eShard
banner
eshard.bsky.social
eShard
@eshard.bsky.social
Beyond testing tools, solutions that deliver expertise.
🌐 Chip & binary security testing
www.eshard.com
Next week we’ll be at Code Blue in Japan. 🎌

Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.

#reverseengineering #ios #softwaresecurity
November 12, 2025 at 10:30 AM
Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?

🔗 Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity
November 3, 2025 at 5:20 PM
Proud to join FORTRESS, an European Union funded project shaping Europe’s quantum-secure future.

eShard contributes its expertise in side-channel and fault-injection analysis to help validate hybrid secure boot architectures.

🌐 Learn more: pq-fortress.eu
October 31, 2025 at 2:51 PM
If you’ve been following our recent events, you’ve seen how our Pattern Detector proved its capabilities, now working on electromagnetic (EM) signals as well as power.

We’ll be demonstrating it again at Hardwear.io in the Netherlands this November.

👉 Contact us to order yours today: www.eshard.com
October 29, 2025 at 3:35 PM
Our EMFI probe kit has already proven to be a favorite with analysts, and now it’s getting even better.

We’ve added three new hand-wound probes in a deeper cylindrical format, and a brand-new body bias injection (BBI) module.

→ Contact us to pre-order: www.eshard.com/contact
October 27, 2025 at 9:49 AM
A new post-quantum hero has arrived. 🦸‍♂️

Meet HQC, the backup superhero chosen by NIST to defend our AES keys when quantum computers rise.

Learn its origin story (and check our educational Python implementation): eshard.com/posts/superh...
October 24, 2025 at 9:02 AM
Reposted by eShard
A step towards secure communications 🔒💪
eShard won the European Space Agency tender to supply a Hardware Security Laboratory at ESTEC.
The lab covers Side-Channel Analysis, Electromagnetic Fault Injection, and voltage and clock glitching.

Read more: eshard.com/posts/esa-es... #hardware #cybersecurity
October 22, 2025 at 11:49 AM
eShard won the European Space Agency tender to supply a Hardware Security Laboratory at ESTEC.
The lab covers Side-Channel Analysis, Electromagnetic Fault Injection, and voltage and clock glitching.

Read more: eshard.com/posts/esa-es... #hardware #cybersecurity
October 22, 2025 at 9:47 AM
Hello from Songdo, South Korea, at the ICCC Conference 👋🔬
October 21, 2025 at 12:30 PM
You’ve followed the journey since our first QEMU boot logs. Now it’s time to open the doors: the iOS emulator will be available for early access.

📩 Apply to the shortlist. u.eshard.com/ios-emulator...

Limited time and spots.
#ios #cybersecurity #emulation
October 7, 2025 at 2:03 PM
Everyone thought the “hedged” mode of ML-DSA (Dilithium) fixed fault attacks. New research presented at CHES shows that’s not the case. A "fault then correct" trick still works.

We break it down in our latest Expert Review. ➡️ eshard.com/posts/expert...

#pqc #postquantumcryptography #cryptography
October 3, 2025 at 9:42 AM
On Oct 23rd, we’re going live for a deep dive into the latest SCA techniques and the countermeasures vendors are using.

10:00 CEST (4 AM EST • 4 PM SGT) → u.eshard.com/webinar-sca-...
17:00 CEST (11 AM EST • 11 PM SGT) → u.eshard.com/webinar-sca-...
#hardware #cybersecurity
September 29, 2025 at 12:32 PM
🚀 We’re live from #CHES25 in beautiful Kuala Lumpur!
September 15, 2025 at 11:03 AM
Windows 11 in esReverse. 💻 Full system emulation to boot, record, and rewind your analysis from kernel to userland.

Read the guide: eshard.com/posts/window... #windows #emulation #reverseengineering
September 9, 2025 at 11:43 AM
Malware doesn’t like being watched. 👾 That’s why so many samples try to detect if they’re running inside a virtual machine and change behavior to fool analysts.

We explored these anti-VM techniques on our latest blog: eshard.com/posts/window...
And how to bypass them.
#reverseengineering #malware
September 2, 2025 at 2:24 PM
Packing for CHES 🧳👨‍💻
Bringing our Pattern Detector demo (side-channel spotting made easier) and the new ML-KEM (Kyber) starter kits.

Come say hi if you’re around. #pqc
September 1, 2025 at 4:36 PM
Our Windows CTF is coming to Nullcon in Berlin, Sept 4-5 🎯 github.com/eshard/TTA-CTF

Play for a chance to win a Binary Ninja license or a Flipper Zero.

#CTF #FlipperZero #windows #reverseengineering
August 14, 2025 at 9:41 AM
esReverse now supports Windows 11 up to the May 27, 2025 update (24H2 Build 26100.4066).

Our blog post shows how to create a Windows 11 VM and run it in esReverse for full system emulation. → eshard.com/posts/window...

#windows11 #ReverseEngineering #emulation #cybersecurity
August 12, 2025 at 11:49 AM
iOS 18 is now starting to run in our QEMU-based emulator. Want the full story of how we got here?

Part 1 • From black screens to first UI
eshard.com/posts/emulat...
Part 2 • From setup to apps and network
eshard.com/posts/emulat...

#ios #iphone #emulator #mobilesec #devsecops
August 8, 2025 at 1:14 PM
🆕 ML-KEM (Kyber) starter kits for STM32
A compact, hands-on lab that guides you through a full side-channel attack on an unprotected ML-KEM (Kyber) MCU implementation. eshard.com/contact

#postquantum #pqc #sidechannel
August 6, 2025 at 8:43 AM
Post-quantum crypto resists quantum computers, not physical attacks.

On July 10, we're live to show how SCA and FI techniques break schemes like ML-KEM, and how to protect your implementations.

Register:
🔵 11am CEST: pqshield.zoom.us/webinar/regi...
🔵 6pm CEST: pqshield.zoom.us/webinar/regi...
July 7, 2025 at 12:30 PM
Live with PQShield on July 10th to see how side-channel and fault injection break ML-KEM and what you can do to stop them.

Register now:
🔵 11am CEST: pqshield.zoom.us/webinar/regi...
🔵 6pm CEST: pqshield.zoom.us/webinar/regi...

#cryptography #cybersecurity #postquantumcryptography #pqc
June 30, 2025 at 10:53 AM
The day is approaching! Register here 👉 eshard.eventbrite.fr

#webinar #cybersecurity
June 16, 2025 at 12:32 PM
We put together summaries of some of the talks we attended at this year’s Hardwear.io USA 👉 eshard.com/posts/a-look...

#hardwaresecurity #cybersecurity
June 12, 2025 at 9:45 AM
WinDBG vs esReverse: same concept (time travel debugging), very different scope.

We break down the differences in our blog: eshard.com/posts/differ...

#windows #cybersecurity
June 9, 2025 at 11:05 AM