Remove Fault Injection Attack Vulnerability From Your Hardware Prior to Manufacturing

Fault Injection Attacks (FIA) extract secrets, e.g. cryptographic keys, from hardware systems by injecting faults, e.g. using a laser beam to disrupt the circuit function, or increasing operating frequency or supply voltage beyond their maximum specifications.

Until now, the only way to assess FIA vulnerabilities was to measure device parameters after manufacturing – an expensive and time-consuming process. FortifyIQ has developed a unique pre-silicon simulation and analysis solution, FaultInjection Studio, which allows you to identify FIA vulnerabilities during the design phase. You could potentially save — in tapeout, masks, and fab costs — millions of dollars and months of your product development.

FaultInjection Studio is a software tool which checks the robustness of your device’s design to FIA and analyzes the simulated results

FaultInjection Studio consists of an FIA simulation engine, FAST IQ – “Fault Attack Simulator and Test” that is integrated with the Verilator functional simulator.

Fire IQ helps you find vulnerabilities to fault injection attacks. Its open architecture enables you to extend it according to your needs.

Professor Adi Shamir, PhD.

The ‘S’ in RSA and Turing Prize Winner

— FortifyIQ’s solution has the potential of dramatically reducing the cost and delay associated with the manufacturing of DPA-protected devices…

— This is an innovative solution to a really important problem, produced by a first-rate team of developers.

FaultInjection Studio is a highly effective and flexible solution for pre-silicon FIA analysis, as well as post-silicon analysis with captured fault injection data. Its ease of use and extensibility makes it well suited both for new users as well as expert users looking to customize their FIA analysis environment. FortifyIQ’s own experts are available for consultations about ways to maximize the utility of the system for your application.

FaultInjection Studio Advantages:

Delivers savings in development cost and schedule.

Using FaultInjection Studio in the design stage is much faster and less expensive than using test equipment to perform FIA analysis on the manufactured device, and potentially re-spinning the design to remove the FIA vulnerabilities.

Enables more accurate and precise analysis.

Using FaultInjection Studio for pre-silicon FIA simulation and analysis provides a controlled environment to identify FIA vulnerabilities, eliminating noise and calibration effects that impact physical measurements.

Flexible and extensible.

FaultInjection Studio can also be used for post-silicon FIA analysis because it supports the input of data captured by test equipment. 

Flexible and extensible.

FaultInjection Studio can also be used for post-silicon FIA analysis because it supports the input of data captured by test equipment. FaultInjection Studio has an extensible plugin architecture.

Demo Request: FaultInjection Studio

Fortify’s AES security evaluation by SGS

“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”

” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”

Request Technical Details