Home Security Testing Solutions Inspector Pre-Silicon

Inspector Pre-Silicon

Find and fix side channel and fault injection vulnerabilities pre-silicon, instead of post-silicon. With Riscure Inspector Pre-Silicon, chip vendors are now able to find leakage in their designs and identify the root-cause automatically, using our unique patented technology. With Riscure, you can now make informed decisions on the security posture of your development.

Find security issues during the design of a chip. Find Leakage and the root-cause automatically.

Automating security evaluation

Leakage Analysis

Inspector Pre-silicon finds leakage that an attacker can exploit and detects the parts of the design that contribute to the detected leakage.

Root-Cause Analysis

Inspector Pre-Silicon points to gates on a physical level and translates that to the RTL design so that the chip design can be changed to prevent security vulnerabilities.

How Riscure Inspector Pre-Silicon works

With the customer’s EDA toolchain, an RTL design, Netlist or routed netlist is simulated. With this, Inspector Pre-Silicon collects around 5000 traces. Based on these traces, Inspector makes an analysis to detect leakage. Riscure’s product can identify the window in which the leakage occurs, detect which signals and gates are active in that window, and then rank which of them are contributing the most to the leakage we measure.

Benefits of using Inspector Pre-Silicon

  • Enable non-security-expert designers to root cause security issues.  
  • Find and identify issues when it’s still quick to fix them.

  • Reduce the need for time-consuming and expensive silicon testing.
  • Reduce the risk of post-silicon certification failure and insecure products.

What our customers say

“With post-silicon security analysis, we can fix the next chip. With pre-silicon security analysis, we can fix the current chip.”

“The combination of doing it fast and showing where the problem is – is unique on the market.”

What Riscure Offers:

Inspector Pre-silicon

Essential package for clients who work on pre-silicon SCA with AES cores and have established EDA tooling
& expertise.

Inspector Pre-Silicon + DevSecOps Security Service

Riscure experts run simulations, interpret the results and offer advice on the mitigation strategy.
Covers SCA for AES core only. EDA tooling is provided by a customer.

Pre-Silicon project

For clients who do not have EDA tooling or in-house security experts, Riscure will install & operate Inspector Pre-Silicon and interpret the results. Full support from Riscure to help you secure your development.

Request a demo

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

Get in touch with us

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

By checking this box you agree to process your data according to Riscure's privacy policy:
Check this box to also subscribe to our monthly newsletter:

News and updates

Reducing Signal Noise for Precise Triggers & Filtering in Side-Channel Analysis & Fault Injection

Reducing Signal Noise for Precise Triggers & Filtering in Side-Channel Analysis & Fault Injection

Discover how Riscure's Transceiver refines signal clarity and boosts the precision of Side-Channel Analysis (SCA) and Fault Injection (FI) triggering.
Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Security Highlight: Side-Channel Vulnerability in Infineon Cryptographic Library

Reading the EUCLEAK paper provides a detailed journey through the ups and downs of carrying out a blackbox attack.
My Internship at Riscure: Gabin Le Saout

My Internship at Riscure: Gabin Le Saout

In this blog post, Gabin Le Saout shares his internship journey at Riscure.
Understanding Device Security: What We’ve Learned at Riscure

Understanding Device Security: What We’ve Learned at Riscure

In this blog, we ask our experts how they define device security, and as they shared their thoughts, several common themes stood out.
Security Highlight: Backdoor Key Found in MIFARE Classic Cards

Security Highlight: Backdoor Key Found in MIFARE Classic Cards

A recent discovery by security researcher Philippe Teuwen and the Proxmark3 community has revealed a significant backdoor in several widely used MIFARE Classic RFID cards.
Shimano Di2 vulnerability: let’s talk about device security in sports

Shimano Di2 vulnerability: let’s talk about device security in sports

Integrating technology into new domains can introduce unexpected vulnerabilities. In this blog post, let's talk about the recent discovery of a security flaw in Shimano's Di2 wireless ...