Hardware Security
Verification Services
We recognize that not every team has the skill or resources to provide the desired security assurance needed for projects under development. Our team of Security verification experts are available to provide on-sight hardware security verification services to detect and prevent vulnerabilities in your designs.
As part of the services we provide expertise and technology leveraging our Radix solution to identify pre-silicon security vulnerabilities due to architecture, implementations or software and firmware configuration errors.
Radix fits into your existing SoC and FPGA flows by using the commercial environments from Cadence®, Synopsys®, and Mentor®, a Siemens Business.
Hardware Security Verification Services include:
A comprehensive independent security assessment report for internal and external use
Access to security experts and the industry leading Radix technology
A repeatable and scalable process to address the security of your entire ASIC, FPGA or SoC for current and future projects.
Our experts have helped
with systems based on Arm®, Rambus®
and Synopsys® ARC processor.
Our experts can leverage Radix for
the verification of the following
use cases on your SoC design:
Use Cases |
Benefit |
Hardware Root of Trust Security Verification |
Ensures correct configuration for maximum security |
SoC access control verification |
Prevents unauthorized access |
Secure boot sequence verification |
Verifies boot data and keys remain secure |
Red/Black separation |
Checks for isolation of redundant systems |
Timing side channels |
Detect and prevent Meltdown/Spectre variants of attacks |
Configuration register read/write protection |
Ensures only privileged data remains so |
Encryption key leakage |
Ensure keys remain secure during and after usages |
Verification of clearing secret content |
Ensure secure data is cleared prior to switching to non-secure modes |
External Debug disablement/analysis |
Ensures data is removed securely |
3rd Party/vendor IP and interface security |
Increases assurance that IP is secure and does not contain hardware trojans |
