TraceIQ Logo

Analyze side-channel vulnerability in your hardware before you build it.

Thank You!

Mail icon

Request a Demo

Get In Touch

FortifyIQ's trace analysis tool, TraceIQ, automatically extracts cryptographic keys from power traces of target devices. In addition, TraceIQ highlights hardware design issues that cause information leakage.

  • The types and instances of the cells with leaks

  • Which clock pulses or cycles are problematic

  • Design stability in the presence of glitches

  • And more

TraceIQ can process actual side-channel traces from physical hardware as well as simulated traces from virtual models, such as when using TraceIQ with FortifyIQ’s side-channel simulator, PowerIQ. Traces can be provided in the standard formats LeCroy (trc), Riscure (trs), Numpy (npy) as well as in FortifyIQ’s proprietary format or in a format defined by the user with the help of simple syntax. Analysis of the results can be presented as a key value with a report on how it was extracted – both visually in a graph (illustrating leaks) and in a report.

TraceIQ carries out its analysis based on known side-channel attack strategies, including classic correlational attacks, the enhanced correlational attack by Moradi, template attacks, as well as a growing library of attacks discovered or created by FortifyIQ including attacks on SHA-256 based HMAC, and novel template attacks on AES that involve machine learning and deep learning techniques.

Users find TraceIQ more effective and flexible than competing approaches. Its ease of use makes it ideal for occasional users while numerous options are available for expert users looking to optimize the system for complex cases. FortifyIQ's experts are always available for consultations about ways to maximize the utility of the system for your particular application.

TraceIQ Advantages:

Cipher support icon

Wide cipher support.

TraceIQ supports all widely used symmetric encryption algorithms.

Trace Analysis Time Optimization icon

No time lost needlessly analyzing traces.

The program automatically stops analyzing traces when it determines it has enough information to unambiguously find the secret key.

Lock icon

Easily extended.

TraceIQ can support new encryption algorithms as they become available, without recompilation, by way of a simple plug-in.

High capacity icon

High capacity.

The program can process an enormous collection of trace files.

Tests icon

Supports custom test samples.

TraceIQ includes a tool for easy generation of custom test samples (pairs of plain-cipher texts) or, alternatively, you can use test samples generated with your own tools.

Interruptible icon


If the program is stopped for any reason, it can resume at the spot where it was interrupted or just before, as needed.

High-Order DPA Support icon

Supports High-Order DPA (HO-DPA).

TraceIQ lets you mount HO-DPA attacks, i.e., attacks using multiple data sources and different time offsets.

System-optimized icon

System-optimized operation.

A multi-threaded architecture automatically optimizes the analysis based on the capabilities of any host system.

Test attack strategies icon

Easily define and test attack strategies.

TraceIQ has a tool and simple language that let you define hypotheses about the manipulation of a cryptographic key and data to see if the hypotheses correlate with power consumption.

© 2020 FortifyIQ, Inc.