FortiEDA Security Assessment Tools
Comprehensive Pre- and Post-Silicon Security Validation Against Side-Channel and Fault Injection Attacks
Overview
FortiEDA is FortifyIQ’s suite of Electronic Design Automation (EDA) tools for evaluating hardware resistance against Side-Channel (SCA) and Fault Injection Attacks (FIA). It enables hardware designers and validation engineers to detect, locate, and mitigate vulnerabilities from the earliest RTL stage through GDSII and perform post-silicon security validation. FortiEDA integrates directly into standard verification flows through the DPI interface, automatically generating modified testbenches and build scripts. Security assessments run alongside functional verification with minimal setup.
Product Studios
Analyzes leakage vulnerabilities throughout the design flow by generating simulated power traces, performing statistical leakage tests (Welch’s t-test / TVLA), and applying advanced side-channel attack engines (DPA, CPA, template, and deep learning). Key advantages include a proprietary parallel trace engine that enables high-speed acquisition and analysis of up to billions of traces without storage bottlenecks.
Precise leakage pinpointing isolates vulnerable modules, signals, or gates. Supports evaluation in simulation, FPGA prototypes, and post-silicon measurements.
Key Benefits
Early Vulnerability Detection:
Identify leakage or fault issues at RTL, gate, or post-layout stages.
End-to-End Security Coverage:
Assess from RTL to post-silicon using a single framework.
High-Throughput Analysis:
Acquire and process traces in parallel at exceptional speed and scale.
Seamless Integration:
Works with all major SystemVerilog simulators via DPI; auto-generates testbenches and Makefiles.
Accelerated Certification Readiness:
Validate compliance with FIPS 140-3, Common Criteria, and SESIP before submission.
Technical Highlights
Capability
Description
Integration
Interfaces with functional verification workflows using DPI.
Parallel Trace Engine
Multi-threaded architecture captures and processes up to billions of traces concurrently without I/O or storage limits.
Leakage Pinpointing
Identifies specific modules, signals, or gates responsible for leakage.
Analyzer Engines
Includes Welch’s t-test (TVLA), CPA, template, deep learning, DFA, SIFA, and AFA analyses.
Simulation Support
Operates from RTL through gate-level and post-layout; supports FPGA and silicon traces.
Automation & APIs
Auto-generates testbenches and Makefiles; includes CLI and Python API for scripting and CI/CD integration.
Trace & Fault Formats
Exports in standard formats (.npy, .trc, .trs) for interoperability.
Plugin Extensibility
Supports user-defined attack and analysis plugins.
Primary Use Cases
Experience the power and simplicity of our solution in action
About FortifyIQ
FortifyIQ engineers certifiable cryptographic IP cores, software libraries, and roots of trust with traditional and post-quantum algorithms, all hardened against side-channel and fault injection attacks, without compromising performance, area, or energy efficiency. Our solutions are foundry- and platform-agnostic, integrating securely across a wide spectrum, from smart cards and IoT devices to AI accelerators and cloud systems.
Backed by a strong portfolio of granted and pending patents, research, and formal and practical security proofs, FortifyIQ’s IP is developed and validated using our own pre- and post-silicon EDA tools, enabling systematic evaluation of physical attack resilience.
FortifyIQ delivers advanced cryptography that is certifiable, reliable, and built to meet the challenges of high-assurance, real-world applications.