Security Verification for Embedded Hardware Designs

Aug. 7, 2023
At the core of every secure product is robust hardware security, which must also address the threats created by hardware vulnerabilities.

This video appeared in Electronic Design and has been published here with permission.

Check out our Design Automation Conference 2023 coverage. 

Cycuity provides a design solution that uses information flow tracking to find bugs or security weaknesses as security assets flow in chip design in IP, subsystem, and block levels. Offering scalable, automated hardware security verification, it can detect security vulnerabilities during configuration and usage with Radix.

The platform provides a repeatable process for validating security properties and the absence of unexpected security flaws across the design lifecycle. When added to your existing verification environment, it covers from block level to full SoC, including software.

Radix systematically detects known and yet-to-be-discovered security vulnerabilities, including those using standards like MITRE Common Weakness Enumeration (CWE). It implements an asset-based methodology using a comprehensive security verification methodology centered around security assets.

Security rules are validated in any existing verification environment, enabling the automation of rigorous security verification throughout development, which can be reused across the design cycle and even across multiple design projects. Information flow analysis tracks and traces all security assets independently of their values,  across the chip and through logical and sequential transformations.

Radix combines symbolic analysis with simulation and emulation, addressing the limitations of functional methods such as formal verification and SVA- and UVM-based simulation. Real-time analysis capabilities highlight the flow of security assets to understand and identify the root cause of uncovered vulnerabilities, with insight into flow hierarchy, data, and control values, as well as special features for inspecting memories.

Related links:

Sponsored Recommendations

Getting Started with Python for VNA Automation

April 19, 2024
The video goes through the steps for starting to use Python and SCPI commands to automate Copper Mountain Technologies VNAs. The process of downloading and installing Python IDC...

Introduction to Copper Mountain Technologies' Multiport VNA

April 19, 2024
Modern RF applications are constantly evolving and demand increasingly sophisticated test instrumentation, perfect for a multiport VNA.

Automating Vector Network Analyzer Measurements

April 19, 2024
Copper Mountain Technology VNAs can be automated by using either of two interfaces: a COM (also known as ActiveX) interface, or a TCP (Transmission Control Protocol) socket interface...

Guide to VNA Automation in MATLAB Using the TCP Interface

April 19, 2024
In this guide, advantages of using MATLAB with TCP interface is explored. The how-to is also covered for setting up automation language using a CMT VNA.