In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Shift security left: mitigating hardware vulnerabilities during design stage
24 Jan, 23 |
This webinar breaks down our approach to pre-silicon testing and discusses finding side channel & fault injection vulnerabilities during the design stage.
In this webinar we will explain our choice for a netlist hardware simulator, explain how to use Fault Injection simulation for your software inside True Code and show a comparison of our two ...
Don’t Let Your Software Be Derailed by a Hardware Attack
04 Sep, 21 |
In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for fault injection. Additionally, we will emphasize the significance of reinforcing code during the ...
In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Strength In Numbers: Improving Generalization with Ensembles in Profiled Side-Channel Analysis
03 Sep, 20 |
In this webinar, we delve into strong output probabilities for side-channel analysis, their sensitivity to changes, and the benefits of ensembles in enhancing attack performance.
In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon testing that can predict security vulnerabilities during the design stage.
Shift security left: mitigating hardware vulnerabilities during design stage
24 Jan, 23 |
This webinar breaks down our approach to pre-silicon testing and discusses finding side channel & fault injection vulnerabilities during the design stage.
In this webinar we will explain our choice for a netlist hardware simulator, explain how to use Fault Injection simulation for your software inside True Code and show a comparison of our two ...
Don’t Let Your Software Be Derailed by a Hardware Attack
04 Sep, 21 |
In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for fault injection. Additionally, we will emphasize the significance of reinforcing code during the ...
In this session, we will be glitching the KeepKey Crypto Wallet to illustrate a cyber-attack, meticulously examining the attack's intricacies and the extent of damage an exploitative hacker can cause.
Strength In Numbers: Improving Generalization with Ensembles in Profiled Side-Channel Analysis
03 Sep, 20 |
In this webinar, we delve into strong output probabilities for side-channel analysis, their sensitivity to changes, and the benefits of ensembles in enhancing attack performance.