esDynamic
Manage your attack workflows in a powerful and collaborative platform.
Expertise Modules
Executable catalog of attacks and techniques.
Infrastructure
Integrate your lab equipment and remotely manage your bench.
Lab equipments
Upgrade your lab with the latest hardware technologies.
Side Channel Attacks
Evaluate cryptography algorithms from data acquitition to result visualisation.
Fault Injection Attacks
Laser, Electromagnetic or Glitch to exploit a physical disruption.
Photoemission Analysis
Detect photon emissions from your IC to observe its behavior during operation.
Evaluation Lab
Our team is ready to provide expert analysis of your hardware.
Starter Kits
Build know-how via built-in use cases developed on modern chips.
Cybersecurity Training
Grow expertise with hands-on training modules guided by a coach.
esReverse
Static, dynamic and stress testing in a powerful and collaborative platform.
Extension: Intel x86, x64
Dynamic analyses for x86/x64 binaries with dedicated emulation frameworks.
Extension: ARM 32, 64
Dynamic analyses for ARM binaries with dedicated emulation frameworks.
Penetration Testing
Identify and exploit system vulnerabilities in a single platform.
Vulnerability Research
Uncover and address security gaps faster and more efficiently.
Code Audit & Verification
Effectively detect and neutralise harmful software.
Digital Forensics
Collaboratively analyse data to ensure thorough investigation.
Software Assessment
Our team is ready to provide expert analysis of your binary code.
Cybersecurity training
Grow expertise with hands-on training modules guided by a coach.
Semiconductor
Automotive
Security Lab
Gov. Agencies
Academics
Defense
Healthcare
Energy
Why eShard?
Our team
Careers
Youtube
Gitlab
Github
Orbiting assets may cruise hundreds of kilometres above Earth, but the ground-segment equipment that keeps them online sits in car parks, roof-tops and control rooms that can be reached. Private companies now operate more than 60% of the active satellites in orbit, multiplying the user terminals, gateway racks and ground-station antenna that must be trusted day-to-day.
Recent events show why that trust matters. On 24 February 2022, a wiper attack against Viasat’s KA-SAT network knocked tens of thousands of customer modems offline and cut remote-monitoring links to 5,800 Enercon wind turbines in Germany, demonstrating how a single strike on ground hardware can ripple across critical services.
Security research is pushing the same lesson from another angle. At Black Hat 2022, engineer Lennert Wouters used a home-built fault-injection “modchip” that cost about €230 (~$250) to gain persistent root access to a Starlink user terminal—proof that physical intrusion is a valid threat, even with low-budget equipment.
Taken together, these trends make it clear: defending the terminals is defending the constellation. The European Space Agency (ESA) therefore required a laboratory where engineers could replicate real-world side-channel attacks, electromagnetic attacks and fault injection glitches to advocate good security practices and appropriate levels of counter-measures.
In 2024, the European Space Agency opened a competitive tender for designing and building a Hardware Security Laboratory able to replicate state-of-the-art side-channel, electromagnetic (EMFI) and glitch attacks.
After a competitive evaluation, eShard was awarded and provided as first step, a full survey of current attack techniques against modern chips. The study set the technical requirements and a clear verification plan for ESA’s new laboratory.
With the technical baseline agreed, the project shifted from analysis to execution. eShard translated the requirements into a concrete bill of equipment, verified each component at its own facility, and then transferred the complete, pre-configured equipment to ESA’s ESTEC centre for installation and site-acceptance testing.
eShard has supplied a complete test environment that covers Side-Channel Analysis, Electromagnetic Fault Injection (EMFI) and precision voltage and clock glitching — the three physical-attack techniques most commonly used.
All benches are driven by esDynamic, installed on a dedicated server within ESA’s secure network. From any authorised workstation, engineers can control oscilloscopes and injectors in real time, watch traces as they stream in and tweak attack parameters together, without any data ever leaving the agency.
esDynamic supports true multi-user control inside separate project spaces: several analysts can work on the same data capture, annotate results together, and still keep benches, scripts and data visible only to their mission team. Every run is versioned automatically, so campaigns can be replayed or audited later while preserving a clean chain of custody.
To accelerate productivity, eShard delivered a library of pre-built attack scenarios and use cases, executable notebooks and reference datasets, plus hands-on training sessions with subject-matter experts.
ESA has confirmed its satisfaction with the laboratory’s roll-out and next steps to deepen its collaboration with eShard are already under discussion.