HARDWARE SECURITY SERVICES & SOLUTIONS
IC Security Evaluation – IC Protection
2 Main phases on hardware security for an A to Z chip analysis
PHASE 1: SAMPLE PREPARATION & IMAGERY
In our lab, our equipments and expertise allow us to produce a wide range of images of ICs: from product shots and nice quality optical images to high resolution SEM pictures.
=> Optimal images of a chip are very useful for a first analysis of its architecture as it gives a first view on the different blocs composing the IC (memories, digital cores, analog parts, etc.).
=> “Chip ID” gives information on the physical construction of the device such as its number of layers, technology node and material (Copper / Aluminium)
=> Electronic images of the chip is the base material for a complete reverse engineering of the logic (phase 2)
LEARN ABOUT HARDWARE SECURITY
More than 10 years experience on hardware security
PHASE 2: IC REVERSE ENGINEERING
Thanks to our cutting-edge proprietary tool ChipJuice we are able to perform efficient in-depth exploration and then analyses of ICs.
We are able to make many different kinds of studies on ICs architecture, implementation and security, from « ID Card » and Standard Cell Library Reports to complete detailed reports.
We assess the global threat to chip’s security: non-, semi- and fully-invasive attacks are scanned thanks to our tools and experience.
Find the details of our methodology for ICs’ security evaluation here
AUTOMATING IC REVERSE ENGINEERING: THE ULTIMATE TOOL
ChipJuice has been developed to operate fast and intuitively in-depth exploration of any kind of IC.
From the electronic images of one chip internal, the tool recovers its whole architecture and delivers different formats of description such as Netlist, GDSII, Verilog files, etc.
Our tool offers:
=> Intuitive workflow making netlist extraction easy and fast
=> The opportunity to look inside every type of IC whatever its architecture, complexity or size
=> Learning capabilities to make each new analysis faster by using the previous ones
Indeed, ChipJuice allows the performance of complete black box studies
A 360° approach for IC security ensures the best understanding and control of the expected level of protection:
- We assess ICs’ security considering all types of hardware attacks
- We accompany you during the whole lifecycle of your chips and devices
Therefore, to make sure you have the best security for your dedicated application, and depending on the desired autonomy on chip evaluation and securization, different services and solutions exist to help and accompany at every stage of the chip’s lifecycle: