View the slides below or download them in PDF. Scroll down to request the whitepaper.
Why are we still vulnerable to Side Channel Attacks?
Why are we still vulnerable to Side Channel Attacks? from Riscure
In this paper, we discuss several techniques which we used to significantly increase the efficiency of reverse-engineering the firmware of an instrument cluster. Using this example target, we demonstrate it is fairly easy to implement an emulator which is capable of emulating the target’s firmware entirely without the need for the original hardware, including many essential components of the target such as the EEPROM, display controller, and CAN bus.
View the slides below or download them in PDF. Scroll down to request the whitepaper.
Why are we still vulnerable to Side Channel Attacks? from Riscure
How to secure electronic passports from Riscure
Java Card Security from Riscure