- 100G AES Encryption Core
- 3DES Crypto Engine
- 3DES-ECB 1 Billion trace DPA resistant cryptographic accelerator core
- Active mesh against tampering attacks - Active Shield
- AES (ECB), 1 Billion Trace DPA Resistant Cryptographic Accelerator Cores
- AES (ECB-CBC-CFB-CTR), 1 Billion Trace DPA Resistant Cryptographic Accelerator Cores
- More Products...
IP-SOC DAYS 2025 IP-SOC DAYS 2024 IP-SOC DAYS 2023 IP-SOC DAYS 2022 IP-SOC DAYS 2021 IP-SOC 2024 IP-SOC 2023 IP-SOC 2022 IP-SOC 2021
|
|||||||
![]() |
|

Cycuity Collaborates with SiFive and BAE Systems to Demonstrate Advanced Microelectronics Design Supply Chain Security
- AI vs. AI: Both Friend and Foe in Cybersecurity
- BrainChip Collaborates with Chelpis-Mirle on Security Solution
- Crypto Quantique announces QRoot Lite - a lightweight and configurable root-of-trust IP for resource-constrained IoT devices
- PQShield launches UltraPQ-Suite for deeply specialized implementations of post-quantum cryptography
- Crypto Quantique publishes independent cetome analysis on streamlining CRA compliance with the QuarkLink security platform
- Perforce Partners with Siemens for Software-Defined, AI-Powered, Silicon-Enabled Design (May. 16, 2025)
- Semidynamics: From RISC-V with AI to AI with RISC-V (May. 16, 2025)
- TSMC Board of Directors Meeting Resolutions (May. 16, 2025)
- Arm Evolves Compute Platform Naming for the AI Era (May. 16, 2025)
- Secafy Licenses Menta's eFPGA IP to Power Chiplet-Based Secure Semiconductor Designs (May. 15, 2025)
- See Latest News>>
Cycuity, a leader in hardware security solutions, has collaborated with SiFive and BAE Systems to deliver increased security assurance for third-party intellectual property (IP) in a cost-effective and repeatable manner. The use of third-party IP can introduce potential system-level security vulnerabilities due to its high configurability and programmability. Verifying the highest levels of assurance for third-party IP components is important to safeguarding microelectronics.
cycuity.com, Mar. 19, 2025 –
The three-way collaboration was helpful in validating a scalable framework based on Common Weakness Enumeration (CWE). Cycuity’s Radix product creates a “security digital twin” of an IP block which can then be re-verified by an SoC integrator at the block and full chip levels to provide assurance of the third-party IP. Cycuity’s Radix technology was successfully demonstrated through the integration, configuration, and generation of verifiable security evidence of SiFive’s Intelligence™ X280 RISC-V processor within a BAE Systems’ radiation-hardened system-on-chip (SoC).
“We have demonstrated how Cycuity is solving a key challenge in ensuring robust security across the design lifecycle and across organizational and company boundaries,” said Jason Oberg, CTO at Cycuity. “Working to build out a secure third-party IP ecosystem aligns with our commitment to develop resilient microelectronics for defense and commercial applications.”
“The demonstration of RISC-V processors as a robust and secure choice for SoC developers, underscores our commitment to innovation and security. By utilizing Radix to validate secure integration and configuration of IP, developers can be empowered to innovate faster while enhancing the usability and effectiveness of third-party IP,” stated John Ronco, SiFive VP of Product.
This framework is designed to meet the strict security requirements of industries where trust and reliability are paramount. “Today’s defense and commercial systems must meet the increasing need for traceable security assurances across the microelectronics ecosystem. By focusing on design- and application-specific security requirements, we can test, implement, and deliver our products with the confidence that third-party IP remains secure —key for fulfilling Department of Defense (DoD) standards,” says Gayatri Perlin, Secure by Design Group Lead at BAE Systems’ FAST Labs™ research, development, and production organization.
Learn More at GOMACTech 2025
Further insights from this collaboration will be presented at GOMACTech 2025 in the session, “Establishing Security Assurance for Commercial Third-Party Processor IP.”