Pre-Silicon Embedded System Evaluation
Facilitate your security evaluation with specifically designed risk assessment tools.
Pre-silicon evaluation is a key step not to be missed when implementing security in SoC design. It helps reduce time-to-market as well as post tape-out maintenance. By finely emulating the behavior of a device at the design stage, it is possible to anticipate and protect against security weaknesses before they become problems.
Pre-Silicon evaluation with VirtualyzrTM
VirtualyzrTM evaluates side-channel security during pre-silicon design stage:
- Design for Security
- Provides a security verification layer that works hand in hand with the functional verification workflow
- Allows performing security checkpoints at different design levels. This feature can be for instance used for non-regression tests.
- Detects and characterizes the security vulnerabilities from the design
- Maps the vulnerabilities with the design to help the designer locate and address potential issues.
- Cheaper evaluation as no measurement equipment or platform is required.
- Evaluation of mixed design (both hardware and software)
Three steps to pre-silicon evaluation
- Step 1
The design is simulated according to its conception level (RTL / Post Synthesis / Place & Route). The simulated traces are obtained and the user can select the part of its design to be evaluated with VirtualyzrTM.
- Step 2
The simulated traces are investigated and processed based on a mathematical consumption model.
- Step 3
An advanced physical analysis is performed on the obtained leakage traces. Two types of analysis can then be performed: side-channel attacks and fault injection attacks analysis.
Security for every step in design life-cycle
VirtualyzrTM is a tool which is part of a larger solution called LaboryzrTM specifically designed to support companies through all the security stages of the design life-cycle.
Secure-IC tools can be used to detect Hardware Trojans and also for Black-Box analysis of devices.
Secure-IC can also provide services for security evaluation and penetration testing.