Software Security
Power your investigations with
esReverse
TIME TRAVEL DEBUGGING (TTD)*
TTD* for Intel
Windows, Linux
TTD* for Arm
Android, Linux
TTD* for Firmware
Unicorn, Qiling, Frida
EMULATORS
iOS Virtual Device
NEW
Android Virtual Device
KNOWLEDGE
Intel Advanced Techniques
IoT Use Cases
SERVICES
Security Assessment
Training & Coaching
*What is TTD (Time Travel Debugging)?
Connect your existing tools
Hardware Security
Power your investigations with
esDynamic
TURNKEY LABS
Side Channel Analysis
EM Fault Injection
Laser Fault Injection
Glitching Fault Injection
Photonic Emission
KNOWLEDGE
Post-Quantum Cryptography
SCA Specialized Modules
FI Specialized Modules
Practical Use Cases
TOOLS
Pre-silicon Testing
LAB EQUIPMENTS
Pattern Detector
Cold Reset
SERVICES
Security Assessment
Training & Coaching
Resources
Work with our team
of security experts
INDUSTRIES
Automotive
IoT & Smart Devices
Gov. & Defense
Expertise Labs
LEARN
Blog
Events
Webinars
Documentation
COMPANY
About Us
Careers
HIRING
Partners
Contact us
BLOG
News & Technical Articles
Technical articles, research findings, and industry perspectives from our security experts.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Software Security
TIME TRAVEL DEBUGGING (TTD)*
TTD for Intel
Windows, Linux
TTD for Arm
Android, Linux
TTD for Firmware
Unicorn, Qiling, Frida
EMULATORS
IOS Virtual Device
NEW
Android Virtual Device
KNOWLEDGE
Intel Advanced Techniques
IoT Use Cases
SERVICES
Security Assessment
Training & Coaching
Hardware Security
TURNKEY LABS
Side Channel Analysis
EM Fault Injection
Laser Fault Injection
Glitching Fault Injection
Photonic Emission
KNOWLEDGE
Post-Quantum Cryptography
SCA Specialized Modules
FI Specialized Modules
Practical Use Cases
TOOLS
Pre-silicon Testing
LAB EQUIPMENTS
Pattern Detector
Cold Reset
SERVICES
Security Assessment
Training & Coaching
Ressources
INDUSTRIES
Automotive
IoT & Smart Device
Gov. & Defense
Expertise Lab
LEARN
Webinars
Events
Blog
Documentation
COMPANY
About us
Careers
HIRING
Partners
Contact us
Join the
Early Adopter Program
shortlist
BLOG
News & Technical Articles
Technical articles, research findings, and industry perspectives from our security experts.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
All
All
Hardware Security
Hardware Security
Software Security
Software Security
Corporate
Corporate
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Hardware Security
Hardware Security
"Shifting left" secures PQC implementations from physical attacks
Hardware Security
Software Security
Software Security
Time Travel Analysis with QEMU on IoT Targets: Not Always That Hard - Part I
Software Security
Software Security
Software Security
Pixel 6 Bootloader: Exploitation - Part III
Software Security
Software Security
Software Security
What is Taint Analysis?
Software Security
Hardware Security
Hardware Security
PicoCTF: SRA Challenge
Hardware Security
Hardware Security
Hardware Security
Masked and Shuffled Dataset for Side-channel Researchers
Hardware Security
Software Security
Software Security
Pixel 6 bootloader: Emulation, ROP - Part II
Software Security
Software Security
Software Security
A tour of the Rust and C++ interoperability ecosystem
Software Security
Software Security
Software Security
Pixel 6: Booting up - Part I
Software Security
Software Security
Software Security
Analyzing and countering Windows anti-VM techniques
Software Security
Hardware Security
Hardware Security
PicoCTF: Power Analysis Challenges
Hardware Security
Hardware Security
Hardware Security
The Side Channel Chronicles #1: A bit of history
Hardware Security
1
1 / 2