSHMANAN

      VP - Operations

      Pradeep comes with an overall experience of 26 years across IT services and Academia. In his previous role at Virtusa, he played the role of Delivery Leader for the Middle East geography. He has handled complex delivery projects including the transition of large engagements, account management, and setting up new delivery centers.

      Pradeep graduated in Industrial Engineering and Management, went on to secure an MBA from CUSAT, and cleared UGN Net in Management. He also had teaching stints at his alma mater, CUSAT, and other management institutes like DCSMAT. A certified P3O (Portfolio, Program & Project Management) from the Office of Government Commerce, UK, Pradeep has been recognized for key contributions in the Management domain, at his previous organizations, Wipro & Virtusa.

      In his role as the Head of Operations at Ignitarium, Pradeep leads and manages operational functions such as Resource Management, Procurement, Facilities, IT Infrastructure, and Program Management office.

       

      SONA MATHEW Director – Human Resources

      SONA MATHEW

      AVP – Human Resources

      Sona heads Human Resource functions - Employee Engagement, HR Operations and Learning & Development – at Ignitarium. Her expertise include deep and broad experience in strategic people initiatives, performance management, talent transformation, talent acquisition, people engagement & compliance in the Information Technology & Services industry.

       

      Prior to Ignitarium, Sona has had held diverse HR responsibilities at Litmus7, Cognizant and Wipro.

       

      Sona graduated in Commerce from St. Xaviers College and did her MBA in HR from PSG College of Technology.

       

      ASHWIN RAMACHANDRAN

      Vice President - Sales

      As VP of Sales, Ashwin is responsible for Ignitarium’s go-to-market strategy, business, client relationships, and customer success in the Americas. He brings in over a couple of decades of experience, mainly in the product engineering space with customers from a wide spectrum of industries, especially in the Hi-Tech/semiconductor and telecom verticals.

       

      Ashwin has worked with the likes of Wipro, GlobalLogic, and Mastek, wherein unconventional and creative business models were used to bring in non-linear revenue. He has strategically diversified, de-risked, and grown his portfolios during his sales career.

       

      Ashwin strongly believes in the customer-first approach and works to add value and enhance the experiences of our customers.

       

      AZIF SALY Director – Sales

      AZIF SALY

      Vice President – Sales & Business Development

      Azif is responsible for go-to-market strategy, business development and sales at Ignitarium. Azif has over 14 years of cross-functional experience in the semiconductor product & service spaces and has held senior positions in global client management, strategic account management and business development. An IIM-K alumnus, he has been associated with Wipro, Nokia and Sankalp in the past.

       

      Azif handled key accounts and sales process initiatives at Sankalp Semiconductors. Azif has pursued entrepreneurial interests in the past and was associated with multiple start-ups in various executive roles. His start-up was successful in raising seed funds from Nokia, India. During his tenure at Nokia, he played a key role in driving product evangelism and customer success functions for the multimedia division.

       

      At Wipro, he was involved in customer engagement with global customers in APAC and US.

       

      RAJU KUNNATH Vice President – Enterprise & Mobility

      RAJU KUNNATH

      Distinguished Engineer – Digital

      At Ignitarium, Raju's charter is to architect world class Digital solutions at the confluence of Edge, Cloud and Analytics. Raju has over 25 years of experience in the field of Telecom, Mobility and Cloud. Prior to Ignitarium, he worked at Nokia India Pvt. Ltd. and Sasken Communication Technologies in various leadership positions and was responsible for the delivery of various developer platforms and products.

       

      Raju graduated in Electronics Engineering from Model Engineering College, Cochin and has an Executive Post Graduate Program (EPGP) in Strategy and Finance from IIM Kozhikode.

       

      PRADEEP SUKUMARAN Vice President – Business Strategy & Marketing

      PRADEEP SUKUMARAN

      Vice President - Software Engineering

      Pradeep heads the Software Engineering division, with a charter to build and grow a world-beating delivery team. He is responsible for all the software functions, which includes embedded & automotive software, multimedia, and AI & Digital services

      At Ignitarium, he was previously part of the sales and marketing team with a special focus on generating a sales pipeline for Vision Intelligence products and services, working with worldwide field sales & partner ecosystems in the U.S  Europe, and APAC.

      Prior to joining Ignitarium in 2017, Pradeep was Senior Solutions Architect at Open-Silicon, an ASIC design house. At Open-Silicon, where he spent a good five years, Pradeep was responsible for Front-end, FPGA, and embedded SW business development, marketing & technical sales and also drove the IoT R&D roadmap. Pradeep started his professional career in 2000 at Sasken, where he worked for 11 years, primarily as an embedded multimedia expert, and then went on to lead the Multimedia software IP team.

      Pradeep is a graduate in Electronics & Communication from RVCE, Bangalore.

       

      SUJEET SREENIVASAN Vice President – Embedded

      SUJEET SREENIVASAN

      Vice President – Automotive Technology

       

      Sujeet is responsible for driving innovation in Automotive software, identifying Automotive technology trends and advancements, evaluating their potential impact, and development of solutions to meet the needs of our Automotive customers.

      At Ignitarium, he was previously responsible for the growth and P&L of the Embedded Business unit focusing on Multimedia, Automotive, and Platform software.

