Security Verification for Embedded Hardware Designs

Aug. 7, 2023
At the core of every secure product is robust hardware security, which must also address the threats created by hardware vulnerabilities.

This video appeared in Electronic Design and has been published here with permission.

Check out our Design Automation Conference 2023 coverage. 

Cycuity provides a design solution that uses information flow tracking to find bugs or security weaknesses as security assets flow in chip design in IP, subsystem, and block levels. Offering scalable, automated hardware security verification, it can detect security vulnerabilities during configuration and usage with Radix.

The platform provides a repeatable process for validating security properties and the absence of unexpected security flaws across the design lifecycle. When added to your existing verification environment, it covers from block level to full SoC, including software.

Radix systematically detects known and yet-to-be-discovered security vulnerabilities, including those using standards like MITRE Common Weakness Enumeration (CWE). It implements an asset-based methodology using a comprehensive security verification methodology centered around security assets.

Security rules are validated in any existing verification environment, enabling the automation of rigorous security verification throughout development, which can be reused across the design cycle and even across multiple design projects. Information flow analysis tracks and traces all security assets independently of their values,  across the chip and through logical and sequential transformations.

Radix combines symbolic analysis with simulation and emulation, addressing the limitations of functional methods such as formal verification and SVA- and UVM-based simulation. Real-time analysis capabilities highlight the flow of security assets to understand and identify the root cause of uncovered vulnerabilities, with insight into flow hierarchy, data, and control values, as well as special features for inspecting memories.

Related links:

Sponsored Recommendations

Guide to VNA Automation in MATLAB Using the TCP Interface

April 19, 2024
In this guide, advantages of using MATLAB with TCP interface is explored. The how-to is also covered for setting up automation language using a CMT VNA.

In-Circuit Antenna Verification

April 19, 2024
In this video, Brian Walker, Senior RF Design Engineer at Copper Mountain Technologies, shows how there can be significant variation of the performance of a PCB-mounted antenna...

UHF to mmWave Cavity Filter Solutions

April 12, 2024
Cavity filters achieve much higher Q, steeper rejection skirts, and higher power handling than other filter technologies, such as ceramic resonator filters, and are utilized where...

Wideband MMIC Variable Gain Amplifier

April 12, 2024
The PVGA-273+ low noise, variable gain MMIC amplifier features an NF of 2.6 dB, 13.9 dB gain, +15 dBm P1dB, and +29 dBm OIP3. This VGA affords a gain control range of 30 dB with...