Virtualyzr

The Virtualyzr is a pre-silicon security evaluation platform. Assessing your cryptographic design at an early stage allows you saving a lot of effort, time and money.

The Virtualyzr takes your design as input and returns an evaluation report about the real security resistance against physical attacks.

Both classes of attacks are considered: Passive analyses like Side-channel attacks (SCA) and active analyses like Fault attacks (FIA). The platform allows the detection, localization and analysis of the security leakage in the design at all levels of conception: RTL, Post Synthesis and Place & Route levels. Indeed, several errors of miss-integration , weak countermeasure or bad optimisations could be behind the security leakage.

More importantly, with the Virtualyzr you are evaluating the power of the best ever attacker. Actually, the evaluation is performed in the best conditions based on noise-free models and full access to the design signals.

 

 

Two types of analysis are possible :

  • Black box-based analysis assumes that the secret is unknown and tries to recover the secret information. This allows measuring the extent of an attacker: how much time he needs to break the system. The Virtualyzr provides the last and powerful analyses existing for SCA and FIA.

 

  • White box-based analysis assumes that the secret is known and tries to focus on how such secret is behaving. In this context, the Smart-SIC Virtualyzr provides powerful metrics based on advanced statistical computation derived from the recent literature of physical analysis.

 

fig1_vtz

The high-level description of the internal process consists in three steps, detailed below.

 

  • Step 1

    The design is simulated according to its level conception (RTL / Post Synthesis / Place & Route). Simulated traces are obtained. The Virtualyzr allows the user to select and probe the nodes to be tested.

  • Step 2

    The simulated traces are investigated and processed based on a mathematical consumption model to generate the so-called leakage traces. These traces are an image of the security leakage that can be exploited by an attacker to retrieve a sensitive information like a secret key.

  • Step 3

    An advanced physical analysis is performed on obtained leakage traces. Two types of analysis can be performed: black-box or white-box analysis.