esNews — January 2025
Chip Security
Join our webinar
This year, we're planning several webinars on chip security and binary security, packed with expert insights and live demos.
The first session covers an introduction to side-channel attacks and takes place on February 6th, in collaboration with HandsOnTraining .
We’re approaching 100 attendees, so secure your spot now before we fill up! ??
Performance matters in side-channel analysis
Years after years, we keep highlighting the importance of performance in side-channel analysis, and the importance of benchmarking different solutions to understand how they measure up. As attacks become more sophisticated, speed and efficiency are more important than ever.
This year, we’re taking performance to the next level, relying on Rust when and where it matters.
While we’re working on these new improvements, you can see how efficient our tools were in our last comparisons. Want to race us like others did since then (and quite efficiently ??)? Our methodology is available. ?
?? Side-channel attacks on Elliptic Curve Cryptography
We are expanding our solutions to help you analyze and protect elliptic curves from side-channel attacks. Recent additions include materials on Projective Coordinates Leakage and Refined Power Attacks on EC-DSA, offering deeper knowledge, tooling and an unmatched catalog of attacks on ECC cryptography.
Our training program on elliptic curves offers a structured learning path for all levels, covering fundamental principles, techniques, and countermeasures. A new starter kit provides hands-on exercises for testing real attack methods, while our Knowledge Center now features a compilation of notebooks exploring key attack techniques, including horizontal and cross-correlation analysis, projective coordinate leakage, and power analysis on Montgomery Ladder implementations.
领英推荐
Binary Security
Time travel analysis vs traditional debuggers
Our latest blog explores the differences between time travel analysis in esReverse and traditional debuggers like GDB, WinDBG, and IDA Pro. Understand how time travel analysis allows you to go further, impacting efficiency, reproducibility, and debugging precision in ways conventional approaches cannot.
Lightweight tracing and full-system emulation on esReverse
Take your binary analyses further with advanced emulation capabilities. Use frameworks like QEMU, Unicorn, and Qiling for flexible execution, combined with Frida for lightweight instrumentation and tracing.?
When deeper system insights are needed, esReverse supports full-system emulation of Windows, Linux, and Android, enabling analysis and debugging without physical hardware.
See you at Insomni'hack!
We’re heading to Insomni’hack this March in Switzerland, and we’ve got something special up our sleeves...
Yes, our end-to-end exploit demo on the Tenda AC15 router, and yes, a side-channel analysis demo on the Google Pixel 8, but also… our own CTF?! The project is in progress, and it’s going to be super cool, so follow our page and subscribe to the newsletter to stay updated!