Chat with us, powered by LiveChat

Arep Center

1, Traverse des Brucs 

06560 Valbonne

Sophia Antipolis – International Technopole

Contact us

+33 489 688 320

SECURE IC REVERSE ENGINEERING & DATA EXTRACTION

    TRAININGS – TOOLS – SERVICES    
FIND OUT

TEXPLAINED IS PROUD TO BE PART OF 2 MAJOR EUROPEAN PROJECTS:

HARDWARE EXPLORATION & PROTECTION

We are experts in Integrated Circuits (IC) Reverse Engineering and security.

We can support you at any stage of your product’s lifecycle:

=> In-depth Custom Hardware Explorations for:

Data extraction for Forensics purposes

– In-depth exploration for Hardware Backdoor detection

Evaluation of ICs resiliency against hardware attacks

IP Infringement investigation & technical proof

Pirate Devices analyses & support for content protection

IC obsolescence management

=> Trainings

=> Accompaniment on early stage of Secure ICs Architecture and Design to tape out

=> Anti-counterfeiting & anti-piracy digital IPs

=> Online Resources

=> Lab services:

– Failure Analysis tasks

– Deprocessing and high resolution imagery of ICs internal architecture

Suscribe to our newsletter

  • Latest Researches on Hardware piracy & Security
  • Cutting-edge Reverse Engineering Tools
  • State of the Art Sample Preparation Processes
  • Up to Date & High Level skills in Hardware & Software

%

TRUSTABLE

%

UNIQUE EXPERTISE

> 12 YEARS OF EXPERIENCE IN HARDWARE SECURITY INDUSTRY & REAL WORLD PIRATE ATTACKS

THEY SPEAK ABOUT US

2023/09/11 – ORSHIN – Video Presentation

ORSHIN: Open-source ReSilient Hardware and software for Internet of thiNgs (Project funded by Europe)Watch this 2' Video presenting ORSHIN project, which goal is to create the first generic and integrated methodology, called trusted lifecycle, to develop secure...
Discover the article

2023/09/03 – Read our paper! RISC-V: 3 countermeasures to prevent from linear code extraction

"Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core"Our paper, presented, demonstrated and published at 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), is now readable on IEEE XploreAuthors:...
Discover the article

2023/04/17 – Lightweight Countermeasures Preventing Against Linear Code Extraction Attacks on a RISC-V

HOST, San José, 1-4 May 2023Partners Mines Saint-Etienne, CEA Leti and Texplained will present a paper and a practical demo of a physical attack allowing extraction of encrypted chips and 3 different countermeasures to prevent from them.   There are 2...
Discover the article

2023/03/03 – Practical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier

See how Reverse Engineering is used to create compatible printer cartridges, console remote controllers and other peripherals. From Sample preparation, to reverse engineering, countermeasures circumventing and hack strategization and operation, a concrete case study...
Discover the article

2022/12/16 – Report – Counterfeit, Clones and Genuine Printer Cartridges – HP

As an independent expert lab in IC security, Texplained was mandated by HP Legal Teams to compare Counterfeits, Clones & Genuine Printer Cartridges.The operation consisted in plugging in the different cartridges, observing the behavior of the printers, and...
Discover the article

Texplained is hiring!

Failure Analysis Engineer