HARDWARE SECURITY SERVICES & SOLUTIONS
IC Security Exploration & Protection
HARDWARE EXPLORATION SERVICES
COUNTERMEASURE
2 Main phases on hardware exploration for an A to Z chip analysis
PHASE 1: SAMPLE PREPARATION & IMAGERY In our lab, our equipments and expertise allow us to produce a wide range of images of ICs: from product shots and nice quality optical images to high resolution SEM pictures. => Optimal images of a chip are very useful for a first analysis of its architecture as it gives a first view on the different blocs composing the IC (memories, digital cores, analog parts, etc.). => “Chip ID” gives information on the physical construction of the device such as its number of layers, technology node and material (Copper / Aluminium) => Electronic images of the chip is the base material for a complete reverse engineering of the logic (phase 2)
- We look at ICs’ security considering all types of hardware attacks
- We accompany you during the whole lifecycle of one’s chips or devices
Therefore, different services and solutions are offered to help and accompany you at every stage of the chip’s lifecycle:
