esDynamic
Manage your attack workflows in a powerful and collaborative platform.
Expertise Modules
Executable catalog of attacks and techniques.
Infrastructure
Integrate your lab equipment and remotely manage your bench.
Lab equipments
Upgrade your lab with the latest hardware technologies.
Side Channel Attacks
Evaluate cryptography algorithms from data acquitition to result visualisation.
Fault Injection Attacks
Laser, Electromagnetic or Glitch to exploit a physical disruption.
Photoemission Analysis
Detect photon emissions from your IC to observe its behavior during operation.
Evaluation Lab
Our team is ready to provide expert analysis of your hardware.
Starter Kits
Build know-how via built-in use cases developed on modern chips.
Cybersecurity Training
Grow expertise with hands-on training modules guided by a coach.
esReverse
Static, dynamic and stress testing in a powerful and collaborative platform.
Extension: Intel x86, x64
Dynamic analyses for x86/x64 binaries with dedicated emulation frameworks.
Extension: ARM 32, 64
Dynamic analyses for ARM binaries with dedicated emulation frameworks.
Penetration Testing
Identify and exploit system vulnerabilities in a single platform.
Vulnerability Research
Uncover and address security gaps faster and more efficiently.
Code Audit & Verification
Effectively detect and neutralise harmful software.
Digital Forensics
Collaboratively analyse data to ensure thorough investigation.
Software Assessment
Our team is ready to provide expert analysis of your binary code.
Cybersecurity training
Grow expertise with hands-on training modules guided by a coach.
Semiconductor
Automotive
Security Lab
Gov. Agencies
Academics
Defense
Healthcare
Energy
Why eShard?
Our team
Careers
Youtube
Gitlab
Github
Thales has licensed eShard’s esFirmware platform to test more thoroughly and with more flexibility the embedded firmware of secure products against physical attacks such as side-channel or fault injection.

“We were looking for a tool that could help us automate the testing of our firmware countermeasures and we have licensed esFirmware after a promising evaluation of the tool” said Gilles Durbec, Cybersecurity Director at Thales Digital Identity and Security. “We naturally analyse code reviews extensively, which is necessary but not enough. Performing physical attacks is the best solution before the security evaluation but it requires dedicated experts and tools, and is not scalable. We were missing a step between the code review and the security evaluation of the product that esFirmware is now addressing, adding the possibility of continuous testing.”
“eShard developed esFirmware with the product makers and software editors in mind”, continued Hugues Thiebeauld, CEO of eShard. “As we deliver and use side-channel and fault injection tools for security evaluation purposes, we knew there was a missing validation step in security testing. At the time of CI/CD, it is unacceptable to test countermeasures embedded in a firmware only at the very end of the project. We had to create an environment in which any critical (security wise) piece of firmware can be, daily if needed, executed, and tested against physical and logical attacks and where the developers can easily make the link between vulnerabilities and their code. Thales was an obvious partner to test our new tool as they hold a strong leadership role in the security field.”

esFirmware provides an emulation environment for binaries that supports Intel (i386, x86_64), ARM (ARMv7-A, ARMv7-M) and Risc-V, as well as tools and tutorials to build a custom SoC and make fault injection and code profiling analyses, with the possibility to automate the binary file loading and analysis sequence for CI/CD purposes.
The tool can be used to anticipate and prevent the risk by testing firmware code against physical and logical attacks in a CI/CD process. It can also be leveraged to improve side-channel attacks on physical targets as it can be used to create reference datasets to validate the attack implementation. And it can help reach the state-of-the-art in White Box Cryptography (WBC) analysis by providing a framework to perform dynamic binary instrumentation analyses and stress the WBC implementation.