Vendor: Texplained Category: Root Of Trust

Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass

Protection of the embedded secrets against professional hackers stealing actions Protection of Non-Volatile-Memory to make sure t…

Overview

  • Protection of the embedded secrets against professional hackers stealing actions
  • Protection of Non-Volatile-Memory to make sure that pirates:
    •  Do not access the code (boot loader, test functions) which could be used to extract the embedded software or data
    •  Can not extract the embedded software which would allow them to:
      •  Gain information to be able to easily perform cheaper attacks
      •  Emulate the code on another device
    •  Have no access to user data
  •  Great efficiency: needs very little silicon area, consumes very low energy and does not degrade the IC performance
  •  100% Hardware based: does not require extra-software design as it relies on the IC itself

Key features

  • Texplained’s countermeasure is schematically composed of two main blocs:
  • 1. The Detection Module detects the attack « on the fly »
  • => Its checks the execution flow of the software to detect if a Hardware attack is in progress
  • 2. The Defense Module reacts to the attack by preventing the striker to obtain the code in the NVW
  • => It is highly linked to the architecture of the chip itself, then fully flexible to adapt any Hw architecture
  • This module brings self-awareness to the chip, avoiding the development of a specific sw security

Block Diagram

Benefits

  •  EFFECTIVENESS against the most common invasive attack:
    •  Protection against NVM read-out
    •  Protection of chip designer’s assets and user code
  • => Prevents from counterfeiting, emulation / copy, cloning (off-branded and illegal copies)
  • - EASY-INTEGRATION:
    • - 100% Standard Cells-based design, fully integrable in the digital core
      • => No analog parts involved
    • - 100% hardware CM: no Sw involved in both modules (Detection and Defense)
    • - 0% sw development needed for the integration of the countermeasure in the design
  • => No additional costs for sw development
  • - COST-EFFECTIVENESS:
    • - Small footprint (only a few standard cells)
    • - No impact on the chip performance (passive monitoring)
    • - Insignificant power consumption
  • => Very favorable Security / Cost ratio

Applications

  • e-Gov
  • IoT
  • Pay TV
  • Consoles & printers peripherals
  • Access Control
  • Smart meters
  • Ticketing

What’s Included?

  • Architecture of the Countermeasure
  • Design Specification of the Detection Module
  • Adaptation of the Countermeasure to the chip’s architecture
  • Support on the integration of the Countermeasure

Specifications

Identity

Part Number
NVM Defender
Vendor
Texplained
Type
Silicon IP

Files

Note: some files may require an NDA depending on provider policy.

Provider

Texplained
HQ: France
Texplained specializes in the security of Integrated Circuits. With a focus on protection against counterfeiting and copy of chips, the company has developed its first countermeasure. The unique approach of its experts brings disruptive solutions, with great effectiveness in terms of chips resiliency against attacks. Rather than relying on obfuscation, Texplained advocates security by design. Texplained also proposes Hardware security evaluation and educates hardware security fellows on threats to the confidentiality of chips and their secrets like the embedded code.

Learn more about Root Of Trust IP core

Root of Trust: A Security Essential for Cyber Defense

Imagine a datacenter powering critical cloud services, silently compromised by a tampered chip inserted during manufacturing. In most cases, the malware would be practically impossible to remove and could persist across formats/reinstalls !

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Root of Trust IP cores

What is Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass?

Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass is a Root Of Trust IP core from Texplained listed on Semi IP Hub.

How should engineers evaluate this Root Of Trust?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Root Of Trust IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP