Publications

Security implications of accepting transactions on smartphones

Security implications of accepting transactions on smartphones

One of the most exciting innovations in the payment chain for retailers today is the potential of utilizing commercial-of-the-shelf (COTS) smartphones for Point-of-Sale terminals, also known as ...
Bypassing Secure Boot Using Fault Injection

Bypassing Secure Boot Using Fault Injection

This research is also available in a form of slides and video from the BlackHat Europe 2016.
Extracting and Analyzing Automotive Firmware Efficiently

Extracting and Analyzing Automotive Firmware Efficiently

In this paper we discuss hardware attacks, like fault injection, which can be used to efficiently extract automotive firmware from secured ECUs.
Side-channel based intrusion detection for industrial control systems

Side-channel based intrusion detection for industrial control systems

Research paper written by Pol Van Aubel and Kostas Papagiannopoulos from Radboud University, Digital Security Group; Lukasz Chmielewski from Riscure; Christian Doerr from Delft University of ...
Analyzing the security of Cloud-Based Payment apps on Android

Analyzing the security of Cloud-Based Payment apps on Android

Riscure’s researchers analyzed more than 426 Android payment applications, downloaded directly from the Google App Store.
Deep Learning for Side Channel Analysis: Tuning your network efficiently

Deep Learning for Side Channel Analysis: Tuning your network efficiently

A video presentation by Guilherme Perin, from the Riscure User Workshop
13 steps to improve security and privacy when developing a smart lock

13 steps to improve security and privacy when developing a smart lock

Our findings show that smart locks can introduce new security risks. We provide 13 recommendations for smart lock developers in this whitepaper.
Premium Content Delivery on Android: how to guard an open platform

Premium Content Delivery on Android: how to guard an open platform

Defending an Android implementation of a secure media path also requires a unique set of methods. This whitepaper provides a high-level overview of Android security risks for the content ...
Lowering the bar: deep learning for side-channel analysis

Lowering the bar: deep learning for side-channel analysis

We show we can break a lightly protected AES, an AES implementation with masking countermeasures and a protected ECC implementation using Deep Learning.
Security implications of accepting transactions on smartphones

Security implications of accepting transactions on smartphones

One of the most exciting innovations in the payment chain for retailers today is the potential of utilizing commercial-of-the-shelf (COTS) smartphones for Point-of-Sale terminals, also known as ...
Bypassing Secure Boot Using Fault Injection

Bypassing Secure Boot Using Fault Injection

This research is also available in a form of slides and video from the BlackHat Europe 2016.
Extracting and Analyzing Automotive Firmware Efficiently

Extracting and Analyzing Automotive Firmware Efficiently

In this paper we discuss hardware attacks, like fault injection, which can be used to efficiently extract automotive firmware from secured ECUs.
Side-channel based intrusion detection for industrial control systems

Side-channel based intrusion detection for industrial control systems

Research paper written by Pol Van Aubel and Kostas Papagiannopoulos from Radboud University, Digital Security Group; Lukasz Chmielewski from Riscure; Christian Doerr from Delft University of ...
Analyzing the security of Cloud-Based Payment apps on Android

Analyzing the security of Cloud-Based Payment apps on Android

Riscure’s researchers analyzed more than 426 Android payment applications, downloaded directly from the Google App Store.
Deep Learning for Side Channel Analysis: Tuning your network efficiently

Deep Learning for Side Channel Analysis: Tuning your network efficiently

A video presentation by Guilherme Perin, from the Riscure User Workshop
13 steps to improve security and privacy when developing a smart lock

13 steps to improve security and privacy when developing a smart lock

Our findings show that smart locks can introduce new security risks. We provide 13 recommendations for smart lock developers in this whitepaper.
Premium Content Delivery on Android: how to guard an open platform

Premium Content Delivery on Android: how to guard an open platform

Defending an Android implementation of a secure media path also requires a unique set of methods. This whitepaper provides a high-level overview of Android security risks for the content ...
Lowering the bar: deep learning for side-channel analysis

Lowering the bar: deep learning for side-channel analysis

We show we can break a lightly protected AES, an AES implementation with masking countermeasures and a protected ECC implementation using Deep Learning.