Security Highlight: a look at Ascon, a lightweight crypto algorithm
15 Feb, 23 | Security Highlight
The contest for standardization of a lightweight crypto (LWC) algorithm has just finished. US standards body NIST selected Ascon as the winner. Ascon is an algorithm proposed by an international ...
Chris Berg is a Security Analyst at Riscure. Chris joined us 2 years ago and he has already worked as a security analyst and evaluator on multiple large certification projects. In this ...
Security Highlight: Exploiting persistent faults in crypto
13 Jan, 23 | Security Highlight
At the most recent CHES workshop, Hossein Hadipour of the Graz University of Technology presented an important step forward in exploiting persistent faults in crypto.
Anjana Miyar is a Senior Security Analyst at Riscure North America. Anjana’s specialty lies in software security testing. Unlike many others, Anjana did not have prior security experience before ...
Security Highlight: Compromising printers via malicious third-party cartridges
09 Dec, 22 | Security Highlight
This fall, HP Inc. published an article describing a buffer overflow vulnerability in their printer software which would allow an attacker to obtain persistent remote code execution on the ...
At the Black Hat 2022, Daniel Nemiroff presented a talk on Tunable Replica Circuits. Riscure CTO of North America, Jasper van Woudenberg had an opportunity to listen to this presentation. Here ...
Caroline Favrot Lee is the Operations Director for Riscure North America. Caroline originally joined Riscure in 2012 as an accountant and office manager for the Riscure North American office, ...
Security Highlight: Marc Witteman on the roots of Riscure, device security, and pre-silicon
11 Nov, 22 | Security Highlight
The story of Riscure, like with many other technology businesses, started in the garage. Dissatisfied with the quality of then available hardware testing tooling, Marc Witteman founded Riscure ...
How did you join Riscure?
I was working in a research institute called TNO, where I was doing chip security testing in a group of 10 people. One of those people was Marc ...