Contact us
Photoemission Analysis

Photoemission analysis

Photoemission is a technique to explore internal (non visible) information processed or stored in a chip. When in use, gates are triggered and generate an activity. As a result, a local area is heated. Photoemission leverages infrared cameras to make back-side imaging and captures the heating information while the chip is processing. Doing so, it is possible to localize the gates for specific operations, such as cryptography, or even deduce some secret data processed by the chip.
Contact us for a Photoemission project on your device

What is required to make photoemission analysis?

Photoemission analysis is a complex technique requiring high quality of back-side imaging in the infrared wavelength. The image quality can only be achieved by combining a well-chosen camera with an optimized optical system.

Besides the experimental setup, solid know-how in photoemission analysis is needed. Many techniques must be mastered, such as testing procedures, camera tuning, image processing, relevant information extraction, etc.

Photoemission bench

ALPhANOV and eShard developed a ready-to-use photoemission solution for chip security analysis. ALPhANOV optical solution integrates:

  • An optical system optimized to back-side imaging
  • An infrared camera chosen for low-noise and high-quality imaging
  • A photon detector system to perform analyses in space and time

It can be mounted like a stand alone system or like an extension of an existing bench, such as an LMS station.

Software solution for photoemission analysis

A comprehensive expertise module has been developed to run photoemission analysis of the esDynamic data sciences platform.

It includes:

  • All software to drive each individual equipment of the photoemission bench via APIs and widgets
  • Integrated photoemission techniques to automate scanning, image building and analysis
  • A set of know-how notebooks to quickly get up to speed in photoemission security analysis

The photoemission analysis module is regularly updated in line with eShard R&D developments.

Learn more about esDynamic

Our specialized lab

Our lab hosts a state-of-the-art solution to implement photoemission analysis: the photoemission bench is provided by ALPhANOV, as part of our close partnership in their secure premises, and the software platform is from eShard.

Our expert team can run photoemission analysis on devices provided by our customers based on their requirements. This can be to better understand the photoemission technique or to figure out what type of information can leak from a device with a photoemission analysis technique.

Contact an expert

Recent projects performed in our lab

  • Photoemission analysis on a multi-core high speed (1+ GHz) ARMv8 SoC (System on Chip)

Training tools

Ecosystems move fast, so do the cybersecurity challenges. Your team must remain up-to-date and master the last security threats because your business and your customers are at stake.
Side-Channel Analysis Principles
Coach: Guillaume Bethouart
In this module, you will get the principles of side-channel analysis and the background knowledge needed to perform your first analysis. You will also practice on basic examples then on real use cases to become familiar with these techniques.
See more details
Laser Fault Injection with esDynamic
Coach: Guillaume Vinet
Using the [esDynamic]( platform, you will learn how to control ALPhANOV's laser equipment and implement a fault campaign. You will learn how to perform a multi-dimensional scanning, and log results of your campaing. You will learn how to use the delay generator and setup your injection trigger to precisely inject a fault during the device execution. During the practice session, you will get the opportunity to inject a successful laser fault on a device.
Second-order scatter analysis
Coach: Guillaume Bethouart
In this module, you will learn the principles of scatter second order side-channel analysis. This technique threatens first order protected implementations including masking, jitter and shuffling combined together. You will be guided to implement steps of the attack on a masked AES implementation. You will practice second-order scatter attacks on different set of traces for different second order attack paths until your recover the keys.

Blog Articles

Integrated Circuit Security

Scared: open source side-channel library by eShard

8 min read
Edit by Timon Benjamin Sep 26, 2019
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 Pessac
eShard Nudge
7 rue Gaston de Flotte
13012 Marseille
eShard GmbH
Beethovenallee 21
53173 Bonn
Paya Lebar Quarter
#04-01 Paya Lebar Link