Blog

Secure Application Programming in the presence of Side Channel Attacks

Secure Application Programming in the presence of Side Channel Attacks

This paper introduces a collection of secure programming patterns for security critical devices. These patterns help developers to mitigate the risk of side channel attacks.
Practical steps to evaluate and protect Secure Boot

Practical steps to evaluate and protect Secure Boot

This paper reveals common weaknesses in Secure Boot implementations and proposes practical steps to enhance security of this critical element of an embedded system.
Learn how to keep your Over-The-Air Updates secure?

Learn how to keep your Over-The-Air Updates secure?

A perspective from the analysts at Riscure Security Lab, which was shared during SEMS, Paris on April 30th, 2017 by CEO Marc Witteman.
Controlling PC on ARM using Fault Injection

Controlling PC on ARM using Fault Injection

Fault injection attacks are a powerful technique to influence the intended behavior of embedded systems.
Why is it so hard to make secure chips?

Why is it so hard to make secure chips?

Why is it so hard to make secure chips? from Riscure
Unboxing the White-Box

Unboxing the White-Box

Typical threat modeling applied in cryptography involves a malicious third party attempting to access content. Download the whitepaper.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

Java Cards typically host multiple applets. These are provided in binary CAP files, containing library code or applets.
How to secure HCE

How to secure HCE

How to secure HCE from Riscure
My journey at Riscure: Chris Berg

My journey at Riscure: Chris Berg

Chris Berg is a Security Analyst at Riscure. Chris joined us 2 years ago and he has already worked as a security analyst and evaluator on multiple large certification projects. In this ...
Security Highlight: Exploiting persistent faults in crypto

Security Highlight: Exploiting persistent faults in crypto

At the most recent CHES workshop, Hossein Hadipour of the Graz University of Technology presented an important step forward in exploiting persistent faults in crypto.
My journey at Riscure: Anjana Miyar

My journey at Riscure: Anjana Miyar

Anjana Miyar is a Senior Security Analyst at Riscure North America. Anjana’s specialty lies in software security testing. Unlike many others, Anjana did not have prior security experience before ...
Security Highlight: Compromising printers via malicious third-party cartridges

Security Highlight: Compromising printers via malicious third-party cartridges

This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the ...
Tunable Replica Circuit

Tunable Replica Circuit

At the Black Hat 2022, Daniel Nemiroff presented a talk on Tunable Replica Circuits. Riscure CTO of North America, Jasper van Woudenberg had an opportunity to listen to this presentation. Here ...
My journey at Riscure: Caroline Favrot Lee

My journey at Riscure: Caroline Favrot Lee

Caroline Favrot Lee is the Operations Director for Riscure North America. Caroline originally joined Riscure in 2012 as an accountant and office manager for the Riscure North American office, ...
Security Highlight: Marc Witteman on the roots of Riscure, device security, and pre-silicon

Security Highlight: Marc Witteman on the roots of Riscure, device security, and pre-silicon

The story of Riscure, like with many other technology businesses, started in the garage. Dissatisfied with the quality of then available hardware testing tooling, Marc Witteman founded Riscure ...
My Journey at Riscure: Pascal van Gimst

My Journey at Riscure: Pascal van Gimst

  How did you join Riscure? I was working in a research institute called TNO, where I was doing chip security testing in a group of 10 people. One of those people was Marc ...
Security Highlight: Glitched on Earth by Humans

Security Highlight: Glitched on Earth by Humans

  The Black Hat conference always brings up interesting and current research within the device security industry. Jasper van Woudenberg attended the latest conference, ...