Publications

Controlling PC on ARM using Fault Injection

Controlling PC on ARM using Fault Injection

Fault injection attacks are a powerful technique to influence the intended behavior of embedded systems.
Why is it so hard to make secure chips?

Why is it so hard to make secure chips?

Why is it so hard to make secure chips? from Riscure
Unboxing the White-Box

Unboxing the White-Box

Typical threat modeling applied in cryptography involves a malicious third party attempting to access content. Download the whitepaper.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

Java Cards typically host multiple applets. These are provided in binary CAP files, containing library code or applets.
How to secure HCE

How to secure HCE

How to secure HCE from Riscure
Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES from Riscure
Optical fault injection on secure Microcontrollers

Optical fault injection on secure Microcontrollers

In this paper we detail the latest developments regarding optical fault injection on secure microcontrollers.
Defeating RSA Countermeasures

Defeating RSA Countermeasures

Defeating RSA Multiply-Always and Message Blinding Countermeasures from Riscure
Controlling PC on ARM using Fault Injection

Controlling PC on ARM using Fault Injection

Fault injection attacks are a powerful technique to influence the intended behavior of embedded systems.
Why is it so hard to make secure chips?

Why is it so hard to make secure chips?

Why is it so hard to make secure chips? from Riscure
Unboxing the White-Box

Unboxing the White-Box

Typical threat modeling applied in cryptography involves a malicious third party attempting to access content. Download the whitepaper.
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Side-channel attacks are techniques to attack implementations of cryptographic algorithms by observing its physical parameter. Read more.
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

Java Cards typically host multiple applets. These are provided in binary CAP files, containing library code or applets.
How to secure HCE

How to secure HCE

How to secure HCE from Riscure
Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES

Practical Differential Fault Attack on AES from Riscure
Optical fault injection on secure Microcontrollers

Optical fault injection on secure Microcontrollers

In this paper we detail the latest developments regarding optical fault injection on secure microcontrollers.
Defeating RSA Countermeasures

Defeating RSA Countermeasures

Defeating RSA Multiply-Always and Message Blinding Countermeasures from Riscure