We believe in Security by Design. We believe in Trusted Devices.

ABOUT US

Based in Sophia Antipolis, one of the French main Technology Technopoles, Texplained was created in 2013 to fill the need for a better evaluation and protection of chips against counterfeiting and piracy.

With a unique experience & knowledge combining IC hacking and digital circuits designing, we address the security of chips at every stage of their lifecycle.

A team of technical experts in several complementary fields of application make this great work possible:

  • Our Software team develops our cutting-edge / innovative tool for reverse engineering automation
  • Our Hardware guys explore ICs with the help of our sw, accompany customers in their developments and develop new hardware countermeasures
  • Our Lab crew focuses on preparation of chips for their exploration

 

 > CONTACT US

 

EFFICIENCY & CUSTOMIZATION

WE CREATED A UNIQUE SOFTWARE

IC Reverse-Engineering Automated

Discover CHIPJUICE

Our METHODOLOGY

A unique approach

Discover

WHAT WE PROPOSE

EVALUATIONS

 

  • Security explorations: from specific targeted Risk Assessment to complete evaluation of a chip
  • Investigation when IP infringement is suspected & provision of a technical proof usable in case of litigation
  • In-depth IC exploration for Hardware Backdoor detection
  • Analysis of Pirate Devices for targeted actions to fight against unfair & illegal competition
  • Recovery of obsolete IC‘s internal and accompaniment on its replacement

 SECURE IPs

 

  • World’s first Hardware IPs offering Security by Design
  • Based on our unique expertise in real world pirate attacks
  • Trusted efficiency protecting the embedded code and data
  • Highly integrated and adaptable to any chip’s architecture
  • Finely customizable for each application’s need for security
  • Using a negligible surface area and power consumption
  • With no impact on the chip’s performance

TRAININGS

 

  • Learn about IC Reverse Engineering techniques
  • Discover real world pirates attacks used for IC’s code extraction
  • Become familiar with chip’s depackaging, delayering and imaging in our lab
  • Get trained by experts in IC hacking and FA dedicated to Reverse Engineering
  • Jump in even if you are a newby in hardware security
  • Different options available: in conferences, in Texplained’s office, onsite
  • Ask for a customized training fine-tuned to your need

WHAT WE PROPOSE

FOR

  • A Valuable knowledge on threats to device’s secrets confidentiality
  • A Customized accompaniment by a trustable partner on your security needs
  • A Control of your device’s security at every stage of its lifecycle
  • An Efficient answer to your current security breaches
  • A solution to protect your assets (Hardware IPs, Embedded code, etc.)
  • A better control of the supply chain (Hardware Trojans)
  • A way to fight against piracy even when the device is already in the field

=> IN THE END, A BETTER COMPREHENSION AND A BETTER PROTECTION

There was a first blast when we realized what pirates can actually to do on chips. Then Texplained brought to us a deep understanding of the threats to our devices. The next step will be to bring a better security to our solution, in order to ensure confidentiality to our data.

Miguel

Confidential

FIND US ON

| | |