Embedded Systems

Explore all our embedded systems security resources here.

Embedded Systems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Don’t Get Knocked Off the Curve: An Overview of Fault Injection Attacks on Elliptic Curve Cryptosystems

Elliptic curve cryptography (ECC) is ubiquitous and used to secure everything from internet ...
Riscure Side Channel Webinar, May 2024

Riscure Side Channel Webinar, May 2024

Join our special webinar to discuss the latest developments in device security.
Professionalizing Fault Injection

Professionalizing Fault Injection

Hobbyists and hackers are typically not well-funded, but often have excellent technical ...
Riscure Side Channel Webinar, March 2024

Riscure Side Channel Webinar, March 2024

Join our special webinar to discuss the latest developments in device security.
Shift security left: mitigating hardware vulnerabilities during design stage

Shift security left: mitigating hardware vulnerabilities during design stage

This webinar breaks down our approach to pre-silicon testing and discusses finding side ...
Combining Pre-Silicon & Post-Silicon security testing

Combining Pre-Silicon & Post-Silicon security testing

In this webinar we will discuss how hardware developers can benefit from advanced Pre-Silicon ...
Tools To Help You Keep Your Code Secure

Tools To Help You Keep Your Code Secure

This session aims to provide insights into the significance and versatility of True Code, ...
Inspector Pre-Silicon SCA: Revolutionizing Side Channel Analysis with Advanced Detection

Inspector Pre-Silicon SCA: Revolutionizing Side Channel Analysis with Advanced Detection

Discover the benefits of pre-silicon side channel analysis and learn how to apply Inspector ...
Securing Embedded Devices: 9 Considerations for Success

Securing Embedded Devices: 9 Considerations for Success

We curated a list of the most essential security considerations that we recommend when ...
Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code

Revolutionizing Security Testing: Dynamic fuzzing and FI simulation with Riscure True Code

Learn more about dynamic fuzzing using Riscure True Code in this on-demand webinar.
Exploring genomic sequence alignment for improving side-channel analysis

Exploring genomic sequence alignment for improving side-channel analysis

This paper explores a novel approach to improving Side-Channel Analysis (SCA) alignment, ...
Forgotten Essence Of The Backend Penetration Testing

Forgotten Essence Of The Backend Penetration Testing

This whitepaper delves into the root causes of unnoticed vulnerabilities during backend ...
How to secure Over-the-Air software updates

How to secure Over-the-Air software updates

Is your device’s update protocol secure? And even if so, do updates introduce new and ...
Five things you should know to avoid the most common security errors

Five things you should know to avoid the most common security errors

We discuss the most common security issues and offer recommendations that can help mitigate ...
Secure Coding: Pitfalls and Good Practices

Secure Coding: Pitfalls and Good Practices

This webinar explores the challenges of secure coding, emphasizing the difficulties arising ...
Influencing the Program Counter on a RISC-V Chip

Influencing the Program Counter on a RISC-V Chip

In this presentation several different sets of experiments are discussed to influence the ...
Deep Learning in Side Channel Analysis

Deep Learning in Side Channel Analysis

Learn about Riscure’s latest developments in Deep Learning for Side Channel Analysis.
Fault Injection Simulation

Fault Injection Simulation

In this webinar we will explain our choice for a netlist hardware simulator, explain how to ...
Lean Development Fuzzing

Lean Development Fuzzing

In this session we will elaborate on our vision how to integrate fuzzing in the software ...
Don’t Let Your Software Be Derailed by a Hardware Attack

Don’t Let Your Software Be Derailed by a Hardware Attack

In this presentation, we will thoroughly explore the most up-to-date mitigation patterns for ...
How Fault Injection Corrupts Your Code

How Fault Injection Corrupts Your Code

Join CEO Marc Witteman in a 25-min presentation on Secure Coding & Fault Injection. Learn how ...
Failure Analysis for SCA Thermal Laser Stimulation

Failure Analysis for SCA Thermal Laser Stimulation

In this 12-minute presentation, Our Principal Researcher, Dennis Vermoen will share details ...
Fault Injection Auto Tuning Parameters

Fault Injection Auto Tuning Parameters

Fault Injection is a potent hacker method to breach product security. Riscure's smart ...
Attackers vs. Security Labs

Attackers vs. Security Labs

Colin O'Flynn from NewAE and Jasper van Woudenberg CTO of Riscure discuss several prominent ...
20 Ways Past Secure Boot

20 Ways Past Secure Boot

This discussion covers the mechanisms behind Secure Boot, its potential vulnerabilities, and ...
Fault Injection Resistance Measure

Fault Injection Resistance Measure

In this webinar we will discuss how to determine the resistance against an FI attack for a product.
Security Pitfalls in TEE Development

Security Pitfalls in TEE Development

Discover the security pitfalls in TEE development and learn how to avoid common mistakes to ...
Demystifying Secure Development for Devices & Apps

Demystifying Secure Development for Devices & Apps

Understanding security testing, evaluation and certification, and how they benefit the design, ...
Security certification considerations when choosing a secure product

Security certification considerations when choosing a secure product

Understanding Common Criteria and Evaluation Assurance Levels, and putting these into context ...
The Price We Pay for Faults

The Price We Pay for Faults

This paper explains the background and risk of fault injection, and proposes to use secure ...
Fault Mitigation Patterns

Fault Mitigation Patterns

To make it easier for developers to protect their security-critical devices, Riscure created ...
Lowering the bar: deep learning for side-channel analysis

Lowering the bar: deep learning for side-channel analysis

We show we can break a lightly protected AES, an AES implementation with masking ...
Side-channel based intrusion detection for industrial control systems

Side-channel based intrusion detection for industrial control systems

In this publication, the researchers propose an alternative approach to detecting software ...
Secure Application Programming in the presence of Side Channel Attacks

Secure Application Programming in the presence of Side Channel Attacks

This paper introduces a collection of secure programming patterns for security critical ...
Practical steps to evaluate and protect Secure Boot implementations on embedded devices

Practical steps to evaluate and protect Secure Boot implementations on embedded devices

This paper reveals common weaknesses in Secure Boot implementations and proposes practical ...
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

Fast and Memory-Efficient Key Recovery in Side-Channel Attacks

This work aims to bridge the gap between theory and practice in key enumeration and puts ...
Risk mitigation for sensitive applets in a multi-application context

Risk mitigation for sensitive applets in a multi-application context

We explain security guidelines proposed by Global Platform and introduce a new Riscure product ...
Unboxing the White-Box

Unboxing the White-Box

This publication discusses the nuances and challenges associated with white-box testing ...
Practical optical fault injection on secure microcontrollers

Practical optical fault injection on secure microcontrollers

In this article we focus on optical fault injection, a semi-invasive fault injection attack ...

Please enter your email for access

By entering your email, you also sign up for occasional updates. After providing your email, you will have immediate access to all publications & webinars.

By checking this box you agree to process your data according to Riscure's privacy policy:

You have Successfully Subscribed!