OUR SECURITY ANALYSIS PLATFORMS

WHAT TOOLS DO WE PROVIDE

OUR PLATFORMS

Nowadays the security of an embedded application relies on a set of security layers. This covers typically the following aspects:

  • The way a code has been structured and the sensitive data have been made inaccessible
  • The use of potential security resources offered by the device
  • The implementation of sensitive operations such as the cryptographic operations
  • The additional security features using software techniques, such as obfuscations (data, symbols) or dynamic controls (anti-debug, anti-tampering, device binding)

An adequate security implementation is likely to exploit an adequate combination of the above techniques. When considering the security of an application, the security layers have to be targeted specifically. This requires having the right tool set giving the ability to explore the strengths and weaknesses of the implementation and detect whether a product and solution can be compromised.

They aim at covering the various and sophisticated techniques that could compromise a product or a solution. eshard builds flexible and easy-to-use software tools to enable you to test the security of your product or implementation yourself. Our products are web-based and compiled into separate product lines.

  • esDynamic: a complete, web-based framework for analysing in-depth cryptographic codes against side-channel and fault injections.
  • esCapade: a web-based analysis tool to review applications. The first version targets specifically Java Card applications and provides an analysis framework of JavaCard CAP files.
  • esChecker: a web-based analysis tool to review binary code, without the need for in-depth knowledge. With one click of a button, ou can reveal the binary, and get a better understanding of the vulnerabilities within the code.

ANALYSE YOUR PRODUCT

We share our expertise with you in a hands-on manner to provide a pro-active learning experience.

REGISTER POTENTIAL THREATS

During our training we will give you examples of real-case weaknesses (know how to attack these weaknesses). 

UNDERSTAND VULNERABILITIES

We will show you what measures to put in place to patch these weakness, to avoid future attacks. 


CHECK OUT OUR TOOLS VIDEO CASTS AND DEMOS

View here