X

FAQs after ‘how to recover secrets using white-box cryptography’ webinar

We recently hosted webinars on how to recover secrets using the white-box cryptography framework that runs on our esDynamic platform. Some questions were raised after these webinars, which might you find useful. So please see below! 1) Is it possible to trace Android apps using your esDynamic platform and the white-box cryptography framework? Yes this […]
Read More
If you are looking to expand your knowledge on security-related topics including whitebox cryptography, TEE or reverse engineering, then look no further. With eshard, you learn first-hand from the experts. We share our expertise with you in a hands-on manner to provide a pro-active learning experience. During our training courses, we put emphasis on real-life […]
Read More
Whitebox cryptography has become a key protection for embedded mobile software products. On top of reverse engineering threats, new techniques making use of side-channel attacks have been developed and prove very efficient to recover secrets in a black box model on binaries. eshard has developed one of the most advanced products combining state-of-the-art binary manipulation […]
Read More
One of our security experts, Pierre Carru, recently presented “Attack ARM TrustZone using Rowhammer” at IRISA in Rennes. The presentation slides are now available for download! Just fill out your details below to get your slides. If you have any questions regarding this presentation, feel free to drop us a line!   Download by leaving your […]
Read More
Earlier this month, I attended the Android Application Symposium in Vienna, Austria. The event was fully dedicated to security on Android phones and mobile applications. The place was fantastic in the Vienna Technical University. The room counted more than two hundred people and interesting talks covering various topics such as recent improvements in Android security, attack […]
Read More
Two weeks ago, we hosted a webinar on managing the complexity of side-channel analysis with our collaborative esDynamic platform. During this webinar, we highlighted the main challenges with regards to side-channel analysis and showed how the tool addresses these issues. We recorded the session, and are happy to share it with you if you send […]
Read More
eshard was one of the sponsors at the Android Application Symposium held in Vienna at the start of March. Our presentation was filmed, and we gladly share this video with you. View the presentation here. Feel free to ask us any questions relating to it!
Read More
Lionel Riviere is one of eshard’s security experts and creator of the esDynamic platform. This platform is designed for security experts, and one of the modules has been developed for side-channel analysis to get in-depth information on various sensitive cryptographic implementation including whitebox cryptography. esDynamic is getting more and more modular, so now side-channel analysis is […]
Read More
Are you developing a connected device implementing sensitive cryptographic algorithms? Whether for certification requirements or for security resilience, you need to forge your opinion about the side-channel resistance and perform the corresponding analysis on your device or implementation and make sure the secret keys remain undisclosed. Facing a weakness against side-channel can be hard to […]
Read More
We are excited to announce that we will be taking part in the Android Application Symposium in Vienna next month. Our presentation will be about ‘Playing with your code: a new approach to avoid potential hackers from doing exactly this!’ Our aim is to facilitate the development process of mobile applications in order to achieve […]
Read More