France
Secure-IC recently achieved ten years in business of growth and progression, during which time, the company has expanded globally. With presence in 20 countries across 5 continents, Secure-IC has established a thought leadership position in the security world. Secure-IC sets itself apart by accompanying customers along the IC design process by providing best in class protection technologies, integrated secure elements and security platforms to reach the best available certification required for different markets. Combining a full set of analysis platforms with best of breed set of security technologies & backed by almost 40 families of international patents, Secure-IC is considered a leader in cyberspace security embedded systems. Secure-IC protects companies against attacks and guarantees at each stage of the design process that the absolute optimal security level is reached. The best of breed technologies that are provided stem from the company’s commitment to the research community in order to foresee future major threats, tackle problems with innovative solutions & empower the intricate work of the industry standardization bodies. The company provides Silicon proven technology, pioneering in AI for embedded security, post quantum & hybrid, and state-of-the-art synthesis of attacks/ countermeasures. The embedded security system lines can be better recognized as SecuryzrTM,Laboryzr,TM和ExpertyzrTMwith the latter offering analysis tools and guaranteeing certification readiness and security assurance.
Secure-IC is able to supply embedded硬件安全模块that can act as trust anchors that protect the security setup of a company. A hardware security module is a IP block which can be embedded into every device to answer security functionalities such as root-of-trust and key management.
Secure-ICSecuryzrprovides the core security services required to build a security architecture for a wide variety of devices : mobile, connected object, payment device, smart card, ECU, Set-Top-Box, and HSM.
Key features
个性化的市场解决方案
Security functions
LABORYZR allows a security evaluation at both layers of an embedded system: the IC and the Software layers respectively. The VIRTUALYZR is in charge of the pre-silicon stage which targets the design source itself. The ANALYZR allows a post-silicon evaluation based on a real chip or device. LABORYZR does more; it also provides the CATALYZR which is dedicated to the evaluation of any software implementation.
LABORYZR includes 3 tools:
– VIRTUALYZR tool is the only one tool which allows to evaluate side-channel security during this pre-silicon design stage, from the first source code of IP (Intellectual Property) toward SoC Layout (GDS2) just before going to foundry.
– ANALYZR tool does physical security evaluation on real physical chip/board. It includes all material platforms to perform SCA measurements and FIA injection, then analysis.
– CATALYZR tool offers support to the LABORYZR solution with software evaluation reporting options.
Analyzr is the most advanced post-silicon security evaluation platform on the market. The target to evaluate can be any embedded system, ranging from testing chips as FPGA, ASIC and Micro-controllers to end-user devices such as IoTs, smartphones, smart cards and automotive eletronic circuits.– VIRTUALYZR tool is the only one tool which allows to evaluate side-channel security during this pre-silicon design stage, from the first source Our scientists have authored some of the most advanced and highly regarded side-channel analysis and protection methodologies.
高级模块
Key Features
VIRTUALYZR是致力于硅前安全评价的电子设计自动化(EDA)软件工具。该工具是很容易的设计理念流程中集成,并允许安全检查点,在所有的设计层面,即RTL,后合成,布局和布线和布局。此外,分析是终端到终端:从设计源头,IP SoC或到全面的安全报告生成。安全漏洞从任何加密,非加密的或功能性的(总线,存储器)实施萃取。
Two types of analysis are possible :
TheCATALYZR提供独特的功能来评估和修正软件的源代码:
The tool allows going from a Source Code up to:
TheLeakage Assessmentis done with the state-of-the-art attacks on software implementations. It provides metrics to detect and quantify the leakages and try to exploit it from a hacker standpoint. This is done thanks to a library of advanced processing executed in an automatic and generic workflow.
With the泄漏调查, Secure-IC tool brings a huge added value to designers. It helps interpreting the results and understanding what the origin of the leakage is. It provides a full identification of vulnerabilities for an early correction.
Before the design, during the design, and after the design, Secure-IC supplies Evaluation as a service for governments, design houses, HW/SW applications developers and end-user technology manafacturers.
The end goal is to help companies be ready and succeed at any level of standard certification.
Within the Evaluation as a service solution, you can;
Cryptography technologies with a Tri-Dimensional trade-off of speed vs area vs security to cover customers’ needs, from Symmetric Cryptography to Asymmetric Cryptography and Hash functions.
Key Features
随机数生成是在安全的一个基石。
真随机数发生器(TRNG)弹性的谐波注入的统计独立的套位代和确定性随机位发生器(DRBG)高比特率requirements.These随机生成符合常用的统计测试套件。
Secure-IC offers TRNG compliant with SP 800-90C.
Key Features
Tamperproof secret generationwith高熵and可靠性
Key Features
Proven performances on all criteria :Uniqueness, Steadiness, Randomness
Universal fully-integrated fault attack sensor
Key Features
Active shielding and detection against invasive attacks
Key Features
Probingand tampering resilient interconnect
Key Features
Memory protection against reverse engineering and tampering
Key Features
Side-channels and fault injection anti-synchronization tool
信任的高度安全的根
Key Features
嵌入式网络安全powered byAI
.
Create collective intelligence between IPs and other whistleblowers
凭借多样性和互补性
Key Features
增益保证在威胁检测
The right decision at the right time in full knowledge
Business Intelligence
Hardware-enabled Cyber-security保护embedded systems, computers and IoT devices
填写SW网络安全和硬件嵌入式安全之间的安全漏洞
High security for nearly zero impact on performances
理想的安全引导和安全临界和密码保护应用
Forensics reporting, threat analysis → reverse the advantage
Differentiator: High symbolic impact on the market
Think ahead: Ahead of DARPA’s SSITH program
Key Features