esNews — Recap 2024

esNews — Recap 2024

We're kicking off 2025 with our very first LinkedIn Newsletter. After an eventful 2024, it's a pleasure to connect here and share updates that reflect our journey. This newsletter will arrive monthly, packed with insights and updates. Make sure you subscribe to keep up with all our news! ??



Introducing esReverse

Last year was a landmark year with the launch of esReverse, our advanced binary analysis platform. esReverse transforms how teams collaborate by centralizing tools, knowledge, and analysis into one shared platform. With features like full system emulation for Windows, Linux, and Android, it enables advanced Time Travel Debugging, which allows you to navigate backward and forward through persistent runtime data to investigate system states with precision.

We've received fantastic feedback and are excited about the new features coming in 2025.?

→ See esReverse in action



We achieved iPhone emulation

Our dedication to innovation led to a significant advancement in iPhone emulation last year. We achieved full iOS emulation leveraging open-source technologies, specifically on QEMU. This development opens new doors for advanced analysis features to iOS systems, including time travel analysis, which was previously not accessible to many researchers and developers.

→ Read our announcement on this development




esDynamic 2024

Our flagship platform, esDynamic, got major upgrades in 2024, with a strong focus on effective collaborations between experts. It now includes the bench manager feature to connect and manage hardware tools seamlessly and keep their configuration and the knowledge centre feature to dive into large volumes of Jupyterlab notebooks. These enhancements streamline your attack workflow — from data acquisition to exploitation — and our enriched knowledge center supports your research every step of the way.

→ See esDynamic in action



Expanding our hardware products

Following the success of our EMFI probe kit, we expanded our range of hardware solutions with tools like the Pattern Detector and our own hardware bench, designed to equip labs with the most advanced security testing technologies. Our hardware solutions are backed by comprehensive support and a wealth of knowledge, ensuring you have everything you need for effective security testing.

→ Connect with our experts to enhance your security testing capabilities



Advancing Post-Quantum Cryptography and ECC

We’re driving innovation in side-channel analysis with advanced tools for Post-Quantum Cryptography (PQC) and Elliptic Curve Cryptography (ECC). Our platform is a unique resource for building in-house expertise, offering mathematical knowledge to understand new algorithm concepts, data sets for experimenting with security analyses, and attack techniques and leakage analyses to challenge and strengthen implementations.

→ Unlock in-depth resources to master PQC and ECC techniques



Collaboration with Ansys

Our collaboration with Ansys is redefining hardware security, combining their pre-silicon testing tool, RedHawk-SC Security, with our years of post-silicon testing expertise. This partnership completes the security testing cycle, preparing us all for more secure futures.

→ Read about this partnership



eShard around the globe

We had the privilege of participating in several key industry events worldwide last year, like RSA Conference , IEEE HOST Symposium , FPGA Conference, CHES, ICMC, ICCC, and PAINE. These events were not only fantastic for gaining insights but also for connecting with many of you. Did we meet at one of these events? Drop a comment!



Blog highlights ??

Our blog has been buzzing with activity, featuring several impactful series that have caught the attention of our community:


  • Tenda AC15 Firmware Vulnerabilities: Our recent analysis explores the CVE-2024-2815 vulnerability in the Tenda AC15 router. | Written by Pierre Mondon and Yoan LEFEVRE .

→ Learn more about our findings


  • MCUboot, The Final Part: This series evaluates the resilience of MCUBoot v1.9.0 against fault injection attacks. | Written by Guillaume VINET .

→ Explore our in-depth analysis


  • Expert Review: In collaboration with PQShield , we periodically dive into complex topics on PQC, offering expert-backed insights.?

→ Dive into our Expert Reviews


  • SCA on FPGAs: We provide insights into our analysis that led to the full secret exposure on unprotected AES 256 embedded in an FPGA. | Written by Damien J. and Clément Gaine .

→ Read about our SCA findings



As eShard celebrates ten years in 2025, we’re excited about the future. Looking forward to another great year!

要查看或添加评论,请登录

eShard的更多文章