Aller au contenu principal
AllEyes Resilient · Security by Design

Security Architecture
AllEyes Resilient

A radical security philosophy: 6 independent isolation domains, CPU-Blind design, 71 exfiltration channels analysed. Built for the most demanding CISOs and CTOs.

6
Isolation Domains
71
Channels Analysed
3
Compromises Required
0
Keys on the CPU
01

6 Isolation Domains

Each domain is physically and logically independent. No single domain can access the encryption keys.

D1

AMD EPYC CPU

Host processor. Manages networking and orchestration but never sees cryptographic keys. CPU-Blind architecture.

D2

FPGA PL (AES-GCM)

FPGA Programmable Logic. Pure hardware AES-256-GCM engines. Keys remain within the FPGA fabric, inaccessible to the CPU.

D3

FPGA PS (ASM Firmware)

Embedded Processing System. Bare-metal assembly firmware, zero software dependencies. Handles sessions and PQC negotiations.

D4

Sovereign GARANCE PKI

Post-quantum ML-DSA-87 PKI hosted on SecNumCloud. Sole source of keys, verifiable signatures, hot rotation.

D5

Isolated crypto zone

AES-256-GCM engines confined to a memory-isolated FPGA zone. Not exposed on PCIe, unreachable by the host CPU.

D6

STM32 Kill Switch

Independent STM32 controller on a separate bus. Tamper detection and immediate auto-zeroisation of keys upon physical attack.

02

CPU-Blind Design

In a conventional architecture, the CPU handles encryption keys in memory. This makes it vulnerable to Spectre, Meltdown, cold boot, DMA and side-channel attacks.

With the CPU-Blind architecture, keys never leave the isolated crypto zone inside the FPGA. The host CPU orchestrates network flows but cannot read, copy or exfiltrate the cryptographic keys.

CPU
0 keys
FPGA PL
Session
FPGA PS
PQC KEM
PKI
Master
Key distribution by domain
03

71 Exfiltration Channels Analysed

Every identified channel is covered by one or more isolation domains. No known attack vector remains unaddressed.

Electromagnetic Channels

EMI emissions, TEMPEST radiation, inductive coupling, PCIe bus RF leakage.

12 channels — Shielding + isolated FPGA fabric

Timing Channels

Timing attacks, latency variations, cache timing (Spectre/Meltdown), branch prediction.

18 channels — Hardware constant-time

Power Channels

Power analysis (SPA/DPA), voltage fluctuations, glitch attacks, fault injection.

14 channels — Constant-time primitives + power filtering

Memory & Cache Channels

Cold boot, DMA attacks, Rowhammer, cache side-channel, shared memory.

11 channels — CPU-Blind, zero keys in RAM

Network Channels

Packet interception, man-in-the-middle, replay attacks, traffic analysis, DNS leak.

9 channels — ML-KEM-1024 PQC tunnels

Physical Channels

Enclosure opening, debug probe, JTAG, chip extraction, hardware modification.

7 channels — STM32 kill switch + tamper
04

Kill Switch & Auto-Zeroisation

In the event of physical intrusion or perimeter breach, all keys are destroyed instantly.

<1ms
Zeroisation Time

Full erasure of all keys in the isolated FPGA crypto zone.

STM32
Independent Controller

Secure Element STMicroelectronics TrustZone. Separate bus, cannot be disabled by software.

Tamper
Physical Detection

Enclosure opening sensors, abnormal temperature, voltage and clock monitoring.

05

Four Eyes Resilient Model

To access the encryption keys, an attacker must simultaneously compromise 3 independent domains out of 6. No single vulnerability is sufficient.

Domain A

FPGA PL

+
Domain B

GARANCE PKI

+
Domain C

FPGA PS or STM32

= Key access (theoretical scenario only)
06

Nation-state threat model

Designed to withstand the most advanced adversaries. Each layer eliminates a distinct attack vector.

Cross-silicon

No single component holds the complete key. Security relies on two independent manufacturers.

Zeroisation < 1 ms

Hardware tamper switch. All keys are erased in under one millisecond upon physical intrusion.

Traffic Flow Confidentiality

Constant 24/7 throughput, fixed-size packets, encrypted padding. Zero exploitable metadata even via fibre tap.

Measured & verified boot

Any firmware or OS modification triggers an automatic fail-safe. No keys without verified boot.

ANSSI-Hardened Linux

Hardened per ANSSI recommendations. Read-only rootfs, verified integrity, signed modules, no memory access even as root.

Forward secrecy 2 min

Key rotation every 2 minutes. Each session is independent and irreversible.

Let’s Talk Security

Request a detailed technical briefing on the AllEyes Resilient architecture.

Request a Briefing