🌐 Chip & binary security testing
www.eshard.com
Over the next 4 years, we’ll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.
Over the next 4 years, we’ll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.
🔗 eshard.com/careers
🔗 eshard.com/careers
🔗 How we did it: eshard.com/posts/dekra-...
#hardware #cybersecurity #hardwarehacking
🔗 How we did it: eshard.com/posts/dekra-...
#hardware #cybersecurity #hardwarehacking
What do you think? 💬
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity
What do you think? 💬
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity
▶ Up next: 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗛𝗮𝗿𝗱𝘄𝗮𝗿𝗲 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 - 𝗠𝗼𝗱𝗲𝗿𝗻 𝗧𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲𝘀
Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity
▶ Up next: 𝗔𝗱𝘃𝗮𝗻𝗰𝗲𝗱 𝗛𝗮𝗿𝗱𝘄𝗮𝗿𝗲 𝗛𝗮𝗰𝗸𝗶𝗻𝗴 - 𝗠𝗼𝗱𝗲𝗿𝗻 𝗧𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲𝘀
Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity
We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.
🌏Session 1: u.eshard.com/m8ahb
🌎Session 2: u.eshard.com/TjdEa
We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.
🌏Session 1: u.eshard.com/m8ahb
🌎Session 2: u.eshard.com/TjdEa
We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.
🌏Session 1: u.eshard.com/m8ahb
🌎Session 2: u.eshard.com/TjdEa
We’ve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.
Still cooking, but we’re getting close to sharing it with you. And more is coming with iOS26...
#ios #emulation #devsecops
We’ve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.
Still cooking, but we’re getting close to sharing it with you. And more is coming with iOS26...
#ios #emulation #devsecops
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.
#cybersecurity #hardware #postquantumcryptography
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.
#cybersecurity #hardware #postquantumcryptography
#cybersecurity #reverseengineering #binary #softwareengineering
#cybersecurity #reverseengineering #binary #softwareengineering
Ready for the next one? Tell us what you want to see next and we will make it happen. 😉 #cybersecurity
Ready for the next one? Tell us what you want to see next and we will make it happen. 😉 #cybersecurity
Register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#webinar #pqc #postquantum #nist
Register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#webinar #pqc #postquantum #nist
Choose your timeslot and register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
Choose your timeslot and register below ⬇
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist
Take a look at what we found ➡️ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware
Take a look at what we found ➡️ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware
We’ll walk through this KMAC256 state-recovery workflow step by step during the session.
Secure your spot 🚨
𝟭𝟬 𝗔𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/wcUfh
𝟱 𝗣𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/4hGSQ
#pqc #postquantum #nist
We’ll walk through this KMAC256 state-recovery workflow step by step during the session.
Secure your spot 🚨
𝟭𝟬 𝗔𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/wcUfh
𝟱 𝗣𝗠 𝘀𝗲𝘀𝘀𝗶𝗼𝗻 (4am EST | 5pm SGT): u.eshard.com/4hGSQ
#pqc #postquantum #nist
Keccak is everywhere, quietly protecting real systems, such as:
• Connected devices checking data integrity
• Firmware updates verifying authenticity
• Embedded products securing messages
• PQC standards like ML-KEM, ML-DSA, and SLH-DSA
⬇
Keccak is everywhere, quietly protecting real systems, such as:
• Connected devices checking data integrity
• Firmware updates verifying authenticity
• Embedded products securing messages
• PQC standards like ML-KEM, ML-DSA, and SLH-DSA
⬇
📲 You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
📲 You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity
🔗 Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
🔗 Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!
#cybersecurity #events
We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!
#cybersecurity #events
✅Updated SCA and FI research on Kyber
✅Improved CPA on Kyber
🆕SASCA on Kyber targeting NTT
🆕Chosen ciphertext attack on Keccak in Kyber
🆕CPA on Dilithium
Request the full list of notebooks: www.eshard.com/contact #pqc
✅Updated SCA and FI research on Kyber
✅Improved CPA on Kyber
🆕SASCA on Kyber targeting NTT
🆕Chosen ciphertext attack on Keccak in Kyber
🆕CPA on Dilithium
Request the full list of notebooks: www.eshard.com/contact #pqc
Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.
#reverseengineering #ios #softwaresecurity
Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.
#reverseengineering #ios #softwaresecurity