Analysis tool reads through chips’ architectures: Page 3 of 4

April 17, 2019 //By Julien Happich
Analysis tool reads through chips’ architectures
Back in 2016, chip security analysis startup Texplained was making its first investments in laboratory equipment, analyzing various chips’ internals and commercializing its reports as a catalogue of heavily scrutinized reverse-engineering IPs, identifying security weaknesses.

Now, referring to US allegations against Chinese chip vendor Huawei, that security backdoors could be implemented on its server chips, Ginet said that without a reference chip and its well mapped functionalities, it would be pretty impossible to identify a backdoor.

Another market highlighted by the CEO is police forensics, where the analysis of security chips in smartphones would allow better attacks. Armed with this knowledge, police enforcement could eventually get access to both the hardware and non-volatile firmware to extract user data from smartphones used for criminal activities.

But as well as performing counterfeit analysis or gathering technological intelligence, ChipJuice could be used for IC obsolescence management, figuring out how to re-design legacy chips running in critical equipment (of the military or medical type).


Different use cases for ChipJuice’s automated reverse engineering all along a chip’s lifecycle.

Regarding IP theft, or helping lawyers figure out if there’s been IP infringement in a competitor’s chip, Ginet said the tool is not mature enough to be able to match equivalent IP that would have been spread out and obfuscated across millions of transistors, often physically different.

Picture: 
IC reverse-engineering

Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.