Skip to Main Content

Ansys RedHawk-SC Security Getting Started

Course Overview

In this course, you will learn to perform side-channel leakage analysis flow for assessing data integrity of IC design using the RedHawk-SC Security. The course includes a) an introduction to side-channel leakage analysis (SCLA); b) the Ansys security verification flow; and c) a comprehensive hands-on lab session for layout and power SCLA flow. You will learn a complete security verification methodology with important security metrics and assessment results to qualify your IC design from hardware security analysis and data integrity signoff perspectives. The course will address a number of hardware security analytics topics including correlation power analysis (CPA), power deliver network (PDN), electromagnetic side-channel analysis (EMSCA), T-score, simulation measurement-to-disclosure (SMTD) for key disclosure and custom leakage model (CLM). You will experience the usage of Security Insight as an ease-of-use GUI to interpret side-channel analysis result to root-cause the leakage source. 


  • Have a basic understanding of IC power analysis, and IR drop analysis principles.
  • Have conceptual knowledge of hardware security, cryptographic algorithm and side-channel analysis.
  • Have experiences with Python language and UNIX text editor.

Teaching Method

Self-paced slide presentation and lab demonstration to showcase the solution. 

Learning Outcome

Following completion of this course, you will be able to:

  • Understand and perform layout-level side-channel leakage analysis flow under the detection mode.
  • Understand and perform RTL side-channel leakage analysis flow under the disclosure mode.
  • Create and/or load a saved SeaScape DB, and practise Python API commands.
  • Verify design input files and check simulation output files.
  • Use Security Insight GUI to interpret side-channel leakage assessment result.
  • Understand the classical and custom leakage model used in security analytics.
  • Visualize side-channel traces, identify leakage source and root-cause design weakness from the layout GUI.


 Available Dates

Learning Options

Training materials for this course are available with a Ansys Learning Hub Subscription. If there is no active public schedule available, private training can be arranged. Please contact us.


For virtual training, this course is covered over 1 x 2-hour sessions lectures only.

Virtual Classroom Session:

  • Introduction
  • Lab Session