- Protection of the embedded secrets against professional hackers stealing actions
- Protection of Non-Volatile-Memory to make sure that pirates:
- Do not access the code (boot loader, test functions) which could be used to extract the embedded software or data
- Can not extract the embedded software which would allow them to:
- Gain information to be able to easily perform cheaper attacks
- Emulate the code on another device
- Have no access to user data
- Great efficiency: needs very little silicon area, consumes very low energy and does not degrade the IC performance
- 100% Hardware based: does not require extra-software design as it relies on the IC itself
Anti-Counterfeiting Digital IP - Self-aware and Anti-bypass
Overview
Key Features
- Texplained’s countermeasure is schematically composed of two main blocs:
- 1. The Detection Module detects the attack « on the fly »
- => Its checks the execution flow of the software to detect if a Hardware attack is in progress
- 2. The Defense Module reacts to the attack by preventing the striker to obtain the code in the NVW
- => It is highly linked to the architecture of the chip itself, then fully flexible to adapt any Hw architecture
- This module brings self-awareness to the chip, avoiding the development of a specific sw security
Benefits
- - EFFECTIVENESS against the most common invasive attack:
- - Protection against NVM read-out
- - Protection of chip designer’s assets and user code
- => Prevents from counterfeiting, emulation / copy, cloning (off-branded and illegal copies)
- - EASY-INTEGRATION:
- - 100% Standard Cells-based design, fully integrable in the digital core
- => No analog parts involved
- - 100% hardware CM: no Sw involved in both modules (Detection and Defense)
- - 0% sw development needed for the integration of the countermeasure in the design
- - 100% Standard Cells-based design, fully integrable in the digital core
- => No additional costs for sw development
- - COST-EFFECTIVENESS:
- - Small footprint (only a few standard cells)
- - No impact on the chip performance (passive monitoring)
- - Insignificant power consumption
- => Very favorable Security / Cost ratio
Applications
- e-Gov
- IoT
- Pay TV
- Consoles & printers peripherals
- Access Control
- Smart meters
- Ticketing
Deliverables
- Architecture of the Countermeasure
- Design Specification of the Detection Module
- Adaptation of the Countermeasure to the chip’s architecture
- Support on the integration of the Countermeasure
Technical Specifications
Availability
Immediate
Related IPs
- Advanced DPA- and FIA-resistant FortiMac HMAC SHA2 IP core
- DPA and FIA-Resistant Ultra-Compact FortiCrypt AES IP core
- DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
- DPA- and FIA-resistant Ultra High Bandwidth FortiCrypt AES IP core
- DPA- and FIA-resistant Ultra Low Power FortiCrypt AES IP core
- Curve25519 Key Exchange and Digital Signature IP Core