In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code
Learn more about dynamic fuzzing using Riscure True Code in this on-demand webinar.
Glitching the Keepkey Crypto Wallet
In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Don’t Let Your Software Be Derailed by a Hardware Attack
In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for fault injection. Additionally, we will emphasize the significance of reinforcing code during the ...
Failure Analysis for SCA Thermal Laser Stimulation
In this 12-minute presentation, Our Principal Researcher, Dennis Vermoen will share details about this method, the results that we have achieved, and the specific products needed to build a ...
Attackers vs. Security Labs
Colin O'Flynn from NewAE and Jasper van Woudenberg CTO of Riscure discuss several prominent hardware attacks, comparing the attacker and security lab views.
20 Ways Past Secure Boot
This discussion covers the mechanisms behind Secure Boot, its potential vulnerabilities, and various methods attackers may use to compromise it.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks
This work aims to bridge the gap between theory and practice in key enumeration and puts forward the importance of the practical metrics for estimating implementation attack complexity.