Blog

From Classical Smartcards to Integrated Secure Elements

From Classical Smartcards to Integrated Secure Elements

In this paper Riscure expert provide insights into the complex evaluation of integrated Secure Element (iSE) in System-on-Chip (SoC).
Broadband service providers – a security view

Broadband service providers – a security view

This paper provides insights into the security of broadband service providers.
Demystifying Secure Development for Devices & Apps

Demystifying Secure Development for Devices & Apps

Riscure worked together with Trustonic to accumulate the essential knowledge about secure development of mobile applications.
Security Pitfalls in TEE Development

Security Pitfalls in TEE Development

This paper describes an outlook of the most important future TEE security topics.
Attacking AUTOSAR using Software and Hardware Attacks

Attacking AUTOSAR using Software and Hardware Attacks

This paper describes several scenarios how software and hardware attacks can compromise the security of AUTOSAR-based automotive ECUs.
Hardening Secure Boot On Embedded Devices for Hostile Environments

Hardening Secure Boot On Embedded Devices for Hostile Environments

We present an approach for secure boot design, which can be used as a starting point for a complete hardened secure boot solution.
PEW PEW PEW: Designing Secure Boot Securely

PEW PEW PEW: Designing Secure Boot Securely

We present our vision on secure boot design for embedded devices by means of clear, concrete, practical and easy-to-follow recommendations.
Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses

Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses

This talk presents a fault simulator created using existing open-source components and without requiring a detailed model of the underlying hardware.
Security implications of accepting transactions on smartphones

Security implications of accepting transactions on smartphones

One of the most exciting innovations in the payment chain for retailers today is the potential of utilizing commercial-of-the-shelf (COTS) smartphones for Point-of-Sale terminals, also known as ...
Security Highlight: Post Quantum Crypto – are we done yet?

Security Highlight: Post Quantum Crypto – are we done yet?

The US standards institute recently completed the third round of the Post Quantum Crypto (PQC) standardization process. This milestone was long-awaited, and even though we are one step closer to ...
My journey at Riscure: Anna Kolesnichenko

My journey at Riscure: Anna Kolesnichenko

  What is the role of the Operations Manager? I’m responsible for the well-being of the certification team, starting from ensuring the fulfillment of customer requests on ...
Security Highlight: Honda Rolling-PWN attack

Security Highlight: Honda Rolling-PWN attack

The attack known as Rolling-PWN (CVE-2021-46145) [1] is the latest of a recent series of security issues affecting the car’s immobilizers and RKEs (Remote Keyless Entry, also known as the keyfob ...
My journey at Riscure: Nikola Medic

My journey at Riscure: Nikola Medic

  Nikola Medic, Director of Sales Certification at Riscure, has been helping customers find the best way to meet their product deployment objectives for more than 5 ...
Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Security Highlight: Hertzbleed – prime time for power side channel countermeasures or novelty attack?

Hertzbleed is a new side-channel attack that turns a power side channel into a timing side channel. That timing side channel may be exploitable even if the algorithm runs in a constant number of ...
My journey at Riscure: Hanna Humenyuk

My journey at Riscure: Hanna Humenyuk

Hanna Humenyuk is an International Sales and Business Development Manager specializing in Mobile Payment Security at Riscure. Before joining Riscure, Hanna worked in FinTech for over 10 years. ...
DRM security trends and future

DRM security trends and future

The security measures implemented on the device determine the overall system level of protection as required by the license.
Security Highlight: Evil Never Sleeps

Security Highlight: Evil Never Sleeps

Recently, Apple introduced a useful but potentially dangerous feature to its iPhones. Most of us would assume that a phone becomes inactive when switched off by the user or, due to low power. ...
My journey at Riscure: Siebe Krijgsman

My journey at Riscure: Siebe Krijgsman

Siebe Krijgsman, Principal Engineer at Riscure, compares fundamental security topics to old action movies. He discusses the differences between various Riscure tools and the challenges of ...