Without Chip Scan: When dealing with a diminishing supply scenario for a legacy part, there are only a few risky choices to choose from.
Systems managers dealing with sustainment of legacy systems long after the last buy will seek out parts through brokers. The brokers may be vetted, but they often obtain parts through unknown channels, which means their authenticity cannot be guaranteed. When it comes to digital microelectronics parts, it is rare for brokers to go through destructive processes to fully guarantee their parts, and it is unlikely they have the expertise to distinguish nation-state level tampering. In the best of cases, where the OEM has an established authentic supply, the costs will be significantly more expensive than from the original manufacturer. Therefore, use of aftermarket brokers absolutely increases costs and carries a high risk of introducing counterfeit or compromised parts into the supply chain.
Reclaimed parts have been removed from other equipment and may have been exposed to environmental stressors or damage during the removal process. The risk of failure is increased by this process and makes this a risky choice for use in critical applications.
This involves replicating the functionality of the obsolete part, but without the use of the original component. This approach is risky as it can introduce out-of-spec and performance issues and other vulnerabilities.
Redesigning a system to eliminate the need for obsolete parts may be the best long-term solution, but it can be costly and time-consuming.
Chip Scan receives the item to be modernized. We can receive or extract FPGA bitstreams, work with our partners to extract the GDS2 and hardware structural information. We can also accept a known-good software emulation version.
Chip Scan will use our Deep Lift technology to decompile the hardware artifact or compile the software artifact using our Hardware-up methodology. We will then perform cyber-hardening to modern standards.
This result will be retargeted to modern and available hardware such as FPGAs for maximum flexibility or ASICs as required. All modernized parts will carry a certification of assurance for vulnerabilities.
Don't wait to secure your microelectronics. Contact us today to learn more about our zero trust legacy modernization services.
Protect your intellectual property from being lost. From ASIC and FPGA designs, to cutting-edge AI/M, we design bespoke Anti-Tamper for your products.
We provide comprehensive security assessments for digital microelectronics. Understand the real-world risk to your organization and make informed decisions to improve your security posture.
Our classes are designed to provide you with the knowledge and skills to protect your digital microelectronics from security threats.