      Prior to joining Ignitarium in 2016, Sujeet has had a career spanning more than 16 years at Wipro. During this stint, he has played diverse roles from Solution Architect to Presales Lead covering various domains. His technical expertise lies in the areas of Telecom, Embedded Systems, Wireless, Networking, SoC modeling, and Automotive. He has been honored as a Distinguished Member of the Technical Staff at Wipro and has multiple patents granted in the areas of Networking and IoT Security.

      Sujeet holds a degree in Computer Science from Government Engineering College, Thrissur.

       

      RAJIN RAVIMONY Distinguished Engineer

      RAJIN RAVIMONY

      Distinguished Engineer

       

      At Ignitarium, Rajin plays the role of Distinguished Engineer for complex SoCs and systems. He's an expert in ARM-based designs having architected more than a dozen SoCs and played hands-on design roles in several tens more. His core areas of specialization include security and functional safety architecture (IEC61508 and ISO26262) of automotive systems, RTL implementation of math intensive signal processing blocks as well as design of video processing and related multimedia blocks.

       

      Prior to Ignitarium, Rajin worked at Wipro Technologies for 14 years where he held roles of architect and consultant for several VLSI designs in the automotive and consumer domains.

       

      Rajin holds an MS in Micro-electronics from BITS Pilani.

       

      SIBY ABRAHAM Executive Vice President, Strategy

      SIBY ABRAHAM

      Executive Vice President, Strategy

       

      As EVP, of Strategy at Ignitarium, Siby anchors multiple functions spanning investor community relations, business growth, technology initiatives as well and operational excellence.

       

      Siby has over 31 years of experience in the semiconductor industry. In his last role at Wipro Technologies, he headed the Semiconductor Industry Practice Group where he was responsible for business growth and engineering delivery for all of Wipro’s semiconductor customers. Prior to that, he held a vast array of crucial roles at Wipro including Chief Technologist & Vice President, CTO Office, Global Delivery Head for Product Engineering Services, Business Head of Semiconductor & Consumer Electronics, and Head of Unified Competency Framework. He was instrumental in growing Wipro’s semiconductor business to over $100 million within 5 years and turning around its Consumer Electronics business in less than 2 years. In addition, he was the Engineering Manager for Enthink Inc., a semiconductor IP-focused subsidiary of Wipro. Prior to that, Siby was the Technical Lead for several of the most prestigious system engineering projects executed by Wipro R&D.

       

      Siby has held a host of deeply impactful positions, which included representing Wipro in various World Economic Forum working groups on Industrial IOT and as a member of IEEE’s IOT Steering Committee.

       

      He completed his MTech. in Electrical Engineering (Information and Control) from IIT, Kanpur and his BTech. from NIT, Calicut

       

      SUJEETH JOSEPH Chief Product Officer

      SUJEETH JOSEPH

      Chief Technology Officer

       

      As CTO, Sujeeth is responsible for defining the technology roadmap, driving IP & solution development, and transitioning these technology components into practically deployable product engineering use cases.

       

      With a career spanning over 30+ years, Sujeeth Joseph is a semiconductor industry veteran in the SoC, System and Product architecture space. At SanDisk India, he was Director of Architecture for the USD $2B Removable Products Group. Simultaneously, he also headed the SanDisk India Patenting function, the Retail Competitive Analysis Group and drove academic research programs with premier Indian academic Institutes. Prior to SanDisk, he was Chief Architect of the Semiconductor & Systems BU (SnS) of Wipro Technologies. Over a 19-year career at Wipro, he has played hands-on and leadership roles across all phases of the ASIC and System design flow.

       

      He graduated in Electronics Engineering from Bombay University in 1991.

       

      SUJITH MATHEW IYPE Co-founder & CTO

      SUJITH MATHEW IYPE

      Co-founder & COO

       

      As Ignitarium's Co-founder and COO, Sujith is responsible for driving the operational efficiency and streamlining process across the organization. He is also responsible for the growth and P&L of the Semiconductor Business Unit.

       

      Apart from establishing a compelling story in VLSI, Sujith was responsible for Ignitarium's foray into nascent technology areas like AI, ML, Computer Vision, and IoT, nurturing them in our R&D Lab - "The Crucible".

       

      Prior to founding Ignitarium, Sujith played the role of a VLSI architect at Wipro Technologies for 13 years. In true hands-on mode, he has built ASICs and FPGAs for the Multimedia, Telecommunication, and Healthcare domains and has provided technical leadership for many flagship projects executed by Wipro.

       

      Sujith graduated from NIT - Calicut in the year 2000 in Electronics and Communications Engineering and thereafter he has successfully completed a one-year executive program in Business Management from IIM Calcutta.

       

      RAMESH SHANMUGHAM Co-founder & COO

      RAMESH SHANMUGHAM

      Co-founder & CRO

      As Co-founder and Chief Revenue Officer of Ignitarium, Ramesh has been responsible for global business and marketing as well as building trusted customer relationships upholding the company's core values.

      Ramesh has over 25 years of experience in the Semiconductor Industry covering all aspects of IC design. Prior to Ignitarium, Ramesh was a key member of the senior management team of the semiconductor division at Wipro Technologies. Ramesh has played key roles in Semiconductor Delivery and Pre-sales at a global level.

      Ramesh graduated in Electronics Engineering from Model Engineering College, Cochin, and has a Postgraduate degree in Microelectronics from BITS Pilani.