The Virtualyzr is a pre-silicon security evaluation platform. Assessing your cryptographic design at an early stage allows you saving a lot of effort, time and money.
The Virtualyzr takes your design as input and returns an evaluation report about the real security resistance against physical attacks.
Both classes of attacks are considered: Passive analyses like Side-channel attacks (SCA) and active analyses like Fault attacks (FIA). The platform allows the detection, localization and analysis of the security leakage in the design at all levels of conception: RTL, Post Synthesis and Place & Route levels. Indeed, several errors of miss-integration , weak countermeasure or bad optimisations could be behind the security leakage.
More importantly, with the Virtualyzr you are evaluating the power of the best ever attacker. Actually, the evaluation is performed in the best conditions based on noise-free models and full access to the design signals.
Two types of analysis are possible :
The high-level description of the internal process consists in three steps, detailed below.
The design is simulated according to its level conception (RTL / Post Synthesis / Place & Route). Simulated traces are obtained. The Virtualyzr allows the user to select and probe the nodes to be tested.
The simulated traces are investigated and processed based on a mathematical consumption model to generate the so-called leakage traces. These traces are an image of the security leakage that can be exploited by an attacker to retrieve a sensitive information like a secret key.
An advanced physical analysis is performed on obtained leakage traces. Two types of analysis can be performed: black-box or white-box analysis.