Skip to content

Embedded Design

Services

Secure and efficient solutions through hardware and software co-design

Our hardware and software co-design approach ensures that security aspects in hardware and software are implemented in an optimal and coordinated manner right from the start. The result is a secure embedded system that is optimally adapted to a jointly specified task. 

Development of secure architectures

  • Implementation of secure hardware abstraction layers (HAL) and drivers to ensure the integrity and authenticity of systems
  • Use of hardware offloading to accelerate security-critical operations such as encryption and authentication
  • Customization of security solutions for various FPGA platforms (e.g. Intel, Xilinx, Microchip)

Design and implementation of secure FPGA solutions

  • Creation of customized FPGA designs with integrated cryptographic mechanisms 
  • Integration of IP cores for secure data transmission and protocol implementations such as MACsec and IPsec
  • Optimization of resources to maximize security and efficiency at the same time

Simulation and verification with a focus on security

  • Carrying out threat analyses and simulation-based security tests
  • Verifying security-critical designs to ensure protection against side-channel attacks and other vulnerabilities

Development and implementation of security functions

  • Development and integration of secure boot mechanisms to authenticate firmware before execution
  • Implementation of encrypted data transfers and secure key exchange procedures
  • Advice and support for compliance with security requirements, e.g. the Cyber Resilience Act