View the slides below or download them in PDF. Scroll down to request the whitepaper.
Why is it so hard to make secure chips?
Why is it so hard to make secure chips? from Riscure
In this paper, we discuss several techniques which we used to significantly increase the efficiency of reverse-engineering the firmware of an instrument cluster. Using this example target, we demonstrate it is fairly easy to implement an emulator which is capable of emulating the target’s firmware entirely without the need for the original hardware, including many essential components of the target such as the EEPROM, display controller, and CAN bus.
View the slides below or download them in PDF. Scroll down to request the whitepaper.
Why is it so hard to make secure chips? from Riscure
Typical threat modeling applied in cryptography involves a malicious third party attempting to access content. Download the whitepaper.
Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.