Defending an Android implementation of a secure media path also requires a unique set of methods. This whitepaper provides a high-level overview of Android security risks for the content ...
We show we can break a lightly protected AES, an AES implementation with masking countermeasures and a protected ECC implementation using Deep Learning.
In this paper we evaluate the efficiency of reverse engineering the firmware of an automotive embedded controller unit.
From the beginning of the electronics era in vehicles, car manufacturers have been trying to simplify how to troubleshoot problems in their vehicles.
The evolution of automotive systems has brought us into a world where both highly connected and autonomously operated vehicles are becoming commonplace.
In this paper we present the critical security challenges that Mobile Banking applications face in today’s market.
Watch the video of this research presented at SHA2017
Today’s standard embedded device technology is not robust against Fault Injection (FI) attacks such as Voltage Fault Injection (V-FI)
A security assessment of the resilience against fault injection attacks in ASIL-D certified microcontrollers