PowerIQ Logo

Design side-channel vulnerability out of your hardware before you build it.

Thank You!

Mail icon

Request a Demo

Get In Touch
Professor Adi Shamir, PhD, Hardware Security Expert
Professor Adi Shamir, PhD.

The ‘S’ in RSA and Turing Prize Winner

— FortifyIQ’s solution has the potential of dramatically reducing the cost and delay associated with the manufacturing of DPA-protected devices…
— This is an innovative solution to a really important problem, produced by a first-rate team of developers.

Quote icon

Side-Channel Attacks (SCA) extract cryptographic keys from hardware systems by analyzing power traces from the target device along with the corresponding collection of plain and/or cipher data. Fault Injection attacks extract cryptographic keys from hardware systems by injecting faults into the calculation and analyzing the set of cipher data for which the faults cause corrupted results and/or the values of the corrupted results. The best way to defeat these and other side-channel attacks is by means of a pre-silicon simulation which enables you to eradicate vulnerabilities during the design phase.

That’s the benefit of FortifyIQ’s power consumption simulator, PowerIQ. It is a software tool which simulates side-channel data from a cryptographic hardware device based on a standard textual representation of the device’s circuitry. It is much faster and less expensive to use PowerIQ in the pre-silicon stage than to use an oscilloscope/any other laboratory equipment to obtain power consumption traces from the actual physical device after it is built.

You could potentially save — in tapeout, masks, and fab run — millions of dollars and several months in your product development process.

Our innovation is a novel, patent-pending method of accurately simulating the power consumption of the designed chip. PowerIQ uses information usually available at the start of the hardware development and can be used at any phase of the hardware development cycle – RTL, post-synthesis (gate-level NetList), as well as post “place-and-route.” While we find that the most effective stage is the post synthesis (gate-level Netlist) stage, the results of the gate-level Netlist-based trace analyses can still be formulated in terms of RTL and solved at the RTL level.

PowerIQ Advantages:

Magnifying Glass icon

Enables more accurate analyses.

The use of software rather than a hardware test setup eliminates noise (unavoidable with physical measurements), thereby improving accuracy and reducing sample volumes.

Checkmarks icon

Easy test samples generation.

Sometimes a DPA attack defines its own method (strategy) on how to generate the test data (plain text). To see if you are vulnerable to such an attack, PowerIQ includes a tool that can output test samples consistent with any foreseeable DPA attack strategy.

Modeling icon

Model as you go.

Modeling only a portion of the design at a time (for example, new IP blocks in a design upgrade) can greatly reduce the volume of data that must be processed, analyzed, and reviewed all at once.

Tools support icon

Supports all analytical tools.

Traces are formatted in the de facto oscilloscope standard (LeCroy) for easy input to any analytical tool.

Power leak icon

Easy power leak localization.

Enabling partial analysis for every module and every type of gate means that you can easily localize the sources of power leaks to any segment of the design in order to take remediation steps faster.

Verification icon

Verification of fault injection resistance.

PowerIQ offers verification to ensure that the design being tested is fault injection resistant.

Question Mark icon

Enables “what if” simulations.

PowerIQ modeling enables “what if” analyses that can help find optimal solutions for design errors faster.

Distributed execution icon

Distributed execution.

Simulations are distributable and can run across all available CPUs.

Graph icon

Shows where volatility creates vulnerability.

One of the most painful leaks is a “glitch” — the volatility of electrical current before it stabilizes at a clock boundary. PowerIQ can simulate DPA glitch vulnerability, which traditional power consumption techniques can’t see.

Clock icon

From fewer clocks, faster results.

For many attacks, only the information about power consumption during specific clocks needs to be collected.

© 2020 FortifyIQ, Inc.