esDynamic
Manage your attack workflows in a powerful and collaborative platform.
Expertise Modules
Executable catalog of attacks and techniques.
Infrastructure
Integrate your lab equipment and remotely manage your bench.
Lab equipments
Upgrade your lab with the latest hardware technologies.
Side Channel Attacks
Evaluate cryptography algorithms from data acquitition to result visualisation.
Fault Injection Attacks
Laser, Electromagnetic or Glitch to exploit a physical disruption.
Security Failure Analysis
Explore photoemission and thermal laser stimulation techniques.
Evaluation Lab
Our team is ready to provide expert analysis of your hardware.
Starter Kits
Build know-how via built-in use cases developed on modern chips.
Cybersecurity Training
Grow expertise with hands-on training modules guided by a coach.
esReverse
Static, dynamic and stress testing in a powerful and collaborative platform.
Extension: Intel x86, x64
Dynamic analyses for x86/x64 binaries with dedicated emulation frameworks.
Extension: ARM 32, 64
Dynamic analyses for ARM binaries with dedicated emulation frameworks.
Penetration Testing
Identify and exploit system vulnerabilities in a single platform.
Vulnerability Research
Uncover and address security gaps faster and more efficiently.
Malevolent Code Analysis
Effectively detect and neutralise harmful software.
Digital Forensics
Collaboratively analyse data to ensure thorough investigation.
Software Assessment
Our team is ready to provide expert analysis of your binary code.
Cybersecurity training
Grow expertise with hands-on training modules guided by a coach.
Semiconductor
Security Labs
Governmental agencies
Academics
Why eShard?
Our team
Careers
Youtube
Gitlab
Github
In the active field of physical attacks, maintaining an up-to-date inventory of various techniques is crucial, as each one adds a valuable tool to your arsenal. Mastering these techniques requires significant time and expertise. To streamline this process, we have developed and refined a range of techniques, making them readily deployable for your specific use cases. Each technique comes with a detailed description, and is fully implemented and executable on reference data sets. Given the open nature of our platform, you have the flexibility to enhance these techniques with your own insights and methods, allowing for continuous evolution and customization.
Digital systems operate on a multitude of algorithms, each susceptible to unique side-channel or fault injection attacks. The effectiveness of these attacks is intricately linked to the algorithm and its specific implementation, necessitating tailored knowledge to appropriately adapt attack techniques. To bridge this gap, we've crafted detailed technical content for various algorithms: Elliptic Curves (ECC), Ligthweight cryptography (Ascon), Post Quantum Cryptography attacks (Kyber, Dilithium). This includes comprehensive descriptions of each algorithm, an exploration of potential attacks, and their practical execution on emulated data sets, providing you with a robust toolkit for informed, precise security measures.
The divide between theory and practice is especially pronounced in the realm of physical attacks, particularly with complex chip devices like SoCs or advanced FPGAs. To bridge this gap and provide our customers with hands-on experience, we've constructed comprehensive use cases that implement side-channel or fault injection attacks from the data acquisition to the key recovery. This approach not only demonstrates the practical application of theoretical knowledge but also equips users with the skills and understanding needed to navigate the complexities of real-world security challenges.