Key Extraction

Combining Pre-Silicon & Post-Silicon security testing

Combining Pre-Silicon & Post-Silicon security testing

In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code

Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code

Learn more about dynamic fuzzing using Riscure True Code in this on-demand webinar.
Glitching the Keepkey Crypto Wallet

Glitching the Keepkey Crypto Wallet

In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Don’t Let Your Software Be Derailed by a Hardware Attack

Don’t Let Your Software Be Derailed by a Hardware Attack

In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for fault injection. Additionally, we will emphasize the significance of reinforcing code during the ...
Failure Analysis for SCA Thermal Laser Stimulation

Failure Analysis for SCA Thermal Laser Stimulation

In this 12-minute presentation, Our Principal Researcher, Dennis Vermoen will share details about this method, the results that we have achieved, and the specific products needed to build a ...
Attackers vs. Security Labs

Attackers vs. Security Labs

Colin O'Flynn from NewAE and Jasper van Woudenberg CTO of Riscure discuss several prominent hardware attacks, comparing the attacker and security lab views.
20 Ways Past Secure Boot

20 Ways Past Secure Boot

This discussion covers the mechanisms behind Secure Boot, its potential vulnerabilities, and various methods attackers may use to compromise it.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

This work aims to bridge the gap between theory and practice in key enumeration and puts forward the importance of the practical metrics for estimating implementation attack complexity.