Security evaluation centers, whether public or private, are a necessary condition to guarantee users’ trust in electronic devices and ensure digital markets’ growth. However, evaluating electronic devices security is a time-consuming and highly technical task. Attacks are permanently evolving,and the amount of connected devices to be evaluated has skyrocketed. For evaluations laboratories, smooth and reliable evaluations are a key success factor. For designers, detecting weakness before deployment and/or certification phase is crucial to accelerate time-to-market. For all of them, Secure-IC has developed the appropriate tools.
VIRTUALYZR is an electronic design automation (EDA) software tool dedicated to pre-silicon security evaluation. The tool is easy to integrate within the design conception flow and allows a security check point at all design levels, namely RTL, Post Synthesis, Place-and-Route and Layout. Moreover, the analysis is end-to-end: from the design source, IP or SoC, to the full security report generation. Security vulnerabilities are extracted from any cryptographic, non-crypographic or functional (bus, memories) implementation.
ANALYZR is the most advanced post-silicon security evaluation platform on the market. The target to evaluate can be any embedded system, ranging from testing chips as FPGA, ASIC and Micro-controllers to end-user devices such as IoTs, smartphones, smart cards and automotive electronic circuits.
The CATALYZR is a software tool that aims at assessing the security of a Software (SW) implementation.
In fact, the CATALYZR provides an end-to-end workflow that starts by a design input and ends by a security report generation. The design input is a pure software code that can be written in C or Assembly (ASM). The tool has several advantages such as:
• It allows a security checking at different levels of the Software flow with fast correction:
a) Static Analysis: that allows investigating the security leakages at an early stage before code compilation.
b) Dynamic Analysis: that allows assessing the security leakage at the instruction level when the SW code is executed by the processor.
• It shows an image of the best ever attacker as it allows the analysis in the best environment conditions based on a noise free model. This mode is often called white-box evaluation. Therefore, we bypass the difficulties behind a real analysis like the noise and the desynchronization of the measurements. Moreover, this is significant gain in term of evaluation cost, due to time acquisition and fabrication process cost.