France
With presence and customers across 5 continents, Secure-IC is the rising leader and the only global provider of end-to-end cybersecurity solutions for embedded systems and connected objects.
Driven by a unique approach called PESC (Protect, Evaluate, Service & Certify), Secure-IC positions itself as a partner to support its clients throughout and beyond the IC design process. Relying on innovation and research activities, Secure-IC provides Silicon-proven and cutting-edge protection technologies, integrated Secure Elements and security evaluation platforms to reach compliance with the highest level of certification for different markets (such as automotive, AIoT, defense, payments & transactions, memory & storage, server & cloud).
Secure-IC security solutions are fully digital and can be embedded in any kinds of devices such as ASIC, FPGA or eFPGA. Secure-IC solutions are already embedded in several application processors (automotive, smartphone, etc.) to guarantee the security of the system and its CPUs.
Secure-IC’s integrated Security Services Platform (iSSP) provides a complete end-to-end security solution to supply, deploy and manage a fleet of devices from the cloud.
Secure-IC provides a comprehensive set of solutions to ensure the security of embedded systems such as IoT devices security, automotive ECU security systems or industrial IoT security. The solution is responsible for guaranteeing the security level of the integrated circuit throughout its life and supporting our customer to “Supply, Deploy and Manage” its device fleet.
Key features
SecuryzrTM iSE, which is Secure-IC’s Root of Trust. Embedded in the main SoC, it will offer multiple services to its host system: secure boot, key isolation, anti-tampering protection, etc. Thanks to its dual computation and strong isolation, SecuryzrTM iSE (integrated Secure Element) offers an additional layer of security compared to trusted execution environments. Implemented in your SoC, SecuryzrTM iSE provides security from the design stage and is the starting point of the security by design methodology.
SecuryzrTM Server, which is the server platform with its user interface. It is responsible for managing the different services offered by the solution for the platform and the business applications it hosts:
Benefits
The solution is completed by a software agent to provide connectivity from chip to cloud (and respectively).
The security of the systems will be easily visualized through a Security Digital Twin.
The complete solution offers a best of breed end-to-end security during the complete device lifecycle.
ANALYZR supports common embedded systems technologies, including: FPGA, ASIC or End-Device. It allows the security assessment of any type of implementation.
Using the Analyzr, running a security evaluation is a set of simple steps, which allow going end-to-end from the hardware setup and the acquisition up to the security evaluation report. This security evaluation can be passive physical attacks such as Side Channel Attack and/or active physical attack such as Fault Injection Attack.
The platform comes with several equipment and materials necessary to conduct a full evaluation covering the highest security levels as specified by standards.
The Use-Cases are practical user-guides and tutorials that provide a turnkey template to support and guide the ANALYZR user through an evaluation methodology: from the acquisition to evaluation. The ANALYZR provides a rich and full Use-Cases solution ranging from basic analyses on unprotected crypto designs to more sophisticated analyses on full target with crypto and non-crypto modules. The solution comes with structured projects including the target, analysis sources and ready templates for report generations.
ANALYZR provides a complete and rich user command line interface (CLI) that allows the evaluator to script an end-to-end process based on a console. The end-to-end scripting process includes sequentially: SCA analysis setting and SCA analysis run.
In addition to licensing the platform software, Secure-IC also provides tools to perform active attacks. Plug in your algorithms, attack, analyze at the bit level, reinforce.
Key features
End-to-end analysis: from Acquisition to Analysis and Evaluation Report generation
Supported analysis:
Delivered with all platform (SCA, EM Fault Injection, Laser Fault Injection, Power and Clock Glitch station)
Delivered with advanced triggering solution (Smart-Trigger Advanced)
Benefits
Ensure the security evaluation of any kind of devices
Multiple targets: FPGA, ASIC, Microcontroller, End-Device, Test-chip
Compatible with large scale of Oscilloscope
2 interfaces: GUI and CLI
Windows and Linux supported
Delivered with use-cases (reference cases)
The CATALYZR is a software tool that aims at assessing the security of a Software (SW) implementation. The CATALYZR allows the security assessment of any type of software implementation based on C code.
