UPGRADE YOUR BROWSER

We have detected your current browser version is not the latest one. Xilinx.com uses the latest web technologies to bring you the best online experience possible. Please upgrade to a Xilinx.com supported browser:Chrome, Firefox, Internet Explorer 11, Safari. Thank you!

Design Security

Security Throughout the Product Lifecycle

Security is a complex topic that covers multiple technical disciplines and areas of focus based on the threats a customer is trying to protect against, the sophistication of the adversary they are concerned about, and the environment the end product is deployed in. The Venn diagram below shows the different disciplines that encompass the term "Platform Security" and which Xilinx invests heavily in.

Venn diagram shows the different disciplines that encompass the term Platform Security

Trust: Focuses on the known pedigree and heritage of the system solution provided by Xilinx. Silicon, software, firmware and soft-IP must be "Trojan-free". Supply chain security and risk management are key focus areas.

Information Assurance (IA): Information Assurance is focused on protecting the information, or data, the device is handling or processing. This is done through standard cryptographic techniques (e.g. authentication and encryption) as well as fault tolerant design methods. Fault tolerant design methods ensure that security is not compromised in the face of a fault.

Cybersecurity: While Information Assurance assures all information in all forms of media, Cybersecurity is focused on the protection of information in the cyber domain. This effectively makes Cybersecurity a subset of Information Assurance in most applications.

Anti-Tamper (AT): Focused on protecting the customers’ intellectual property (IP) that is deployed in their product and contained within the device either as hardware or software. Our customers invest heavily in their products, and Xilinx devices must protect those investments from cloning, reverse engineering or other types of attacks that can extract the IP resident in Xilinx devices.

As the Venn diagram accurately reflects, there are areas of uniqueness as well as significant areas of overlap between the disciplines. Looking holistically across all disciplines provides the best Defense in Depth approach.

Security must be considered throughout the entire product lifecycle in order to maximize the protection of a system. As an example, developing fault tolerant application level security solutions deployed on a device that does not boot securely, is like building a mansion on a foundation of sand. As can be seen from the pyramid, Xilinx and their customers have a shared responsibility to ensure the security of a system. It is also important to recognize that no system is completely immune to attack - with enough time, energy, resources and money, any system can be compromised. Security is all about managing risk, and how much investment a customer wants to make to manage that risk.

Xilinx employs world-class best practices to establish the trustworthiness of its Silicon, Software and Development Tools. An array of countermeasures are integrated into Silicon which aid in protecting against a myriad of attack vectors. The secure boot, or configuration, of our products employ a Hardware Root of Trust with Authenticity, Confidentiality, and Integrity built in.

The device, after booting securely, must maintain the security that has been established. Run-time protections are a shared responsibility between Xilinx, the customer, and the rich Xilinx ecosystem.

The base of the pyramid is established to ultimately protect the customer’s end application.

the pyramid displays that customers have a shared responsibility to ensure the security of a system

The Xilinx Security Working Group (XSWG) is an annual multi-day FREE event in North America and Europe that brings together Xilinx customers from all markets, academic representatives, Xilinx Alliance partners, and government agencies and authorities to discuss the latest security topics.

The unique aspect about this working group is that an NDA is required. This allows Xilinx to present roadmap and detailed design information that would not normally be presented in such a forum. ALL PARTICIPANTS WILL REQUIRE A CURRENT NDA.

San Jose, CA USA

October 1 - 2, 2018

Fairmont, San Jose

(Security Design Workshop co-located at XDF)

Register Now >>

Learn More about XSDW >>

Longmont, CO USA

October 16 - 17, 2018

Xilinx Facility: 3100 Logic Drive

(Classified Sessions October 18)

Register Now >>

View Agenda >>

Washington D.C. USA

November 6 - 7, 2018

Crowne Plaza, Herndon, VA

(Classified Sessions November 8)

Register Now >>

View Agenda >>

Munich, Germany

December 18 - 19, 2018

Hilton Munich Airport

Register Now >>

View Agenda >>

 

Event Overview

Not sure which one to attend?  See below.

Event Who should attend? Description Common material
XSDW: Xilinx Security Design Workshop (San Jose, CA) Customers in commercial markets such as Communications, Data Center, Industrial, Automotive and Consumer

In addition to the material common to all events. This event will include: 

  • Dedicated Security Sessions for Automotive, Industrial, DataCenter and Communications markets
  • Next Generation Security Discussion and customer survey
  • Presentations focusing on silicon security capabilities, IP and software tools for Xilinx FPGA/SoC devices
  • Essential guidance for Security Design
  • A full day of hands-on / walkthrough lab demonstrations focused on Zynq UltraScale+ MPSoC and UltraScale/UltraScale+ FPGAs
XSWG: Xilinx Security Working Group (Longmont CO and Washington DC) Aerospace and Defense customers

In addition to the material common to all events. This event will include: 

  • Dedicated security session on TRUST
  • Everest focused presentations
  • Presentations from Security Authorities
  • Classified Sessions
XSWG: Xilinx Security Working Group (Munich, Germany) Customers across all markets:  Automotive, Industrial, A&D, Communications

In addition to the material common to all events. This event will include: 

  • Everest focused presentations
  • Dedicated security sessions for Automotive and Industrial markets

Cryptographic algorithm validation, via the NIST Cryptographic Algorithm Validation Program (CAVP) is an important aspect of the security solutions provided by Xilinx. The following table identifies the algorithm, and product, that has been validated with a link to the NIST website.

