France
Secure-IC recently achieved ten years in business of growth and progression, during which time, the company has expanded globally. With presence in 20 countries across 5 continents, Secure-IC has established a thought leadership position in the security world. Secure-IC sets itself apart by accompanying customers along the IC design process by providing best in class protection technologies, integrated secure elements and security platforms to reach the best available certification required for different markets. Combining a full set of analysis platforms with best of breed set of security technologies & backed by almost 40 families of international patents, Secure-IC is considered a leader in cyberspace security embedded systems. Secure-IC protects companies against attacks and guarantees at each stage of the design process that the absolute optimal security level is reached. The best of breed technologies that are provided stem from the company’s commitment to the research community in order to foresee future major threats, tackle problems with innovative solutions & empower the intricate work of the industry standardization bodies. The company provides Silicon proven technology, pioneering in AI for embedded security, post quantum & hybrid, and state-of-the-art synthesis of attacks/ countermeasures. The embedded security system lines can be better recognized as SecuryzrTM, Laboryzr, TM and Expertyzr TM with the latter offering analysis tools and guaranteeing certification readiness and security assurance.
Secure-IC is able to supply embedded Hardware Security Modules that can act as trust anchors that protect the security setup of a company. A hardware security module is a IP block which can be embedded into every device to answer security functionalities such as root-of-trust and key management.
Secure-IC Securyzr provides the core security services required to build a security architecture for a wide variety of devices : mobile, connected object, payment device, smart card, ECU, Set-Top-Box, and HSM.
Key features
Personalised market solutions
Security functions
LABORYZR allows a security evaluation at both layers of an embedded system: the IC and the Software layers respectively. The VIRTUALYZR is in charge of the pre-silicon stage which targets the design source itself. The ANALYZR allows a post-silicon evaluation based on a real chip or device. LABORYZR does more; it also provides the CATALYZR which is dedicated to the evaluation of any software implementation.
LABORYZR includes 3 tools:
– VIRTUALYZR tool is the only one tool which allows to evaluate side-channel security during this pre-silicon design stage, from the first source code of IP (Intellectual Property) toward SoC Layout (GDS2) just before going to foundry.
– ANALYZR tool does physical security evaluation on real physical chip/board. It includes all material platforms to perform SCA measurements and FIA injection, then analysis.
– CATALYZR tool offers support to the LABORYZR solution with software evaluation reporting options.
Analyzr is the most advanced post-silicon security evaluation platform on the market. The target to evaluate can be any embedded system, ranging from testing chips as FPGA, ASIC and Micro-controllers to end-user devices such as IoTs, smartphones, smart cards and automotive eletronic circuits.– VIRTUALYZR tool is the only one tool which allows to evaluate side-channel security during this pre-silicon design stage, from the first source Our scientists have authored some of the most advanced and highly regarded side-channel analysis and protection methodologies.
Advanced Modules
Key Features
VIRTUALYZR is an electronic design automation (EDA) software tool dedicated to pre-silicon security evaluation. The tool is easy to integrate within the design conception flow and allows a security check point at all design levels, namely RTL, Post Synthesis, Place-and-Route and Layout. Moreover, the analysis is end-to-end: from the design source, IP or SoC, to the full security report generation. Security vulnerabilities are extracted from any cryptographic, non-cryptographic or functional (bus, memories) implementation.
Two types of analysis are possible :
The CATALYZR provides unique features to evaluate and correct a software source code:
The tool allows going from a Source Code up to:
The Leakage Assessment is done with the state-of-the-art attacks on software implementations. It provides metrics to detect and quantify the leakages and try to exploit it from a hacker standpoint. This is done thanks to a library of advanced processing executed in an automatic and generic workflow.
With the Leakage Investigation, Secure-IC tool brings a huge added value to designers. It helps interpreting the results and understanding what the origin of the leakage is. It provides a full identification of vulnerabilities for an early correction.
Before the design, during the design, and after the design, Secure-IC supplies Evaluation as a service for governments, design houses, HW/SW applications developers and end-user technology manafacturers.
The end goal is to help companies be ready and succeed at any level of standard certification.
Within the Evaluation as a service solution, you can;
Cryptography technologies with a Tri-Dimensional trade-off of speed vs area vs security to cover customers’ needs, from Symmetric Cryptography to Asymmetric Cryptography and Hash functions.
Key Features
Random number generation is a keystone in security.
True Random Number Generator (TRNG) resilient to harmonic injection for statistically independent sets of bits generation and Deterministic Random Bit Generator (DRBG) for high bitrates requirements.These random generators are compliant with commonly used statistical tests suites.
Secure-IC offers TRNG compliant with SP 800-90C.
Key Features
Tamperproof secret generation with high entropy and reliability
Key Features
Proven performances on all criteria : Uniqueness, Steadiness, Randomness
Universal fully-integrated fault attack sensor
Key Features
Active shielding and detection against invasive attacks
Key Features
Probing and tampering resilient interconnect
Key Features
Memory protection against reverse engineering and tampering
Key Features
Side-channels and fault injection anti-synchronization tool
Highly secured root of trust
Key Features
Embedded Cyber-security powered by AI
.
Create collective intelligence between IPs and other whistleblowers
By leveraging diversity and complementary
Key Features
Gain assurance in Threat Detection
The right decision at the right time in full knowledge
Business Intelligence
Hardware-enabled Cyber-security protection for embedded systems, computers and IoT devices
Fill the security gap between SW cybersecurity and HW embedded security
High security for nearly zero impact on performances
Ideal for Secure Boot & protection of security-critical and crypto applications
Forensics reporting, threat analysis → reverse the advantage
Differentiator: High symbolic impact on the market
Think ahead: Ahead of DARPA’s SSITH program
Key Features