esNews — January 2025

esNews — January 2025


Chip Security

Join our webinar

This year, we're planning several webinars on chip security and binary security, packed with expert insights and live demos.

The first session covers an introduction to side-channel attacks and takes place on February 6th, in collaboration with HandsOnTraining .

We’re approaching 100 attendees, so secure your spot now before we fill up! ??

→ Register now



Performance matters in side-channel analysis

Years after years, we keep highlighting the importance of performance in side-channel analysis, and the importance of benchmarking different solutions to understand how they measure up. As attacks become more sophisticated, speed and efficiency are more important than ever.

This year, we’re taking performance to the next level, relying on Rust when and where it matters.

While we’re working on these new improvements, you can see how efficient our tools were in our last comparisons. Want to race us like others did since then (and quite efficiently ??)? Our methodology is available. ?

→ Check out our benchmarking of side-channel solutions



?? Side-channel attacks on Elliptic Curve Cryptography

We are expanding our solutions to help you analyze and protect elliptic curves from side-channel attacks. Recent additions include materials on Projective Coordinates Leakage and Refined Power Attacks on EC-DSA, offering deeper knowledge, tooling and an unmatched catalog of attacks on ECC cryptography.

Our training program on elliptic curves offers a structured learning path for all levels, covering fundamental principles, techniques, and countermeasures. A new starter kit provides hands-on exercises for testing real attack methods, while our Knowledge Center now features a compilation of notebooks exploring key attack techniques, including horizontal and cross-correlation analysis, projective coordinate leakage, and power analysis on Montgomery Ladder implementations.

→ Contact our experts to know more




Binary Security

Time travel analysis vs traditional debuggers

Our latest blog explores the differences between time travel analysis in esReverse and traditional debuggers like GDB, WinDBG, and IDA Pro. Understand how time travel analysis allows you to go further, impacting efficiency, reproducibility, and debugging precision in ways conventional approaches cannot.

→ Read the blog post



Lightweight tracing and full-system emulation on esReverse

Take your binary analyses further with advanced emulation capabilities. Use frameworks like QEMU, Unicorn, and Qiling for flexible execution, combined with Frida for lightweight instrumentation and tracing.?

When deeper system insights are needed, esReverse supports full-system emulation of Windows, Linux, and Android, enabling analysis and debugging without physical hardware.

→ See eReverse in action



See you at Insomni'hack!

We’re heading to Insomni’hack this March in Switzerland, and we’ve got something special up our sleeves...

Yes, our end-to-end exploit demo on the Tenda AC15 router, and yes, a side-channel analysis demo on the Google Pixel 8, but also… our own CTF?! The project is in progress, and it’s going to be super cool, so follow our page and subscribe to the newsletter to stay updated!


要查看或添加评论,请登录

eShard的更多文章

社区洞察

其他会员也浏览了