Blog

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

Java Cards typically host multiple applets. These are provided in binary CAP files, containing library code or applets.
How to secure HCE

How to secure HCE

How to secure HCE from Riscure
Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES from Riscure
Optical fault injection on secure Microcontrollers

Optical fault injection on secure Microcontrollers

In this paper we detail the latest developments regarding optical fault injection on secure microcontrollers.
Defeating RSA Countermeasures

Defeating RSA Countermeasures

Defeating RSA Multiply-Always and Message Blinding Countermeasures from Riscure
How multi-fault injection breaks the security of smart cards

How multi-fault injection breaks the security of smart cards

How multi-fault injection breaks the security of smart cards from Riscure
Why are we still vulnerable to Side Channel Attacks?

Why are we still vulnerable to Side Channel Attacks?

Why are we still vulnerable to Side Channel Attacks? from Riscure
How to secure electronic passports

How to secure electronic passports

How to secure electronic passports from Riscure
Talking about Clock Glitching

Talking about Clock Glitching

Clock Glitching as a viable technique that can potentially uncover new vulnerabilities and thus is useful in a hardware security testing environment.
The challenges of Continuous Fuzzing

The challenges of Continuous Fuzzing

The attack area of embedded systems is large. The software must not only be secure in friendly operational conditions but also be resilient in a hostile environment where data may be ...
Real-time code coverage during a fuzzing test

Real-time code coverage during a fuzzing test

Arjen Rouvoet, Senior Software Developer at Riscure, talks about the specifics of applying a fuzzing technique in embedded systems.
My journey at Riscure: Diego Rivera

My journey at Riscure: Diego Rivera

Diego Rivera is a senior developer at the Riscure True Code team. Three years ago, Diego joined Riscure’s software development team and has been working with them on our tools since then. In ...
Security Highlight: A further look at faulTPM’s deepest secrets

Security Highlight: A further look at faulTPM’s deepest secrets

Recently, a new paper was published by Hans Niklas Jacob et al, titled "faulTPM: Exposing AMD fTPMs’ Deepest Secrets". The paper demonstrates the impact of a previously published Voltage Fault ...
Secure Implementation of Post Quantum Crypto in the spotlight

Secure Implementation of Post Quantum Crypto in the spotlight

Marc Witteman shares his thoughts on the latest developments in secure Post Quantum Crypto
My journey at Riscure: Nicole Fern

My journey at Riscure: Nicole Fern

Nicole Fern is a Senior Security Analyst at Riscure North America. In this role she works on both hardware and software projects, and is also involved in Riscure’s Training Academy as a trainer. ...
Security Highlight: ChatGPT vs Security Analyst

Security Highlight: ChatGPT vs Security Analyst

At Riscure, we like to explore new technologies that can help us better help our customers. Undoubtedly, the latest famous new applications are various versions of ChatGPT, a recently accessible ...
My journey at Riscure: Nisrine Jafri

My journey at Riscure: Nisrine Jafri

Nisrine Jafri is a Senior Security Analyst and Evaluator at Riscure. After switching from academia to industry work 2 years ago, Nisrine has been mainly working on Certification projects at ...