HARDWARE SECURITY VERIFICATION SERVICES

We recognize that not every team has the skill or resources to provide the desired security assurance needed for projects under development. Our team of security verification experts are available to provide on-sight hardware security verification services to detect and prevent vulnerabilities in your designs.

As part of the services we provide expertise and technology leveraging our Radix solution to identify pre-silicon security vulnerabilities due to architecture, implementations or software and firmware configuration errors.

Radix fits into your existing SoC and FPGA flows by using the commercial environments from Cadence®, Synopsys®, and Mentor®, a Siemens Business.

HARDWARE SECURITY VERIFICATION SERVICES INCLUDE:

A comprehensive independent security assessment report for internal and external use

Access to security experts and the industry-leading Radix technology

A repeatable and scalable process to address the security of your entire ASIC, FPGA or SoC for current and future projects.

OUR EXPERTS HAVE HELPED WITH SYSTEMS BASED ON ARM®, RAMBUS® AND SYNOPSYS® ARC PROCESSOR.

Words from our Customers & Partners

OUR EXPERTS CAN LEVERAGE RADIX FOR
THE VERIFICATION OF THE FOLLOWING
USE CASES ON YOUR SoC DESIGN:

USE CASES BENEFIT
Hardware Root of Trust Security Verification
Ensures correct configuration for maximum security
SoC access control verification
Prevents unauthorized access
Secure boot sequence verification
Verifies boot data and keys remain secure
Red/Black separation
Checks for isolation of redundant systems
Timing side channels
Detect and prevent Meltdown/Spectre variants of attacks
Configuration register read/write protection
Ensures only privileged data remains so
Encryption key leakage
Ensure keys remain secure during and after usages
Verification of clearing secret content
Ensure secure data is cleared prior to switching to non-secure modes
External Debug disablement/analysis
Ensures data is removed securely
3rd Party/vendor IP and interface security
Increases assurance that IP is secure and does not contain hardware trojans

TO LEARN MORE, DOWNLOAD THE SERVICES DATASHEET