Chip Security TestingΒ 
Binary Security AnalysisΒ 
Contact us

Expertise in physical attacks

Expertise is the result of years of dedicated research and development. Recognizing the gap between theoretical knowledge and practical application, we have crafted a suite of expertise modules. These modules encapsulate years of R&D through comprehensive catalogs of attacks and techniques, both explained and implemented, alongside reference data sets. Designed to be both a knowledge hub and a practical toolkit, our technical content not only provides deep insights but is also ready to be applied directly to your setup, bridging the gap between reading and doing.

Attack techniques

In the active field of physical attacks, maintaining an up-to-date inventory of various techniques is crucial, as each one adds a valuable tool to your arsenal. Mastering these techniques requires significant time and expertise. To streamline this process, we have developed and refined a range of techniques, making them readily deployable for your specific use cases. Each technique comes with a detailed description, and is fully implemented and executable on reference data sets. Given the open nature of our platform, you have the flexibility to enhance these techniques with your own insights and methods, allowing for continuous evolution and customization.

Attacks on algorithms

Digital systems operate on a multitude of algorithms, each susceptible to unique side-channel or fault injection attacks. The effectiveness of these attacks is intricately linked to the algorithm and its specific implementation, necessitating tailored knowledge to appropriately adapt attack techniques. To bridge this gap, we've crafted detailed technical content for various algorithms: Elliptic Curves (ECC), Ligthweight cryptography (Ascon), Post Quantum Cryptography attacks (Kyber, Dilithium). This includes comprehensive descriptions of each algorithm, an exploration of potential attacks, and their practical execution on emulated data sets, providing you with a robust toolkit for informed, precise security measures.

Starter Kit Chip Security by eShard

Use cases

The divide between theory and practice is especially pronounced in the realm of physical attacks, particularly with complex chip devices like SoCs or advanced FPGAs. To bridge this gap and provide our customers with hands-on experience, we've constructed comprehensive use cases that implement side-channel or fault injection attacks from the data acquisition to the key recovery. This approach not only demonstrates the practical application of theoretical knowledge but also equips users with the skills and understanding needed to navigate the complexities of real-world security challenges.

CopyRights eShard 2024.
All rights reserved
Privacy policy | Legal Notice