Vendor: Secure-IC Category: Fault Injection Protection

Digital Fault Injection Attack Detector

In cryptography, an attack can be performed by injecting one or several faults into a device thus disrupting the functional behav…

Overview

In cryptography, an attack can be performed by injecting one or several faults into a device thus disrupting the functional behavior of the device. Techniques commonly used to inject faults consist in introducing variations in the source voltage, clock frequency, temperature, or irradiating with a laser beam etc.

Unlike analog sensors which are dedicated to the detection of a specific perturbation attack, the Digital Sensor is designed to detect various threats belonging to the family of Fault Injection Attacks (FIA):

  • Input clock frequency (clock glitches, overclocking)
  • Input voltage (power glitches, underfeeding)
  • Temperature (heating)
  • Radiations (laser spot, light spot, electromagnetic)

Digital Sensor converts all monitored stresses into a timing stress which is then measured. When a threat is detected, it provides the system with a measurement of the threat’s level and it raises the hardware alarm.

 

Key features

  • Detects global and local fault injections such as laser, EMFI, clock or temperature
  • Difficult to identify by an attacker (melted within the rest of design)
  • Real-time hardware alarm
  • Embeds health-test to validate the integrity of the IP during the boot and on-demand
  • Proven technology with stochastic model for reliability and security estimation
  • Tested in the Security Science Factory Lab, using global stress (e.g., clock glitch) and local stress (e.g., electromagnetic injection)
  • Security certification ready (incl. Common Criteria)
  • Fully digital and designed with the standard cells library
  • Transferable to any design kit
  • Lightweight
  • Customizable sensitivity
  • Compatible with clock gating feature
  • Several sensors can be regrouped around a unique bus interface
  • No calibration after design
  • Support DVFS
  • Easy to integrate into the system
  • AMBA (APB, AHB, AXI) interface

Block Diagram

Applications

  • IoT
  • Set-top Box
  • Mobile
  • Automotive
  • Defense
  • Etc.

What’s Included?

  • Technical specifications
  • Front-end RTL and constraints files .sdc
  • Integration guidance for back-end
  • Self-checking RTL Testbench based on reference scenario for simulation
  • Remote support for integration

Files

Note: some files may require an NDA depending on provider policy.

Specifications

Identity

Part Number
SCZ_IP_DS_200
Vendor
Secure-IC
Type
Silicon IP

Provider

Secure-IC
HQ: France
With presence and customers across 5 continents, Secure-IC is the rising leader and the only global provider of end-to-end cybersecurity solutions for embedded systems and connected objects. Driven by a unique approach called PESC (Protect, Evaluate, Service & Certify), Secure-IC positions itself as a partner to support its clients throughout and beyond the IC design process. Relying on innovation and research activities, Secure-IC provides Silicon-proven and cutting-edge protection technologies, integrated Secure Elements and security evaluation platforms to reach compliance with the highest level of certification for different markets (such as automotive, AIoT, defense, payments & transactions, memory & storage, server & cloud). Discover in preview of Secure-IC new Securyzr Server to manage the security of heterogeneous fleets of IoT devices throughout their lifecycle

Learn more about Fault Injection Protection IP core

What Does a GPU Have to Do With Automotive Security?

The automotive industry is undergoing the most significant transformation since the advent of electronics in cars. Vehicles are becoming software-defined, connected, AI-driven, and continuously updated. This evolution brings extraordinary new capability – but it also brings greater levels of cybersecurity and functional-safety risks.

How to design secure SoCs, Part II: Key Management

Have you ever wondered how secure critical systems, like medical devices, aerospace systems or autonomous cars, really are when it comes to data protection? One point of the answer lies in effective and robust key management. Cryptographic keys are the digital secrets underpinning device identity, data confidentiality, secure communication, and overall system trustworthiness.

Why Hardware Root of Trust Needs Anti-Tampering Design

The hardware root of trust (HRoT) provides the trust base (root key), hardware identifier (UID), hardware unique key (HUK), and entropy required for the secure operation of the entire chip and therefore is often the focus of hacker attacks. If the design can’t effectively resist attacks, hackers can easily obtain the secrets of the entire chip. Attackers can use the secrets to crack identity authentication and data encryption and steal product design know-how, causing application security problems.

Frequently asked questions about Fault Injection Protection IP cores

What is Digital Fault Injection Attack Detector?

Digital Fault Injection Attack Detector is a Fault Injection Protection IP core from Secure-IC listed on Semi IP Hub.

How should engineers evaluate this Fault Injection Protection?

Engineers should review the overview, key features, supported foundries and nodes, maturity, deliverables, and provider information before shortlisting this Fault Injection Protection IP.

Can this semiconductor IP be compared with similar products?

Yes. Buyers can compare this product with similar semiconductor IP cores or IP families based on category, provider, process options, and structured technical specifications.

×
Semiconductor IP