In fact, the CATALYZR provides an end-to-end workflow that starts by an input software and ends by a security report generation. This workflow implements the Diagnose-Verify-Cure approach that helps investigate and point-out vulnerabilities in the source code in order for the developer to correct through an iterative process until the code is clean.
The Use-Cases are practical user-guides and tutorials that provide a turnkey template to support and guide the CATALYZR user through an evaluation methodology: from the SW coding practices to evaluation.
The solution comes with structured projects including the target design, analysis sources and ready templates for report generations. The goal behind is to help the user improve his skills in terms of both aspects: SW coding for security and gathering expertise for SW security evaluation.
Key features
Benefits
Through the VIRTUALYZR tool we present an innovative way to verify the security of the design at the pre-Silicon level. Such an early stage verification of the security can be seen as new Electronic Design Automation (EDA) tool that allows to add a new layer of verification to the lifecycle of an embedded implementation before being packaged into a chip.
The VIRTUALYZR is a software tool that aims at assessing the hardware security layer of an embedded system at the pre-silicon stage.
The VIRTUALYZR is used at the digital design level and provides an end-to-end workflow that starts by a design input and ends by a report generation. This tool allows detecting potential vulnerabilities that might exist in the design.
The VIRTUALYZR exploits simulation activity results in order to build an equivalent of power consumption traces and then perform physical analysis. It allows the detection and localization of leakage nodes in the design. The leakage detected can be due to many errors in the design like a miss-integration or a weak countermeasure. It can be also behind a bad synthesis of the design.
The VIRTUALYZR is mapped with the HDL simulator to run simulation of the design.
Key features
Benefits
A step by step guidance in the certification process from the roots to certification (CC, FIPS 140, ISO, CSPN).
All our technological security solutions come with a set of services and support. Starting with the customer request and discussions about the security requirements, we first deliver the related IPs specifications and then the IP cores themselves. Before the chip manufacturing stage, we provide a support to integration and after the chip manufacturing step we can also provide a support to certification.
Secure-IC supports its clients during the certification process by providing help to answer laboratories’ questions and providing the evaluation laboratories with all the required details on its technologies.
Thanks to its analysis tools (Virtualyzr and Analyzr), Secure-IC can also deliver security robustness pre-evaluation reports.
Compliance to any standard certification level.
Pre silicon Post Silicon Software evaluation by Laboryzr.
Software code or real device evaluated (White Box or Black Box against Reverse Engineering) and Pre Quotation & tailored Design for Security Recommendations.
To avoid extra costs and delayed time to market, validate your design prior to the certification process. Thanks to our home-made evaluation tools, Secure-IC can provide on-chip characterization of the level of resistance against attacks of our products after integration in clients’ designs.
Embedded Security Evaluation as a Service
Before the design, during the design, and after the design, Secure-IC supplies evaluation as a service for governments, design houses, HW/SW applications developers and end-user technology manufacturers.
The end goal is to help companies be ready and succeed at any level of standard certification.
Within the “evaluation as a service” solution, you can:
As part of Secure-IC’s iSSP (integrated Security Service Platform), Secure-IC is able to provide integrated Secure Elements (iSE) that can act as trust anchors that protect the security assets of a device. An iSE – also referred as HSM or Security Subsystem or Root of Trust – is an IP block that can be embedded into every device to ensure security services such as key management, lifecycle management, Secure Boot & updates
Secure-IC’s Securyzr provides the core security services required to build a security architecture for a wide variety of devices and connected objects: mobile, payment device, smart card, ECU, Set-Top-Box, and HSM.
Key features
Benefits
Random number generation is a keystone in security.
Secure-IC offers both True Random Number Generator (TRNG) resilient to harmonic injection for statistically independent sets of bits generation and Deterministic Random Bit Generator (DRBG) for high bitrates requirements. These random generators are compliant with all required statistical tests suites.
Key features
Benefits
The storage of a key in a non-volatile memory represents a risk to retrieve the key and a deterministic generation makes the key vulnerable to attacks based on observation.
PUF Security IP is a secret key generation system based on Physically Unclonable Functions. The secret key is extracted by the PUF from the silicon by using its unique intrinsic properties caused by tiny manufacturing discrepancies: technological dispersions are amplified into digital signals (bits of information). The key generated is not readable but extracted using a group of helper-data. This distinctive feature allows a real protection against the reverse-engineering techniques compared to traditional methods that store the key in non-volatile memory.
