Blog

Controlling PC on ARM using Fault Injection

Controlling PC on ARM using Fault Injection

Fault injection attacks are a powerful technique to influence the intended behavior of embedded systems.
Why is it so hard to make secure chips?

Why is it so hard to make secure chips?

Why is it so hard to make secure chips? from Riscure
Unboxing the White-Box

Unboxing the White-Box

Typical threat modeling applied in cryptography involves a malicious third party attempting to access content. Download the whitepaper.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

Java Cards typically host multiple applets. These are provided in binary CAP files, containing library code or applets.
How to secure HCE

How to secure HCE

How to secure HCE from Riscure
Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES from Riscure
Optical fault injection on secure Microcontrollers

Optical fault injection on secure Microcontrollers

In this paper we detail the latest developments regarding optical fault injection on secure microcontrollers.
Defeating RSA Countermeasures

Defeating RSA Countermeasures

Defeating RSA Multiply-Always and Message Blinding Countermeasures from Riscure
Security evaluation of a smart device: D-Link DIR 2680 router

Security evaluation of a smart device: D-Link DIR 2680 router

In this blog post, Riscure’s security analyst Naasa Fikri and senior trainer/senior security analyst Yashin Mehaboobe illustrate a common approach for a light security assessment of smart home ...
Security Highlight: The Difficulty of Securing a Mobile Phone

Security Highlight: The Difficulty of Securing a Mobile Phone

Our team did a deep dive into TEEGRIS, the newest TEE of Samsung. As a result, we proved that this TEE, introduced in 2019 for the Galaxy S10, can be fully compromised by a determined expert. ...
Failure analysis techniques applied for Side Channel Analysis

Failure analysis techniques applied for Side Channel Analysis

Riscure conducted research that proved that a specific failure analysis method, Thermal Laser Stimulation, can be effective to recover key material.
Breaking TEE Security Part 3: Escalating Privileges

Breaking TEE Security Part 3: Escalating Privileges

In our previous two blog posts, we first introduced Samsung’s TEE OS TEEGRIS and then showed how to exploit a Trusted Application (TA) and gain runtime control.
Breaking TEE Security Part 2: Exploiting Trusted Applications (TAs)

Breaking TEE Security Part 2: Exploiting Trusted Applications (TAs)

In this second blog post, we will continue to explore TEEGRIS by reverse engineering TAs in order to identify and exploit vulnerabilities.
Security Highlight: What it takes to hack a tesla and what it means for device makers

Security Highlight: What it takes to hack a tesla and what it means for device makers

KU Leuven's security research group COSIC has a strong track record in studying Tesla security and demonstrated attacks on model S in 2018 and 2019. This time, they broke model X and applied ...
Sharing knowledge through blended learning

Sharing knowledge through blended learning

You know your team needs to learn new skills. But are they actually going to be able to put new knowledge into practice? Will this investment pay off? And how does this work in a remote-first world?
Breaking TEE Security Part 1: TEEs, TrustZone and TEEGRIS

Breaking TEE Security Part 1: TEEs, TrustZone and TEEGRIS

The goal of our investigation was to assess how strong Samsung’s TEE security OS is and whether it can be compromised to obtain runtime control and extract all protected assets, allowing, e.g. ...
Security Highlight: a Journey to Titan

Security Highlight: a Journey to Titan

Recently, NinjaLab investigated Titan, a two-factor authentication token offered by Google, and broke its secure crypto implementation.