TraceIQ Logo

Analyze side-channel vulnerability in your hardware before you build it.

Thank You!

Mail icon

Request a Demo

Get In Touch

FortifyIQ's trace analysis tool, TraceIQ, automatically extracts cryptographic keys from power traces of target devices. The keys correspond to a collection of test data consisting of pairs of plain and cipher texts. In addition, TraceIQ highlights hardware design issues that cause information leakage.

  • The types and instances of the cells with leaks

  • Design stability in the presence of glitches

  • Which clock pulses or cycles are problematic

  • And more

TraceIQ can process actual traces from physical hardware or simulated traces from virtual models, such as when using TraceIQ with FortifyIQ's power consumption simulator, PowerIQ. Traces can be provided in the standard oscilloscope format (LeCroy) or in a format defined by the user with the help of simple syntax. Analysis of the results can be presented as a key value with a report on how it was extracted – both visually in a graph (illustrating leaks) and in a report.

TraceIQ carries out its analysis based on known side-channel attack strategies, including the classic Differential Power Analysis (DPA) attack, the split-flow attack by Moradi, the template attack, as well as a growing library of attacks discovered or created by FortifyIQ.

TraceIQ Advantages:

Cipher support icon

Wide cipher support.

TraceIQ supports all widely used symmetric encryption algorithms.

Trace Analysis Time Optimization icon

No time lost needlessly analyzing traces.

The program automatically stops analyzing traces when it determines it has enough information to unambiguously find the secret key.

Lock icon

Easily extended.

TraceIQ can support new encryption algorithms as they become available, without recompilation, by way of a simple plug-in.

High capacity icon

High capacity.

The program can process an enormous collection of trace files.

Tests icon

Supports custom test samples.

TraceIQ can support new encryption algorithms as they become available, without recompilation, by way of a simple plug-in.

Interruptible icon

Interruptible.

If the program is stopped for any reason, it can resume at the spot where it was interrupted or just before, as needed.

High-Order DPA Support icon

Supports High-Order DPA (HO-DPA).

TraceIQ lets you mount HO-DPA attacks, i.e., attacks using multiple data sources and different time offsets.

System-optimized icon

System-optimized operation..

A multithreaded architecture automatically optimizes the analysis based on the capabilities of any host system.

Test attack strategies icon

Easily define and test attack strategies.

TraceIQ has a tool and simple language that let you define hypotheses about the manipulation of a cryptographic key and data to see if the hypotheses correlate with power consumption.

Users find TraceIQ more effective and flexible than competing approaches. Its ease of use makes it ideal for occasional users while numerous options are available for expert users looking to optimize the system for complex cases. FortifyIQ's experts are always available for consultations about ways to maximize the utility of the system for your particular application.