Exploring genomic sequence alignment for improving side-channel analysis
29 Jun, 23 | Technical
Abstract: Side-channel analysis (SCA) extracts sensitive information from a device by analyzing information that is leaked through side channels. These measurements are correlated with specific ...
Forgotten Essence Of The Backend Penetration Testing
11 Jan, 23 | Business,Technical
At Riscure we have observed many severe security issues exploited by hackers even in previously certified solutions. In recent years, certification, which aims to minimize security risks, has ...
Cryptographic side channels are well-known and understood in the industry. There are also many countermeasures against side channels to reduce the leakage risk. However, many implementations in ...
Five things you should know to avoid the most common security errors
29 Mar, 22 | Business
For more than 20 years Riscure has been helping chip and device vendors to improve the security of their products. We have observed the ever-changing security landscape, adjusted to the evolving ...
3 Reasons Why Your Payment App Needs To Get EMVCo Certified
25 Aug, 21 | Business
Riscure worked together with Promon to define why mobile app providers should consider getting EMVCo Software-Based Mobile Payment (SBMP) certification.
Modern cars are becoming more reliant on complex computer systems, leading to shifts in business models and product lifecycles in the automotive industry.
In a recent publication, Riscure illustrated the analysis and testing of a commercially available smart light switch. By understanding the methods used to exploit these devices, we can take ...
The Power of Collaboration – Examining the Latest Hardware CWE Updates
26 Mar, 24 | Industry Updates
In this podcast, members from the Special Interest Group (SIG) of CWE, representing Intel, MITRE, AMD, Cycuity, and Riscure, delve into the importance of the new CWEs and explore the ...
On February 26th, the White House Office of the National Cyber Director (ONCD) released a report endorsing memory-safety for future software development. In this blogpost, we’ll talk about the ...
Security Highlight: Post-Quantum Cryptography on Embedded: challenges and opportunities
19 Mar, 24 | Security Highlight
We are moving to an era where quantum computing threatens the confidentiality of current cryptographic protocols, specifically around "harvest now, decrypt later" attacks: the ability to store ...
Understanding RFID Technology and Its Security Implications
08 Mar, 24 | Security Trends
In this article, our team delves into the intricacies of RFID technology, highlighting its various applications while uncovering potential security implications that may be present within these ...