Home Security Testing Solutions Inspector Pre-Silicon

Inspector Pre-Silicon

Find and fix side channel and fault injection vulnerabilities pre-silicon, instead of post-silicon. With Riscure Inspector Pre-Silicon, chip vendors are now able to find leakage in their designs and identify the root-cause automatically, using our unique patented technology. With Riscure, you can now make informed decisions on the security posture of your development.

Find security issues during the design of a chip. Find Leakage and the root-cause automatically.

Automating security evaluation

Leakage Analysis

Inspector Pre-silicon finds leakage that an attacker can exploit and detects the parts of the design that contribute to the detected leakage.

Root-Cause Analysis

Inspector Pre-Silicon points to gates on a physical level and translates that to the RTL design so that the chip design can be changed to prevent security vulnerabilities.

How Riscure Inspector Pre-Silicon works

With the customer’s EDA toolchain, an RTL design, Netlist or routed netlist is simulated. With this, Inspector Pre-Silicon collects around 5000 traces. Based on these traces, Inspector makes an analysis to detect leakage. Riscure’s product can identify the window in which the leakage occurs, detect which signals and gates are active in that window, and then rank which of them are contributing the most to the leakage we measure.

Benefits of using Inspector Pre-Silicon

  • Enable non-security-expert designers to root cause security issues.  
  • Find and identify issues when it’s still quick to fix them.

  • Reduce the need for time-consuming and expensive silicon testing.
  • Reduce the risk of post-silicon certification failure and insecure products.

What our customers say

“With post-silicon security analysis, we can fix the next chip. With pre-silicon security analysis, we can fix the current chip.”

“The combination of doing it fast and showing where the problem is – is unique on the market.”

What Riscure Offers:

Inspector Pre-silicon

Essential package for clients who work on pre-silicon SCA with AES cores and have established EDA tooling
& expertise.

Inspector Pre-Silicon + DevSecOps Security Service

Riscure experts run simulations, interpret the results and offer advice on the mitigation strategy.
Covers SCA for AES core only. EDA tooling is provided by a customer.

Pre-Silicon project

For clients who do not have EDA tooling or in-house security experts, Riscure will install & operate Inspector Pre-Silicon and interpret the results. Full support from Riscure to help you secure your development.

Request a demo

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

Get in touch with us

Feel free to contact us anytime at inforequest@riscure.com or fill out the form below.

By checking this box you agree to process your data according to Riscure's privacy policy:
Check this box to also subscribe to our monthly newsletter:

News and updates

Gaming Consoles as a Frontier in Hardware Attacks

Gaming Consoles as a Frontier in Hardware Attacks

In this blog post we collected a number of notable examples of hardware exploits in gaming consoles over the years.
Riscure Achieves TISAX Level 3

Riscure Achieves TISAX Level 3

Riscure announces that it has successfully completed the TISAX Level 3 assessment.
Security Highlight: The Potential Impact of Hardware Security Weaknesses

Security Highlight: The Potential Impact of Hardware Security Weaknesses

This security highlight discusses the recent NIST report on hardware weaknesses, relating to Riscure's experience in the field. 
Riscure Accredited for EPI Digital Wallet Evaluations, Securing Europe’s Next Payment Platform

Riscure Accredited for EPI Digital Wallet Evaluations, Securing Europe’s Next Payment Platform

Riscure now provides security evaluation services for the European Payments Initiative (EPI) digital wallet certifications.
My internship at Riscure: Daan de Heij

My internship at Riscure: Daan de Heij

In this blog post, Daan de Heij shares his internship journey at Riscure.
Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Security Highlight: The impact of the XZ backdoor. Can we still trust open source?

Marc Witteman talks about a recent attack on an open source package and evaluates the possibility of planting malicious functionality in hardware.