How TTD works
in practice

Amplify your analysis
In esReverse, every trace captured is instantly a shared collaborative asset. Analyze the same execution data together and feed findings into other reverse engineering tools within the same workspace.
Full-system visibility
Capture the entire OS (registers, memory, kernel) to see exactly how an exploit behaves across the whole system, not just inside a single application.
Navigate the persistent dataset
Your execution becomes a permanent dataset. Step backward and forward through kernel and userland flows for exact root cause analysis without re-running the target.
Automate with agentic AI
Connect an AI agent via the dedicated MCP server to navigate millions of instructions and extract the exact insights you need in natural language.
Built for the Most Common Embedded Architectures
Test software binaries across the most widely used embedded architectures. Additionally, the technology is extensible to include support for specific proprietary IP.

Intel
Trace and fault x86 and x64 binaries to uncover side-channel leakage and fault injection vulnerabilities in software running on Intel-based embedded systems.

ARM
Run side-channel and fault injection campaigns on Arm binaries, the most common target in embedded and IoT security testing.

Risc-V
Execute and attack RISC-V binaries in emulation, bringing the same tracer and fault injection capabilities to one of the fastest-growing architectures in secure embedded development.
Start testing your binaries without hardware
Request a demo or reach out to discuss how esFirmware fits into your security workflow.
Frequently Asked Questions
We call it stubbing. This requires to hook the QEMU engine with your own code, in C language, in order to extend the emulation with the specifics of the proprietary IP. Once it is done once, the tool capability is augmented.
Absolutely. As a Python-based framework, we offer comprehensive documentation to assist you in implementing custom updates. Furthermore, our team has already successfully integrated and refined a diverse range of fault models.
Certainly. Python scripts can be transformed into standalone executables for seamless CI/CD integration. To ensure these tests remain effective as the codebase evolves, a structured management of the test campaign is necessary to maintain adaptability to changes.
Emulation provides significant advantages for root cause analysis. By pinpointing specific instructions vulnerable to fault injection or data leakage, you can map these weaknesses directly back to the source code to streamline security enhancements.








