SILICON SECURITY SERVICES
Our silicon security team helps risk managers, product owners, designers, and cybersecurity professionals understand and manage the emerging risks of silicon-level and hardware-based supply chain attacks
IOActive has spent over two decades at the forefront of hardware/embedded systems research, and as the security of systems (and systems of systems) increasingly depends upon proper hardware security design and implementation, IOActive has invested in honing silicon-level attack techniques that complement the advanced embedded-device, side-channel, and fault-injection attacks we’ve perfected.
Our silicon security practice has added black-box and graybox attacks to our commercial white-box work, which includes development of threat models at the microprocessor and SOC level, supporting clients in defining security design requirements, and performing register transfer level (RTL) and GDS partial layout reviews.
Key business services generated from IOActive’s refined black-box techniques include the following:
- Research and Analysis
- Security Feature Confirmation and Assessment
- Netlist Extraction
- Data Extraction (NVMs)
- Supply Chain Risk Sampling
- Hardware Backdoor Detection
- IP Infringement Support
IOActive understands the value of these services to both legitimate and malicious entities, and will not provide them to organizations without a legitimate purpose for assessing the chips, devices, or systems. These services are intended to support counterfeit interdiction efforts, help clients to improve their resistance to silicon-level attacks, reduce the risk of IP theft, and mitigate other consequential impacts.
Get the datasheet for more details, or contact us.