New Hardware Security Blog: Reducing Hardware Security Risk | READ IT NOW!

Hardware Security
Verification Services

We recognize that not every team has the skill or resources to provide the desired security assurance needed for projects under development. Our team of Security verification experts are available to provide on-sight hardware security verification services to detect and prevent vulnerabilities in your designs.

As part of the services we provide expertise and technology leveraging our Radix solution to identify pre-silicon security vulnerabilities due to architecture, implementations or software and firmware configuration errors.

Radix fits into your existing SoC and FPGA flows by using the commercial environments from Cadence®, Synopsys®, and Mentor®, a Siemens Business.

Hardware Security Verification Services include:

  • A comprehensive independent security assessment report for internal and external use
  • Access to security experts and the industry leading Radix technology
  • A repeatable and scalable process to address the security of your entire ASIC, FPGA or SoC for current and future projects.

Our experts have helped
with systems based on Arm®, Rambus®
and Synopsys® ARC processor.

As GAPS aims to develop hardware security and software architectures with provable security interfaces, Tortuga Logic's Radix™ security verification solution helps us effectively deliver the security guarantees we need to be successful in this program.

Vice President and General Manager of Mercury's Trusted Mission Solutions group

Scott Orton

Tortuga’s Logic’s Radix series addresses our need for concurrent firmware and hardware validation to ensure we deliver the most secure products to the markets we serve, including aerospace and defense, automotive, and data center.

Corporate Vice President

Gaurav Singh

Engineering teams spend tremendous time and effort validating their firmware and chip designs, yet the methods can sometimes pose challenges when it comes to detecting security vulnerabilities. Cadence collaborated with Tortuga Logic on the development and use of Tortuga Logic’s Radix-M with our Palladium Z1 emulation platform by targeting firmware vulnerabilities in modern SoCs and reducing the risk of security exploits from reaching the field.

Vice President and GM of the Systems and Verification Group at Cadence Design Systems

Paul Cunningham

DesignWare ARC Processor IP provides a rich set of security options that help protect systems from evolving security threats such as IP theft and malicious attacks. When integrating an ARC Processor and adding application software, designers must ensure that the resulting end system remains secure. Tortuga Logic’s Radix-S software is an effective tool for our customers to verify that no vulnerabilities are introduced during the integration and programming of their ARC Processor-based systems.

Vice President of Marketing for IP at Synopsys

John Koeter

The CryptoManager Root of Trust suite of products serves broad markets such as government, automotive, cloud, machine learning and artificial intelligence, where security is of utmost concern. Tortuga Logic's Radix gives further assurance to our customers that they are delivering the most secure product possible.

Vice President of Products, Cryptography, Rambus

Neeraj Paliwal

Slider

Our experts can leverage Radix for
the verification of the following
use cases on your SoC design:

Use Cases

Benefit

Hardware Root of Trust Security Verification

Ensures correct configuration for maximum security

SoC access control verification

Prevents unauthorized access

Secure boot sequence verification

Verifies boot data and keys remain secure

Red/Black separation

Checks for isolation of redundant systems

Timing side channels

Detect and prevent Meltdown/Spectre variants of attacks

Configuration register read/write protection

Ensures only privileged data remains so

Encryption key leakage

Ensure keys remain secure during and after usages

Verification of clearing secret content

Ensure secure data is cleared prior to switching to non-secure modes

External Debug disablement/analysis

Ensures data is removed securely

3rd Party/vendor IP and interface security 

Increases assurance that IP is secure and does not contain hardware trojans

To learn more download
the Services data sheet