Chip Security Testing 
Binary Security Analysis 
Resources 
Blog
Contact us
eShard
/
Host2022

HOST 2022

IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance.
HOST 2022 Registration

Come to our booth

Put your hands on esDynamic and see how it can remotely control a laser setup (from our partner ALPhANOV) to make laser fault injection, photoemission or thermal laser stimulation or an electromagnetic setup to make side-channel analysis or electromagnetic fault injection.

Let’s also have a talk on how performance is important for side-channel analysis and how to leverage GPU and distributed computing to get at the state-of-the-art in this domain.

Our Fault Injection solutions

We offer laser and electromagnetic turnkey fault injection solutions including hardware, software, attacks and training for experts in cryptography and physical attacks on hardware products.

Know more

Our Side-Channel Analysis solutions

We offer turnkey solutions for SCA applications starting from hardware benches setup and automation up to data exploitation with secret assets extraction... All through esDynamic, our data science platform. esDynamic provides know-how and tutorial notebooks on signal acquisition and processing and even more knowledge and use cases notebooks for exploiting datasets with leakage detection and attack analyses.

If, like us, you think that performance matters, check out our blog post on the topic SCA: Why Performance Matters! In this context, this June 2022, we release SCA Fast Computing eXtension module for esDynamic, which leverages distributed computing and GPU acceleration for heavy side-channel analyses.

Download our brochure

Our binary analysis solution

How to stress and verify the effectiveness of counter-measures embedded into a firmware? Until now it meant performing physical and logical attacks on the full product with all the complexity and deep expertise in side-channel and fault injection that comes along.

With esFirmware, eShard's binary analysis solution, anyone can now customize their emulation environment and perform physical (side-channel, fault injection) and soon logical (fuzzing) test campaigns directly on their firmware without requiring access to the target hardware.

esFirmware can cover different use cases: vulnerability detection, reverse engineering, white box cryptography testing, code profiling for actual side-channel and/or fault injection attacks.

Download our brochure

Training tools

Ecosystems move fast, so do the cybersecurity challenges. Your team must remain up-to-date and master the last security threats because your business and your customers are at stake.
Intermediate
Differential Fault Analysis on symmetric algorithms
Coach: Guillaume Vinet
With this module, you will learn about the main Differential Fault Attacks on AES. You will get familiar with the Piret & Quisquater DFA targetting the AES final rounds and the Kim & Quisquater DFA targeting the AES key schedule. During this training, you will learn how to compute differentials, characterize faults and recover a secret key from faulty AES outputs.
See more details
Novice
Side Channel Marvels Tools & Double Fault Injection Attack
Coach: Guillaume Vinet
This practical course introduces the Side Channel Marvels framework. You will learn how to use its different modules to visualise a binary execution, to perform a CDA or DFA, and finally to recover the master key. This module is also composed of a White-Box challenge that shall be defeated with a double fault attack.
Intermediate
Customization and good developement practices in esDynamic
Coach: Guillaume Bethouart
In this module, you will learn how to fully customize the [esDynamic](https://eshard.com/esdynamic) framework, including how to import your own librairies, define your own attack objects and targets and how to build your own python modules and environments. You will also learn about good practices when developping your own content in the esDynamic platform.

About eShard

Leading independent expert for security in Integrated Circuits, Mobile Applications and Backend Systems since 2016, at eShard, we are passionate about state of the art attack techniques. We have been helping customers all around the globe to test and enhance the resilience of their systems by offering cutting edge turnkey solutions.

Our headquarters are in Bordeaux, France, and we also have offices in Singapore and Germany with more than 40 experts.

Check out other events

Blog Articles

Chip Security

ALPhANOV & eShard's IC Security Testing Lab

2 min read
Edit by Lionel Riviere • Apr 5, 2022
CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice