Home Security Tools Inspector Pre-Silicon

Inspector Pre-Silicon

Find and fix side channel and fault injection vulnerabilities pre-silicon, instead of post-silicon. With Riscure Inspector Pre-Silicon, chip vendors are now able to find leakage in their designs and identify the root-cause automatically, using our unique patented technology. With Riscure, you can now make informed decisions on the security posture of your development.

Find security issues during the design of a chip. Find Leakage and the root-cause automatically.

Automating security evaluation

Leakage Analysis

Inspector Pre-silicon finds leakage that an attacker can exploit and detects the parts of the design that contribute to the detected leakage.

Root-Cause Analysis

Inspector Pre-Silicon points to gates on a physical level and translates that to the RTL design so that the chip design can be changed to prevent security vulnerabilities.

How Riscure Inspector Pre-Silicon works

With the customer’s EDA toolchain, an RTL design, Netlist or routed netlist is simulated. With this, Inspector Pre-Silicon collects around 5000 traces. Based on these traces, Inspector makes an analysis to detect leakage. Riscure’s product can identify the window in which the leakage occurs, detect which signals and gates are active in that window, and then rank which of them are contributing the most to the leakage we measure.

Benefits of using Inspector Pre-Silicon

  • Enable non-security-expert designers to root cause security issues.  
  • Find and identify issues when it’s still quick to fix them.

  • Reduce the need for time-consuming and expensive silicon testing.
  • Reduce the risk of post-silicon certification failure and insecure products.

What our customers say

“With post-silicon security analysis, we can fix the next chip. With pre-silicon security analysis, we can fix the current chip.”

“The combination of doing it fast and showing where the problem is – is unique on the market.”

What Riscure Offers:

Inspector Pre-silicon

Essential package for clients who work on pre-silicon SCA with AES cores and have established EDA tooling
& expertise.

Inspector Pre-Silicon + DevSecOps Security Service

Riscure experts run simulations, interpret the results and offer advice on the mitigation strategy.
Covers SCA for AES core only. EDA tooling is provided by a customer.

Pre-Silicon project

For clients who do not have EDA tooling or in-house security experts, Riscure will install & operate Inspector Pre-Silicon and interpret the results. Full support from Riscure to help you secure your development.

Request a demo

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

Get in touch with us

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

By checking this box you agree to process your data according to Riscure's privacy policy:
Check this box to also subscribe to our monthly newsletter:

News and updates

Riscure releases Inspector Pre-Silicon, the first automated solution to find hardware vulnerabilities during design stage

Riscure releases Inspector Pre-Silicon, the first automated solution to find hardware vulnerabilities during design stage

Riscure releases the first version of Inspector Pre-Silicon, the latest product in the Riscure suite of software and hardware solutions aimed to help vendors test and improve the security of ...
Security Highlight: Exploiting persistent faults in crypto

Security Highlight: Exploiting persistent faults in crypto

At the most recent CHES workshop, Hossein Hadipour of the Graz University of Technology presented an important step forward in exploiting persistent faults in crypto.
My journey at Riscure: Anjana Miyar

My journey at Riscure: Anjana Miyar

Anjana Miyar is a Senior Security Analyst at Riscure North America. Anjana’s specialty lies in software security testing. Unlike many others, Anjana did not have prior security experience before ...
Security Highlight: Compromising printers via malicious third-party cartridges

Security Highlight: Compromising printers via malicious third-party cartridges

This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the ...
Tunable Replica Circuit

Tunable Replica Circuit

At the Black Hat 2022, Daniel Nemiroff presented a talk on Tunable Replica Circuits. Riscure CTO of North America, Jasper van Woudenberg had an opportunity to listen to this presentation. Here ...
Shift Security left: mitigating hardware vulnerabilities during design stage

Shift Security left: mitigating hardware vulnerabilities during design stage

In January 2023 we launched a new product within our Riscure Inspector range that is focused on pre-silicon testing. This release is preceded by years of research, where our goal was to solve a ...