esDynamic
Manage your attack workflows in a powerful and collaborative platform.
Expertise Modules
Executable catalog of attacks and techniques.
Infrastructure
Integrate your lab equipment and remotely manage your bench.
Lab equipments
Upgrade your lab with the latest hardware technologies.
Side Channel Attacks
Evaluate cryptography algorithms from data acquitition to result visualisation.
Fault Injection Attacks
Laser, Electromagnetic or Glitch to exploit a physical disruption.
Photoemission Analysis
Detect photon emissions from your IC to observe its behavior during operation.
Evaluation Lab
Our team is ready to provide expert analysis of your hardware.
Starter Kits
Build know-how via built-in use cases developed on modern chips.
Cybersecurity Training
Grow expertise with hands-on training modules guided by a coach.
esReverse
Static, dynamic and stress testing in a powerful and collaborative platform.
Extension: Intel x86, x64
Dynamic analyses for x86/x64 binaries with dedicated emulation frameworks.
Extension: ARM 32, 64
Dynamic analyses for ARM binaries with dedicated emulation frameworks.
Penetration Testing
Identify and exploit system vulnerabilities in a single platform.
Vulnerability Research
Uncover and address security gaps faster and more efficiently.
Code Audit & Verification
Effectively detect and neutralise harmful software.
Digital Forensics
Collaboratively analyse data to ensure thorough investigation.
Software Assessment
Our team is ready to provide expert analysis of your binary code.
Cybersecurity training
Grow expertise with hands-on training modules guided by a coach.
Semiconductor
Automotive
Security Lab
Gov. Agencies
Academics
Defense
Healthcare
Energy
Why eShard?
Our team
Careers
Youtube
Gitlab
Github
We recently published a blog post about the impact of the Cyber Resilience Act (CRA) for mobile applications: Cyber Resilience Act: what it means for Mobile Application Security.
In case you have no time to read, the Cyber Resilience Act is a new legislation proposed by the European Commission to improve the cybersecurity posture of organisations using digital assets. The act seeks to ensure that companies have the necessary policies, procedures, and technologies in place to protect themselves and their customers from cyber threats. This is in response to the increasing number and cost of successful cyberattacks, which were estimated to cause annual global costs of €5.5 trillion in 2021.
The legislation aims to set common cybersecurity regulations for manufacturers and developers of products with digital elements in the EU market. The act is one-of-a-kind and testifies to the European Commission's analysis that cyber risks are a matter of social, political, and economical importance. Currently, there is no coherent cybersecurity standard for all products leveraging digital assets within the EU market, and the CRA aims to rectify this state of play.
CRA concerns any connected device deployed in the field, either for consumer or professional purpose. Depending on their nature, the device manufacturers will have to:
Source: The European Cyber Resilience Act (CRA)
To answer this question, let’s go back to the concept of defense in depth. For those who are not familiar with it, defense in depth means that security is implemented at every layer of the product. A layer can be :
To start from a solid basis, device manufacturers will have to preferably select hardware and software that are individually compliant with the CRA rules. But it will not be enough, because, as they integrate and possibly modify different hardware and software components in their device, as well as their own code, they could by mistake or ignorance (e.g. no implementation guidelines provided by the supplier for security) introduce vulnerabilities in the overall system. This could happen at the product launch but also during a firmware upgrade.
An immediate consequence of this is the device manufacturers will have to put in place a security policy or reinforce it to turn their product development cycle into a secure product development cycle, which will mainly imply to:
Testing critical functions on the actual device might not be easy though.
Let’s take an example from the PSA (Platform Security Architecture) certification scheme that may be well known from the IoT industry: the test case from the PSA Certified™ Attack Methods Version 1.2 named “Glitch against initialization”.
The purpose of this test is to check that the Device Under Test (DUT) is not sensitive to a perturbation (called glitch) applied to an I/O of the chip during the boot and device initialization process. This technique can be used by attackers to disturb this critical phase and get unexpected behaviour like skipping the firmware signature check and running a rogue firmware giving the attacker privileges to control the device.
How can the product manufacturer make sure that this “Glitch against initialization” test is passed on their device? We may reasonably think (and definitely verify) this test has been performed and passed by the chipset maker. But, what if modifications made in or around the bootloader unexpectedly change the device behaviour and introduce a vulnerability? The only way to figure it out is to test.
Testing protections in a product is a difficult task. Indeed, most protections do not have any functional impact. They act in the background in case something malevolent happens. We could say they are “transparent”. They require a specific testing environment mimicking the attacks to trigger the protections and execute the corresponding code. This is the case for our glitch scenario. Furthermore most of the product manufacturers do not have a glitching setup to perform such a test and may even never heard about it. This is absolutely normal.
Anyway the good news is they do not need all this, because they do not aim at testing the chip the firmware is executed on (we said it has been done by the chipset maker). Their goal is only to test that the modifications they made in the firmware provided with the chip have induced no regression in this glitching test.
A test tool like esFirmware that provides an emulation environment where to execute a piece of firmware, knowledge about the “Glitch against initialization” test, and a practical use case, allows the manufacturer to test, minimise the risk and show confidence without the burden of investing into a large amount of expertise and time to perform just a single test case.
All that has been said about this glitching test case is just an example to illustrate what is at stake. It can be extended to many other attacks that need to be tested on the final production device to avoid the introduction of any security regression during the development cycle.
Pave the way for more and better security with proper tools and knowledge centres.
As new rules will be enforced by the CRA, anticipating and starting now might not be a bad idea.