Security is a complex topic that covers multiple technical disciplines and areas of focus based on the threats a customer is trying to protect against, the sophistication of the adversary they are concerned about, and the environment the end product is deployed in. The Venn diagram below shows the different disciplines that encompass the term "Platform Security" and which Xilinx invests heavily in.
Trust: Focuses on the known pedigree and heritage of the system solution provided by Xilinx. Silicon, software, firmware and soft-IP must be "Trojan-free". Supply chain security and risk management are key focus areas.
Information Assurance (IA): Information Assurance is focused on protecting the information, or data, the device is handling or processing. This is done through standard cryptographic techniques (e.g. authentication and encryption) as well as fault tolerant design methods. Fault tolerant design methods ensure that security is not compromised in the face of a fault.
Cybersecurity: While Information Assurance assures all information in all forms of media, Cybersecurity is focused on the protection of information in the cyber domain. This effectively makes Cybersecurity a subset of Information Assurance in most applications.
Anti-Tamper (AT): Focused on protecting the customers’ intellectual property (IP) that is deployed in their product and contained within the device either as hardware or software. Our customers invest heavily in their products, and Xilinx devices must protect those investments from cloning, reverse engineering or other types of attacks that can extract the IP resident in Xilinx devices.
As the Venn diagram accurately reflects, there are areas of uniqueness as well as significant areas of overlap between the disciplines. Looking holistically across all disciplines provides the best Defense in Depth approach.
Security must be considered throughout the entire product lifecycle in order to maximize the protection of a system. As an example, developing fault tolerant application level security solutions deployed on a device that does not boot securely, is like building a mansion on a foundation of sand. As can be seen from the pyramid, Xilinx and their customers have a shared responsibility to ensure the security of a system. It is also important to recognize that no system is completely immune to attack - with enough time, energy, resources and money, any system can be compromised. Security is all about managing risk, and how much investment a customer wants to make to manage that risk.
Xilinx employs world-class best practices to establish the trustworthiness of its Silicon, Software and Development Tools. An array of countermeasures are integrated into Silicon which aid in protecting against a myriad of attack vectors. The secure boot, or configuration, of our products employ a Hardware Root of Trust with Authenticity, Confidentiality, and Integrity built in.
The device, after booting securely, must maintain the security that has been established. Run-time protections are a shared responsibility between Xilinx, the customer, and the rich Xilinx ecosystem.
The base of the pyramid is established to ultimately protect the customer’s end application.
XSWG is held in a number of locations in North America and Europe, starting in October. Check back later for more details. To get on the mailing list so you can obtain announcements about future events, email email@example.com.
The Xilinx Security Working Group (XSWG) is an annual, 2 day FREE event in North America and Europe that brings together Xilinx customers from all markets, academic representatives, Xilinx Alliance partners, and government agencies and authorities to discuss the latest security topics including:
The security working group is a mixture of presentations and hands-on labs that focus on:
The unique aspect about this working group is that an NDA is required. This allows Xilinx to present roadmap and detailed design information that would not normally be presented in such a forum. ALL PARTICIPANTS WILL REQUIRE A CURRENT NDA.
In addition to the 2-day general sessions, there will be CLASSIFIED sessions in North America. This session is only open to those attendees with a US Government SECRET/L minimum security clearance and preprocessed Visit Request with the Facility Security Officer for the venue of attendance.
The security working group is an excellent forum for participation and collaboration among the attendees, and provides Xilinx with a better understanding of the industry’s security requirements for today and tomorrow. Don’t miss this chance to discuss Xilinx’s latest technology innovations and solve your greatest design challenges.
Cryptographic algorithm validation, via the NIST Cryptographic Algorithm Validation Program (CAVP) is an important aspect of the security solutions provided by Xilinx. The following table identifies the algorithm, and product, that has been validated with a link to the NIST website.
|AES Validation List||SHA2/SHA3 Validation List||HMAC Validation List||RSA Validation List|
|Helion Technology Limited
Data security and lossless data compression for High performance/efficiency FPGA design
|Fidus Systems, Inc.
