Your browser does not support JavaScript!

RADIX-M

Emulation-Based Security Verification

Ensure security for complex systems.

Graphic depicting a purple lock icon over a white computer chip

Extend Security Across the Development Lifecycle

Radix-M extends the security verification performed with Radix-S to SoC system-level hardware security verification by leveraging commercial emulators for firmware and hardware security validation. By running firmware and software on the SoC, Radix-M simultaneously analyzes the entire system, which greatly increases the detection and prevention of security vulnerabilities that may be lurking in the system’s Root of Trust or processing system.

Uncover Critical Vulnerabilities Before Production

The same Radix security rules created for Radix- S can be run on Radix-M, enabling hardware security verification that scales from block level testing through hardware/software integration testing. Radix-M integrates seamlessly into your existing verification workflows, and is compatible with emulation solutions from Cadence, Siemens and Synopsys.

The Radix-M Advantage

Graphic depicting a purple magnifying glass finding a green bug in a purple checklist

Identify security risks in production firmware​

Graphic depicting a green jet flying in front of a purple shield icon

Achieve faster execution speeds

Graphic depicting a rising bar chart

Generate millions more test vectors

Radix-M Workflow

The inputs to Radix-M include the IP or SoC’s RTL files, a set of security rules, along with the block or system level test bench files that verification teams are already developing. Radix-M then creates and adds a hardware Security Monitor to the design. The Security Monitor is used to check the validity of the security rules while running in a commercially available emulator.

Radix-M Features:

Radix-M addresses a wide range of critical security verification challenges, including:

Graphic depicting a purple and green shield with a lock icon in the center

Firmware Security Verification

Ensure firmware and low-level software is secure.

Graphic depicting a green lock icon next to a computer server icon

Secure Hardware-Software Interactions

Analyzes and ensures secure configuration and interactions across the hardware and software stack.

A graphic depicting a green gear next to a purple checklist

Secure System-Level Boot Sequence Verification

Verifies secure boot process and secure switch to normal operation.

Graphic depicting a work ID badge

Third-Party & Vendor IP Security

Verifies IP is secure across the design supply chain.

Graphic depicting a green lock inside a purple gear icon

SoC Access Control Verification ​

Prevents unauthorized access.