Security verification must be part of the verification plan and it should describe what security features to test and what data and modules are protected and who is and is not allowed to access it. To complete the hardware security verification, formal analysis is needed. Only formal tools can prove that data is secure. This article outlines how security verification through formal analysis can be included in the verification plan for SoCs and IP blocks.
Find out how T&VS Verification services help to meet the challenging requirements with respect to performance, flexibility and verify today’s complex designs effectively.