Nowadays the security of an embedded application relies on a set of security layers. This covers typically the following aspects:
- The way a code has been structured and the sensitive data have been made inaccessible
- The use of potential security resources offered by the device
- The implementation of sensitive operations such as the cryptographic operations
- The additional security features using software techniques, such as obfuscations (data, symbols) or dynamic controls (anti-debug, anti-tampering, device binding)
An adequate security implementation is likely to exploit an adequate combination of the above techniques. When considering the security of an application, the security layers have to be targeted specifically. This requires having the right tool set giving the ability to explore the strengths and weaknesses of the implementation and detect whether a product and solution can be compromised.
They aim at covering the various and sophisticated techniques that could compromise a product or a solution. eshard builds flexible and easy-to-use software tools to enable you to test the security of your product or implementation yourself. Our products are web-based and compiled into separate product lines.