Big Sleep's breakthrough in discovering an SQLite vulnerability demonstrates how AI can reduce the opportunity window for attackers, marking a new era in vulnerability research.
Riscure Side Channel Webinar, Post-Quantum Cryptography, November 2024
Join our special webinar to discuss the latest developments in device security.
Post-Quantum Cryptography for Embedded Systems: Standards, Performance, and Secure Implementation
As quantum computing advances, the security of traditional cryptographic algorithms like RSA and ECC is increasingly at risk. While quantum computers capable of breaking these algorithms are not ...
Riscure Side Channel Webinar, Automotive, July 2024
Join our special webinar to discuss the latest developments in device security.
In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Inspector Pre-Silicon SCA: Revolutionizing Side Channel Analysis with Advanced Detection
Discover the benefits of pre-silicon side channel analysis and learn how to apply Inspector Pre-Silicon for advanced detection.
Securing Embedded Devices: 9 Considerations for Success
We curated a list of the most essential security considerations that we recommend when beginning to incorporate security into your embedded devices.
Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code
Learn more about dynamic fuzzing using Riscure True Code in this on-demand webinar.
Exploring genomic sequence alignment for improving side-channel analysis
This paper explores a novel approach to improving Side-Channel Analysis (SCA) alignment, drawing inspiration from molecular biology and employing Multiple Sequence Alignment techniques to align ...
Forgotten Essence Of The Backend Penetration Testing
This whitepaper delves into the root causes of unnoticed vulnerabilities during backend testing, offering real-world examples and actionable steps for improving security.
The Threat of Security Vulnerabilities in Today’s Connected Automotive World
Testing and verifying security robustness throughout all stages of development, starting from the design phase, is the only cost-effective way to successfully address growing security and ...