Hardware security & solutions
Services
Digital Forensics Supply Chain Verification In-Depth IC Exploration IC Obsolescence Management IP Infringement Investigation Hardware Security Evaluation Design Review Reverse Engineering Lab setup Support
Our independent laboratory service specialises in the Reverse Engineering & Data Extraction of Integrated Circuits. We offer services to customers concerned by security evaluation, obsolescence management, supply chain verification, infringement investigation and digital forensics.
Overview of services provided
IC Security Evaluation
Challenge: Certifications like Common Criteria, EMVCo, and FIPS assess IC security but often overlook invasive attacks, leaving chip makers and buyers uncertain about real-world protection against piracy and counterfeiting.
Our Approach: We provide end-to-end IC security analysis—imaging and reverse-engineering the chip’s internals, identifying vulnerabilities, and testing attacks when necessary. Our detailed Risk Assessment reports include images, netlists, and clear insights into weaknesses and attack methods.
Your advantage:
- Chip buyers gain technical clarity to choose secure, cost-effective solutions.
- Chip makers get a “red team” perspective, enhance anti-piracy measures, and unlock new security-focused selling points.
IC Obsolescence Management
Challenge: Critical systems—like military and industrial applications—often outlast their chips, facing early obsolescence while needing decades of operation. Designs can also be lost or damaged over time.
Our Approach: We reverse-engineer the chip’s internal hardware (GDSII, Netlist, RTL), recover its datasheet, and extract embedded code. Then, we enable replacement through emulation on a modern target.
Your Advantage: Replace a single critical component affordably, ensure system continuity, and maintain long-term customer satisfaction.
Supply Chain Verification
Challenge: When chip makers outsource manufacturing, hidden backdoors can be introduced—threatening brand integrity, data privacy, and safety across industries. These vulnerabilities, often added during production, allow attackers to exploit debugging access and compromise devices.
Our Approach: We compare the original GDSII design with samples from the factory. Any discrepancies trigger in-depth analysis to detect potential backdoors.
Your Advantage: Gain confidence in your supply chain with enhanced hardware security and trust.
IP Infringement Investigation
Challenge: Chip design requires massive R&D and investment for a market advantage. When your IP is unfairly exploited, your market position, time-to-market, and R&D efforts are all at risk.
Our solution: We analyze suspected integrated circuits (ICs), meticulously comparing their core functionality and layout against your IP. Our detailed technical reports provide the crucial evidence you need to support litigation, protect your innovation, and reclaim your competitive lead.
Your Advantage: Ensure complete control and protection over your semiconductor innovations, from design integrity to defending against IP exploitation.
Digital Forensics
Challenge: Modern criminal investigations face a significant hurdle: the increasing security of devices like smartphones and crypto wallets. These "unbreakable" protections, while safeguarding personal data, also shield crucial criminal information that law enforcement agencies (LEAs) need to apprehend suspects.
Our Approach: We use our most advanced methods and constantly develop new tools to extract information directly from a device's secure elements or the ROM code on its application processor.
Your Advantage: Equip yourself to innovate and build new solutions for extracting crucial, clear evidence from the most advanced and secure devices on the market.