Ensure security for complex systems.
Radix-M extends the security verification performed with Radix-S to SoC system-level hardware security verification by leveraging commercial emulators for firmware and hardware security validation. By running firmware and software on the SoC, Radix-M simultaneously analyzes the entire system, which greatly increases the detection and prevention of security vulnerabilities that may be lurking in the system’s Root of Trust or processing system.
Uncover Critical Vulnerabilities Before Production
The same Radix security rules created for Radix- S can be run on Radix-M, enabling hardware security verification that scales from block level testing through hardware/software integration testing. Radix-M integrates seamlessly into your existing verification workflows, and is compatible with emulation solutions from Cadence, Siemens and Synopsys.
Identify security risks in production firmware
Achieve faster execution speeds
Generate millions more test vectors
The inputs to Radix-M include the IP or SoC’s RTL files, a set of security rules, along with the block or system level test bench files that verification teams are already developing. Radix-M then creates and adds a hardware Security Monitor to the design. The Security Monitor is used to check the validity of the security rules while running in a commercially available emulator.
Radix-M addresses a wide range of critical security verification challenges, including:
Ensure firmware and low-level software is secure.
Analyzes and ensures secure configuration and interactions across the hardware and software stack.
Verifies secure boot process and secure switch to normal operation.
Verifies IP is secure across the design supply chain.
Prevents unauthorized access.