Xilinx Products on:

Vendor Program Tier
Location

Helion Technology Limited
Data security and lossless data compression for High performance/efficiency FPGA design

Member Cambridge GB

Fidus Systems, Inc.
Electronic product development and consulting services. Capabilities: Hardware, FPGA, Signal Integrity, Embedded Software, PCB Layout, Wireless, DSP, and Mechanical design.

Premier Ottawa ON CA

Fremont CA US

Waterloo ON CA

DornerWorks, Ltd.
DornerWorks provides expertise and a development plan to help developers create amazing products so that they are free to focus on what they do best.

Premier Grand Rapids MI US

Bottom Line Technologies, Inc.
FPGA, board, and system designs for commercial, industrial, and military/IC clients. TS-SCI cleared personnel Xilinx exclusive regional Authorized Training Partner

Certified Columbia MD US

Ellicott City MD US

Silex Inside SA
IP for Video Codecs (JPEG2000, JPEG, VC-2LD, MPEG), Encryption( AES, Public Key, Hash, TRNG), Embedded Security platforms and Video-over-IP.

Certified Gent BE

Louvain La Neuve BE

Avnet
Avnet is an operating group of Phoenix-based Avnet, Inc. that serves electronic original equipment manufacturers

Premier Phoenix AZ US

A2e Technologies
Embedded System Design and Custom Application Software Services and Video related IP Cores for Xilinx Devices.

Certified Burlington MA US

San Diego CA US

Guadalajara MX

Missing Link Electronics, Inc.
Turn FPGAs into Programmable Systems with a configurable applications processors running a full GNU/Linux software stack integrated into a pre-validated platform.

Certified San Jose CA US

Neu-Ulm DE DE

CAST, Inc.
CAST developes and supports over 100 different popular and standards-based IP cores.

Certified Woodcliff Lake NJ US

São Paulo

SP BR

Logicircuit, Inc.
Logicircuit provides DO-254 compliant IP for Xilinx devices and also supports the general DO-254 and DO-178C compliance requirements of Xilinx Aerospace and Defense customers.

Member Alpharetta GA US

Atessa, Inc
Atessa, Inc. focuses on electronic system security. The company's products and services enable designers to meet anti-tamper (AT) requirements and address global supply chain security challenges.

Member Pleasanton CA US

The Athena Group, Inc.
Athena is a leading provider of security, cryptography, anti-tamper, and signal processing IP cores to many of the world’s largest semiconductor companies, defense contractors, and OEMs, as well as emerging providers. Embedded in millions of ASIC and FPGA devices, Athena technologies enable high-value solutions where security and performance are mission critical ─ defense and aerospace, vehicle safety (V2V, V2X, telematics), networking and communications, satellites, cellular base stations, handsets, the Internet of Things (IoT), and more.

Member Gainesville FL US

Star Lab Corp.
Star Lab is a high-tech business focused on complex systems security, with significant expertise in developing world class defensive embedded software security solutions for both commercial and military applications.

Member Washington DC DC US
Green Hills Software, Inc. Member Santa Barbara CA US

Idaho Scientific LLC
Idaho Scientific provides Secure IP and design services tailored to meet DoD Anti-Tamper, Export, and Cyber Security requirements.

Member Boise ID US

Graf Research
Graf Research unleashes innovation by developing ideas into disruptive technologies.

Member Blacksburg VA US

SoC-e
SoC-e offers specialized design services and products based on reconfigurable devices. SoC-e is focused on Industrial Networking, Sofware-Defined Radio and VPX Rugged FPGA based systems.

Certified Erandio ES

Extreme Engineering Solutions (X-ES)
Extreme Engineering Solutions, Inc. (X-ES) is a leader in the design, manufacture, and support of standard and custom embedded computing solutions.

Member Middleton WI US

Curtiss-Wright
Curtiss-Wright is a technology leader in development of rugged COTS electronic modules and systems for defense & aerospace applications. Curtiss-Wright's FPGA solutions include VPX, XMC, PMC, & FMC.

Member Kanata ON CA

Ashburn VA US

Newton PA US

Rincon Research Corporation
Rincon Research Corporation (RRC) is a world leader of innovative, cutting-edge Digital Signal Processing (DSP) products and solutions targeting the aerospace, defense, and communication industries.

Member Tucson AZ US

intoPIX s.a.
intoPIX enables its customers with leading-edge image compression (J2K, TICO,...), security (AES,RSA,...), video transport (AVB, MPEG2-TS,...) and hardware enforcement IP-cores for audiovisual markets.

Member Mont-Saint-Guibert BE

Algotronix, Ltd.
Implementation of algorithms on FPGAs, Security and Cryptography

Member Edinburgh GB

WIND RIVER SYSTEMS, INC.
A global leader in delivering software for intelligent connected systems.

Member Alameda CA US
Page Bookmarked