Key features
Benefits
Master Key generation for example for to ensure firmware’s confidentiality
Addressed Threats
SW implementation of cryptographic engines.
Necessary algorithms for these applications and optional support or joint development:
Countermeasures
Optionally
Key features
Cryptographic Library:
The Digital Sensor is designed to detect various threats belonging to the family of Fault Injection Attacks (FIA):
Digital Sensor converts all monitored stresses into a timing stress which is then measured. When a threat is detected, it provides the system with a measurement of the threat’s level and it raises the hardware alarm.
To instate a security module, as a security headquarter, handling all security events and statuses, Secure-IC developed Smart Monitor. It has the ability to centralize all information concerning the health of the device. In addition, it can be interfaced with customer’s sensors (analog or digital) to increase the sources of information and specific data.
Key features
Benefits (Digital Sensor)
Active Shield technology is designed to deter intrusive attacks by placing a mesh over the sensitive parts of the circuit and actively monitoring the mesh’s integrity. This counter-measure protects the circuit’s features such as metal routing and transistors that are beneath the mesh from undetected access or modification through the front-side, including:
The mesh is actively monitored using random cryptographically-generated patterns to detect integrity violations. By using this technology, modifying and rerouting the mesh becomes very costly.
The data travelling through the shield mesh cannot be predicted by the attacker, because it is output by a cryptographic block cipher.
Key features
Benefits
The Cyber Escort Unit is designed to fill the security gap between software cybersecurity and hardware by escorting step by step the program execution to achieve high execution performances in a secure way, allowing advantageously real-time detection of zero-day attacks. Unique on the market, this product builds the foundation for hardware-enabled cybersecurity.
It comprises technologies for detecting and deceiving cyberattacks. This technology acts on-the-fly. Precisely, CyberEU is a two-fold technology aiming to protect against four threats:
Key features
Benefits
The Hash Algorithm (SHA) family includes MD5, SHA-1, SHA-2, SHA-3, SM3, Whirlpool.
In 2012, the algorithm Keccak developed by a Western European team was selected as the winner of the NIST contest and became the new hash function standard known as SHA-3.
Whirlpool is a hash function which construction is based on a substantially modified Advanced Encryption Standard architecture. It takes a message of any length less than 2256 bits and returns a 512-bit message digest.
The SM3 hash algorithm is a cryptographic hash function designed by the Chinese Commercial Cryptography Administration Office (CCCAO) in order to propose new standard for digital signature generation. The SM3 algorithm is very close to the FIPS SHA-256 algorithm.
The HMAC hardware module allows performing NIST HMAC algorithms as standardized in the FIPS 198-1. The module is coupled with one of the standard hash algorithm, SHA-1, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512 or SM3 to produce a tag.
Key features (all mixed)
Benefits
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data established by the U.S National Institute of Standards and Technology (NIST) in 2001. It is included in the ISO/IEC 18033-3 standard.
AES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting.
The Data Encryption Standard (DES) is defined in FIPS PUB 46-3 as a symmetric-key algorithm. The triple DES (TDES) is block cipher that applies the DES algorithm three times to each data block. The TDES is defined in ANS X9.52-1998, NIST SP 800-67 rev-1 and ISO/IEC 18033-3:2010.
TDES is a symmetric-key algorithm, meaning the same key is used for both encrypting and decrypting.
SM4 is a standardized block cipher used in the Chinese National Standards.
Key features
Benefits
This PKC IP provides comprehensive ECC and/or RSA encryption / decryption / signature / verification functionalities with hardware acceleration for modular arithmetic operations.
The RSA IP is composed of two parts:
A benefit of using elliptic curve cryptography is a smaller key size than RSA-based system to provide the same level of security. For example, a 256-bit elliptic curve public key provides the same level of security than a 3072-bit RSA public key.
The ECC IP provides secure ECC primitives such as signature/verification with ECDSA and SM2, with hardware acceleration for modular arithmetic operations.
The ECC IP is composed of two parts:
Key features
Benefits
Memory protection IP protects the memory content against reverse engineering and tampering.
Key features
Benefits