Electronic product development and consulting services. Capabilities: Hardware, FPGA, Signal Integrity, Embedded Software, PCB Layout, Wireless, DSP, and Mechanical design.
|Premier||Ottawa ON CA
Fremont CA US
Waterloo ON CA
DornerWorks provides expertise and a development plan to help developers create amazing products so that they are free to focus on what they do best.
|Premier||Grand Rapids MI US|
|Bottom Line Technologies, Inc.
FPGA, board, and system designs for commercial, industrial, and military/IC clients. TS-SCI cleared personnel Xilinx exclusive regional Authorized Training Partner
|Certified||Columbia MD US
Ellicott City MD US
|Silex Inside SA
IP for Video Codecs (JPEG2000, JPEG, VC-2LD, MPEG), Encryption( AES, Public Key, Hash, TRNG), Embedded Security platforms and Video-over-IP.
Louvain La Neuve BE
Avnet is an operating group of Phoenix-based Avnet, Inc. that serves electronic original equipment manufacturers
|Premier||Phoenix AZ US|
Embedded System Design and Custom Application Software Services and Video related IP Cores for Xilinx Devices.
|Certified||Burlington MA US
San Diego CA US
|Missing Link Electronics, Inc.
Turn FPGAs into Programmable Systems with a configurable applications processors running a full GNU/Linux software stack integrated into a pre-validated platform.
|Certified||San Jose CA US
Neu-Ulm DE DE
CAST developes and supports over 100 different popular and standards-based IP cores.
|Certified||Woodcliff Lake NJ US
Logicircuit provides DO-254 compliant IP for Xilinx devices and also supports the general DO-254 and DO-178C compliance requirements of Xilinx Aerospace and Defense customers.
|Member||Alpharetta GA US|
Atessa, Inc. focuses on electronic system security. The company's products and services enable designers to meet anti-tamper (AT) requirements and address global supply chain security challenges.
|Member||Pleasanton CA US|
|The Athena Group, Inc.
Athena is a leading provider of security, cryptography, anti-tamper, and signal processing IP cores to many of the world’s largest semiconductor companies, defense contractors, and OEMs, as well as emerging providers. Embedded in millions of ASIC and FPGA devices, Athena technologies enable high-value solutions where security and performance are mission critical ─ defense and aerospace, vehicle safety (V2V, V2X, telematics), networking and communications, satellites, cellular base stations, handsets, the Internet of Things (IoT), and more.
|Member||Gainesville FL US|
|Star Lab Corp.
Star Lab is a high-tech business focused on complex systems security, with significant expertise in developing world class defensive embedded software security solutions for both commercial and military applications.
|Member||Washington DC DC US|
|Green Hills Software, Inc.||Member||Santa Barbara CA US|
|Idaho Scientific LLC
Idaho Scientific provides Secure IP and design services tailored to meet DoD Anti-Tamper, Export, and Cyber Security requirements.
|Member||Boise ID US|
Graf Research unleashes innovation by developing ideas into disruptive technologies.
|Member||Blacksburg VA US|
SoC-e offers specialized design services and products based on reconfigurable devices. SoC-e is focused on Industrial Networking, Sofware-Defined Radio and VPX Rugged FPGA based systems.
|Extreme Engineering Solutions (X-ES)
Extreme Engineering Solutions, Inc. (X-ES) is a leader in the design, manufacture, and support of standard and custom embedded computing solutions.
|Member||Middleton WI US|
Curtiss-Wright is a technology leader in development of rugged COTS electronic modules and systems for defense & aerospace applications. Curtiss-Wright's FPGA solutions include VPX, XMC, PMC, & FMC.
|Member||Kanata ON CA
Ashburn VA US
Newton PA US
|Rincon Research Corporation
Rincon Research Corporation (RRC) is a world leader of innovative, cutting-edge Digital Signal Processing (DSP) products and solutions targeting the aerospace, defense, and communication industries.
|Member||Tucson AZ US|
intoPIX enables its customers with leading-edge image compression (J2K, TICO,...), security (AES,RSA,...), video transport (AVB, MPEG2-TS,...) and hardware enforcement IP-cores for audiovisual markets.
Implementation of algorithms on FPGAs, Security and Cryptography
|WIND RIVER SYSTEMS, INC.
A global leader in delivering software for intelligent connected systems.
|Member||Alameda CA US|