eShard

eShard

Sécurité informatique et des réseaux

Pessac, Nouvelle-Aquitaine 2 393 abonnés

Empowering companies to control their cyber risks.

À propos

eShard is your partner for protecting data in connected and mobile devices. eShard is an IT Security company with a strong expertise in mobile and embedded software security, hands-on cryptography side-channel, hardware fault injection, secure element, Host Card Emulation, whitebox cryptography assessment, security evaluation methodology, mobile payment, EMV security and payTV. Dedicated to promote a more secure world in a growing connected and mobile environment, eShard provides dedicated security tools, security/technical consultancy services and mobile application security enhancement.

Secteur
Sécurité informatique et des réseaux
Taille de l’entreprise
11-50 employés
Siège social
Pessac, Nouvelle-Aquitaine
Type
Société civile/Société commerciale/Autres types de sociétés
Fondée en
2015
Domaines
mobile application security audit, consulting, internet of things, cryptography side-channel, embedded software security, HCE, whitebox cryptography assesment, mobile payment, EMV security, payTV, MAST, iOS, Android, Mobile App Security Testing et OWASP

Lieux

Employés chez eShard

Nouvelles

  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    The OPTIMIST initiative is shaping the future of open-source standards for the physical evaluation of ICs, and eShard is proud to be part of this important effort alongside other key players in the community. 🌐 Our expert Aurélien VASSELLE will be giving a talk on "Open API for Trace Data Format," sharing valuable insights. You’re more than welcome to join us and be part of the conversation! To participate, simply sign up using the link below. 👇 https://lnkd.in/eJAqSzWD Big shoutout to Patrick Schaumont, Fatemeh (Saba) Ganji, Aydin Aysu, and Trey Marcantonio for bringing everyone together for such an impactful initiative. Looking forward to seeing you there!

    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    Get ready — this year’s hardwear.io Europe is going to be one to remember, and we’re thrilled to be a part of it! We’ll be doing a live side-channel attack demo on a smartphone. It’s a hands-on look at how we push the limits of hardware testing. Meet the team bringing all this expertise to the event: 𝐂𝐡𝐢𝐩 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Lionel RIVIERE Fabien Bouffard Adam Medragh 𝐁𝐢𝐧𝐚𝐫𝐲 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 Pierre Mondon Jan Albert Jager If you’re around, definitely swing by. See you there! hardwear.io - Hardware Security Conference and Training

    • Aucune description alternative pour cette image
    • Aucune description alternative pour cette image
    • Aucune description alternative pour cette image
    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    Together, we’re paving the way for stronger semiconductor security. By joining forces, eShard’s expertise in post-silicon chip security testing and Ansys’s leading pre-silicon technology are helping the semiconductor industry step into a new era of comprehensive security testing. From identifying risks during the design phase to validating security after production, we’re covering the entire lifecycle of semiconductor development. Want to know more about what this partnership means for the future of chip security? 👉 Check out our latest blog post: https://lnkd.in/eXP5EqtF

    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    Excited to partner with Ansys to deliver security solutions for the semiconductor industry through pre- and post-silicon testing. Stay tuned for our upcoming blog post where we’ll dive into what this partnership means for the future of chip security.

    Voir la page d’organisation pour Ansys Semiconductors, visuel

    6 807  abonnés

    Ansys and eShard have just unveiled an exciting new partnership aimed at delivering a state-of-the-art hardware security solution for semiconductor products. 🌐🔒 This collaboration represents a major advance in protecting semiconductor designs from evolving threats. By merging Ansys's leading simulation technology with eShard’s top-tier security expertise, this alliance is set to provide unparalleled protection and resilience for crucial hardware components. Key benefits include: 🔹 Enhanced security protocols for semiconductor designs 🔹 Advanced simulation and analysis tools to preemptively address vulnerabilities 🔹 Robust solutions to mitigate risks and ensure compliance with industry standards As the demand for secure and reliable semiconductor products continues to grow, this joint effort underscores the commitment to advancing hardware security and innovation. Stay tuned for more updates as #Ansys and #eShard work together to set new benchmarks in semiconductor security! Read more about this exciting development here: https://ansys.me/4eU43rz #multiphysics #semiconductors #CyberSecurity

    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    Embarking on a journey to crack AES-256 encryption on an FPGA taught us that sometimes the path isn't straightforward. 🚧 We started with a clear goal but faced unexpected challenges that required us to rethink our strategy. Our breakthrough not only led us to recover the key but also emphasized the importance of understanding the hardware's nuances. So what does this mean? It means that in the world of cybersecurity, adaptability and deep analysis are key to overcoming obstacles and enhancing security measures. Read how we navigated these obstacles and why our discovery is significant: https://lnkd.in/enS-HQx3 #Cybersecurity #FPGA #AES256 #Encryption Clément Gaine Damien J.

