Contact us

HOST 2022

IEEE International Symposium on Hardware Oriented Security and Trust (HOST) is the premier symposium that facilitates the rapid growth of hardware-based security research and development. Since 2008, HOST has served as the globally recognized event for researchers and practitioners to advance knowledge and technologies related to hardware security and assurance.
HOST 2022 Registration

Come to our booth

Put your hands on esDynamic and see how it can remotely control a laser setup (from our partner ALPhANOV) to make laser fault injection, photoemission or thermal laser stimulation or an electromagnetic setup to make side-channel analysis or electromagnetic fault injection.

Let’s also have a talk on how performance is important for side-channel analysis and how to leverage GPU and distributed computing to get at the state-of-the-art in this domain.

Chip image - Fault Injection and EMFI

Our Fault Injection solutions

We offer laser and electromagnetic turnkey fault injection solutions including hardware, software, attacks and training for experts in cryptography and physical attacks on hardware products.

Know more
Side channel attacks

Our Side-Channel Analysis solutions

We offer turnkey solutions for SCA applications starting from hardware benches setup and automation up to data exploitation with secret assets extraction... All through esDynamic, our data science platform. esDynamic provides know-how and tutorial notebooks on signal acquisition and processing and even more knowledge and use cases notebooks for exploiting datasets with leakage detection and attack analyses.

If, like us, you think that performance matters, check out our blog post on the topic SCA: Why Performance Matters! In this context, this June 2022, we release SCA Fast Computing eXtension module for esDynamic, which leverages distributed computing and GPU acceleration for heavy side-channel analyses.

Download our brochure

Our binary analysis solution

How to stress and verify the effectiveness of counter-measures embedded into a firmware? Until now it meant performing physical and logical attacks on the full product with all the complexity and deep expertise in side-channel and fault injection that comes along.

With esFirmware, eShard's binary analysis solution, anyone can now customize their emulation environment and perform physical (side-channel, fault injection) and soon logical (fuzzing) test campaigns directly on their firmware without requiring access to the target hardware.

esFirmware can cover different use cases: vulnerability detection, reverse engineering, white box cryptography testing, code profiling for actual side-channel and/or fault injection attacks.

Download our brochure

Training tools

Ecosystems move fast, so do the cybersecurity challenges. Your team must remain up-to-date and master the last security threats because your business and your customers are at stake.
Differential Fault Analysis on symmetric algorithms
Coach: Guillaume Vinet
With this module, you will learn about the main Differential Fault Attacks on AES. You will get familiar with the Piret & Quisquater DFA targetting the AES final rounds and the Kim & Quisquater DFA targeting the AES key schedule. During this training, you will learn how to compute differentials, characterize faults and recover a secret key from faulty AES outputs.
See more details
Laser Fault Injection with esDynamic
Coach: Guillaume Vinet
Using the [esDynamic]( platform, you will learn how to control ALPhANOV's laser equipment and implement a fault campaign. You will learn how to perform a multi-dimensional scanning, and log results of your campaing. You will learn how to use the delay generator and setup your injection trigger to precisely inject a fault during the device execution. During the practice session, you will get the opportunity to inject a successful laser fault on a device.
Side Channel Marvels Tools & Double Fault Injection Attack
Coach: Guillaume Vinet
This practical course introduces the Side Channel Marvels framework. You will learn how to use its different modules to visualise a binary execution, to perform a CDA or DFA, and finally to recover the master key. This module is also composed of a White-Box challenge that shall be defeated with a double fault attack.

About eShard

Leading independent expert for security in Integrated Circuits, Mobile Applications and Backend Systems since 2016, at eShard, we are passionate about state of the art attack techniques. We have been helping customers all around the globe to test and enhance the resilience of their systems by offering cutting edge turnkey solutions.

Our headquarters are in Bordeaux, France, and we also have offices in Singapore and Germany with more than 40 experts.

Check out other events

Blog Articles

Integrated Circuit Security

Solving a Ledger CTF challenge with Deep Learning on esDynamic

12 min read
Edit by Timon Benjamin Mar 23, 2021
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 Pessac
eShard Nudge
7 rue Gaston de Flotte
13012 Marseille
eShard GmbH
Beethovenallee 21
53173 Bonn
Paya Lebar Quarter
#04-01 Paya Lebar Link