Chip Security Testing 
Binary Security Analysis 
Resources 
Blog
Contact us
Back to all articles
Corporate News
Chip Security

Thales automates their firmware security testing with eShard

2 min read
Edit by Guillaume Vilcocq • Dec 14, 2022
Share

Thales has licensed eShard’s esFirmware platform to test more thoroughly and with more flexibility the embedded firmware of secure products against physical attacks such as side-channel or fault injection.

 

Illustration-esF.png

 

“We were looking for a tool that could help us automate the testing of our firmware countermeasures and we have licensed esFirmware after a promising evaluation of the tool” said Gilles Durbec, Cybersecurity Director at Thales Digital Identity and Security. “We naturally analyse code reviews extensively, which is necessary but not enough. Performing physical attacks is the best solution before the security evaluation but it requires dedicated experts and tools, and is not scalable. We were missing a step between the code review and the security evaluation of the product that esFirmware is now addressing, adding the possibility of continuous testing.”

“eShard developed esFirmware with the product makers and software editors in mind”, continued Hugues Thiebeauld, CEO of eShard. “As we deliver and use side-channel and fault injection tools for security evaluation purposes, we knew there was a missing validation step in security testing. At the time of CI/CD, it is unacceptable to test countermeasures embedded in a firmware only at the very end of the project. We had to create an environment in which any critical (security wise) piece of firmware can be, daily if needed, executed, and tested against physical and logical attacks and where the developers can easily make the link between vulnerabilities and their code. Thales was an obvious partner to test our new tool as they hold a strong leadership role in the security field.”

Banner-esF-2.png

esFirmware provides an emulation environment for binaries that supports Intel (i386, x86_64), ARM (ARMv7-A, ARMv7-M) and Risc-V, as well as tools and tutorials to build a custom SoC and make fault injection and code profiling analyses, with the possibility to automate the binary file loading and analysis sequence for CI/CD purposes.

The tool can be used to anticipate and prevent the risk by testing firmware code against physical and logical attacks in a CI/CD process. It can also be leveraged to improve side-channel attacks on physical targets as it can be used to create reference datasets to validate the attack implementation. And it can help reach the state-of-the-art in White Box Cryptography (WBC) analysis by providing a framework to perform dynamic binary instrumentation analyses and stress the WBC implementation.

 

Banner-esF.gif

Share

Categories

All articles
(108)
Binary Analysis
(57)
Chip Security
(43)
Corporate News
(18)
Expert Review
(6)
Time Travel Analysis
(13)

you might also be interested in

Chip Security

The backup superhero of Post-Quantum Cryptography

8 min read
Edit by Jad Zahreddine • Oct 24, 2025
CopyRights eShard 2026.
All rights reserved
Privacy policy | Legal Notice
CHIP SECURITY
esDynamicExpertise ModulesInfraestructureLab Equipments