  • eShard a republié ceci

    Voir le profil de Guillaume VINET, visuel

    Senior Expert in Embedded System Cybersecurity

    💣 When dealing with an NFC card, one might want to attack it with fuzzing by using a card reader to target its communication protocol: - Sending well-formatted commands, but at unexpected times - Sending poorly formatted commands, such as introducing inconsistencies between the field indicating the command size and the command itself. - Mixing both scenarios ❓ But are you sure that the malformed command will actually be received by the card? And if it is, will you be able to capture the card's unusual response? 💬 The problem between your command and its reception by the card lies in the multiple layers it must pass through: - Your PC software might reject the command before it even reaches the reader. - Or it could be the reader's firmware that refuses to send the command. That's why we need a "transparent reader" – something that performs the absolute minimum interaction between the two. Let's explore how to accomplish this with the Flipper Zero here: https://lnkd.in/dqY2-zcy #NFC #Hacking #FlipperZero

    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    We’re kicking off Cybersecurity Awareness Month on the right foot! It’s now time for Europe to attend hardwear.io - Hardware Security Conference and Training on October 24-25, and we’ll be there! 🛠 𝐇𝐚𝐫𝐝𝐰𝐚𝐫𝐞 — With the esDynamic platform, hardware services, and our lab, we’ll show how to test chips against physical attacks. 💻 𝐅𝐢𝐫𝐦𝐰𝐚𝐫𝐞 — Using the esReverse platform and our binary expertise, we’ll dive into deep binary analysis and show how it can streamline your work. We’ll be doing live demos too, so if you’re around, come by and let’s chat about how we can help secure your hardware and software systems from top to bottom. Can’t wait to see everyone there! 👋 #CyberSecurityAwarenessMonth #HardwareSecurity #ChipSecurity #BinarySecurity #HardwareIO #Cybersecurity

    • Aucune description alternative pour cette image
    • Aucune description alternative pour cette image
    • Aucune description alternative pour cette image
  • Voir la page d’organisation pour eShard, visuel

    2 393  abonnés

    Our team just completed an in-depth analysis of the CVE-2024-2815 vulnerability in the Tenda AC15 router. Read it here: https://lnkd.in/ebEicd2r Using #Qiling and esReverse, we emulated the firmware and applied time travel analysis to uncover a stack-based buffer overflow. In our blog post, we walk you through the steps we took: • 𝐅𝐢𝐫𝐦𝐰𝐚𝐫𝐞 𝐞𝐱𝐭𝐫𝐚𝐜𝐭𝐢𝐨𝐧 🗂️ How we unpacked and explored the Tenda AC15 firmware filesystem • 𝐄𝐦𝐮𝐥𝐚𝐭𝐢𝐨𝐧 𝐰𝐢𝐭𝐡 𝐐𝐢𝐥𝐢𝐧𝐠 🖥️ Setting up the environment to emulate the router's web interface • 𝐓𝐢𝐦𝐞 𝐭𝐫𝐚𝐯𝐞𝐥 𝐰𝐢𝐭𝐡 𝐞𝐬𝐑𝐞𝐯𝐞𝐫𝐬𝐞 🕰️ Applying time travel analysis for deeper insights into the vulnerability • 𝐑𝐞𝐩𝐫𝐨𝐝𝐮𝐜𝐢𝐧𝐠 𝐭𝐡𝐞 𝐯𝐮𝐥𝐧𝐞𝐫𝐚𝐛𝐢𝐥𝐢𝐭𝐲 🎯 Step-by-step guide on how we replicated the issue • 𝐀𝐧𝐚𝐥𝐲𝐬𝐢𝐬 𝐚𝐧𝐝 𝐟𝐢𝐧𝐝𝐢𝐧𝐠𝐬 🔐 What we discovered and why it matters for cybersecurity Kudos to Pierre Mondon and Yoan LEFEVRE for their dedication and expertise! #Cybersecurity #ReverseEngineering #Firmware #Tenda

    • Aucune description alternative pour cette image

Pages affiliées

Pages similaires

Parcourir les offres d’emploi