We ensure the security and robustness of our semiconductor clients’ products based on more than 25 years of research, analysis, development and operational excellence working with the world's largest SoC innovators.Download the Fact Sheet
We have a unique portfolio of services and solutions that give SoC manufacturers critical insights and proven technologies to help them meet the quickly evolving regulatory and customer expectations around security.
We make your product secure by offering design, security assessment and pre-certification support, as well as a Secure IP block that enables advanced, efficient key management and late provisioning for any connected device.
We provide the technology and infrastructure required to effectively manage security risks and operational complexity. We provide means to efficiently and securely handle key material both in-factory, as well as simplifying in-field provisioning.
No other company offers such a broad portfolio of security solutions for semiconductor manufacturers, allowing you to securely innovate with confidence.
We work with you to assess your security threats and opportunities and help you create a product that is secure by design.
We assess the security of your new and existing products and provide actionable insights.
We provide core technology to implement robust security foundations into your SoC.
We provide a proven system enabling you and your customers to manage the entire security lifecycle of your product(s).
Learn more about how we can help you build and validate secure IoT SoCs
Side Channel Analysis refers to the use of information leakage related to an event which is obtained through secondary phenomenon, such as changes in power consumption or magnetic field emission.
When protections such as masking are not sufficiently efficient, it can lead to the recovery of secrets from the operation of an electronic device. Often these secrets are cryptographic keys.
Fault attacks modify the behavior of a system, by disrupting the code executed by semiconductors.
It may allow access to restricted functionality or information (keys, parameters or code) and can simplify cryptographic attacks compared to brute force attacks. It can also be used as an enabler to perform further attacks such as code dump.
Invasive techniques are performed with powerful tools for imaging (SEM) and circuit edit (FIB).
Reverse engineering allows the identification of specific logic and circuit edit tools can remove (nano-etching) or deposit materials (nano-soldering) with nanometer precision. These capabilities can be used to cut and connect circuitry within a device, allowing a permanent modification of the behavior of the chip, as well as to create probe points for accessing signals of interest.
Flawed functions and exposed network services may lead to the compromise of an entire network or system.
They allow an unverified user to steal data or gain further access, elevating privileges to administrator level, tamper with a device or get insights on means to develop targeted attacks. The extraction and the analysis of a firmware and memory content can highlight maintenance or supervisor accounts, injection flaws, buffer overflows, format strings or firmware update and secure boot vulnerabilities.
For more information about our Semiconductor Manufacturers offering, contact us….