Vendor: Secure-IC Category: Fault Injection Protection

Active Shield

Attacks on digital circuits can occur when an attacker attempts to physically alter the device's internal components.

Overview

Attacks on digital circuits can occur when an attacker attempts to physically alter the device's internal components. These types of attacks are known as intrusive and can include actions such as probing or manipulating signals, adding or removing components, or modifying features on the chip.

To counteract these threats, Secure-IC has developed the Active Shield technology. This technology uses a protective mesh layer over the sensitive parts of the circuit, and actively monitors the mesh integrity for any signs of tampering. This countermeasure helps to safeguard the circuit's features and components, such as metal routing and transistors, from unauthorized access or modification through the front side of the device, such as:

  • Wire micro-probing to read or force an equipotential
  • Wire cutting (e.g., alarms, entropy source disconnection from a true random number generator…)
  • Wire re-routing
  • Burnt fuses opening
  • ROM Altering

Active monitoring

In order to further deter intrusive attacks, the mesh is actively monitored using random cryptographically generated patterns to detect integrity violations. By using this technology, modifying and rerouting the mesh becomes very costly as the attacker must reroute many wires to avoid detection. In addition, the data travelling through the shield mesh cannot be predicted by the attacker, because it is output by a cryptographic block cipher.

Active Shield technology relies on several submodules:

 

  • A mesh created using a metal layer for wire routing
  • Drivers and receivers used for electrical connection with the mesh
  • A cryptographic-grade tamper detection module for monitoring the mesh integrity

Ideal for

 

Active Shield IP is ideal for:

  • Protection against Bus probing
  • Protection against FIB attacks
  • Protection against wire micro-probing to read or force an equipotential
  • Protection against wire cutting (e.g., alarms, entropy source disconnection from a true random number generator)
  • Protection against wire re-routing
  • Protection against ROM altering

 

Key features

  • Anti-tamper solution with a mesh placed over the sensitive parts of the circuit and actively monitored
  • Uses random cryptographically generated patterns to detect integrity violations
  • Antenna-effect safe
  • Security certification ready (incl. Common Criteria)
  • Fully digital and designed with the standard cells library
  • Mesh designed with scripts
  • Mesh can be interleaved with P/G network in topmost layers (no need to sacrifice a layer)
  • Compatible with clock gating to reduce the power consumption
  • Transferable to any design kit
  • Lightweight
  • No calibration after design
  • Easy to integrate into the system
  • AMBA (APB, AHB, AXI) interface

Block Diagram

Applications

  • IoT
  • Setup Box
  • Mobile
  • Automotive
  • Defense

What’s Included?

  • Technical specifications document including User manual, Integration guideline, Test Plan
  • VHDL RTL code for the shield
  • VHDL testbench and scripts for simulation
  • RTL of the AMBA wrapper
  • Constraints file (.sdc)
  • Innovus scripts to place and route the shield
  • Support for integration

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
SCZ_IP_AS
Vendor
Secure-IC
Type
Silicon IP

Provider

Secure-IC
HQ: France
With presence and customers across 5 continents, Secure-IC is the rising leader and the only global provider of end-to-end cybersecurity solutions for embedded systems and connected objects. Driven by a unique approach called PESC (Protect, Evaluate, Service & Certify), Secure-IC positions itself as a partner to support its clients throughout and beyond the IC design process. Relying on innovation and research activities, Secure-IC provides Silicon-proven and cutting-edge protection technologies, integrated Secure Elements and security evaluation platforms to reach compliance with the highest level of certification for different markets (such as automotive, AIoT, defense, payments & transactions, memory & storage, server & cloud). Discover in preview of Secure-IC new Securyzr Server to manage the security of heterogeneous fleets of IoT devices throughout their lifecycle

Learn more about Fault Injection Protection IP core

What Does a GPU Have to Do With Automotive Security?

The automotive industry is undergoing the most significant transformation since the advent of electronics in cars. Vehicles are becoming software-defined, connected, AI-driven, and continuously updated. This evolution brings extraordinary new capability – but it also brings greater levels of cybersecurity and functional-safety risks.

How to design secure SoCs, Part II: Key Management

Have you ever wondered how secure critical systems, like medical devices, aerospace systems or autonomous cars, really are when it comes to data protection? One point of the answer lies in effective and robust key management. Cryptographic keys are the digital secrets underpinning device identity, data confidentiality, secure communication, and overall system trustworthiness.

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Fault Injection Protection IP cores

What is Active Shield?

Active Shield is a Fault Injection Protection IP core from Secure-IC listed on Semi IP Hub.

How should engineers evaluate this Fault Injection Protection?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Fault Injection Protection IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP