Radix-S is used during design creation and verification to detect and remediate security issues in IP blocks and subsystems of an SoC.  Its advanced information flow analysis helps teams identify and locate the root cause of potentially serious security issues and provides a more comprehensive validation technique for internal security requirements. Learn more in this data sheet.
Hardware: A Double-Edged Sword for Security
Security Verification of Xilinx’s Root of Trust Leveraging Information Flow Analysis

Avoiding SoC Security Threats – What Verification Engineers Should Know

Security assurance requires a full product life cycle approach. The development of secure systems is of paramount importance in this age of software intensive electronic systems. Security weaknesses in the SoC hardware can lead to vulnerabilities that may be exploited later on by malicious software. These challenging problems must be addressed pre-silicon and require rigorous methodology combined with technology to provide increased security assurance. In this joint webcast, Synopsys and Tortuga will present a solution for security verification to enable the adoption of a Hardware Security Development Lifecycle (HSDL) to achieve pre-silicon security signoff.

This demo of Tortuga Logic’s Radix security technology will cover:

  • The Radix Security Verification Tool Flow
  • Design Overview and Creating Security Requirements
  • Radix Security Rule – SRAM2
  • Analysis of Security Failure using Radix Analysis Views


Today’s autonomous vehicles have evolved from vertical hardware-driven platforms to horizontal software-defined platforms. As a result, new automotive security regulations are emerging to help ensure security and safety of passengers. Learn more about new compliance requirements in automotive hardware and software development processes as outlined in standards like UNECE Regulation 155 and ISO/SAE 21434.