OUR COMPANY
> Return to Abous Us: Hardware security specialist
TEXPLAINED BLOG

OUR THOUGHTS & RESEARCHS
Lightweight Countermeasures Preventing Against Linear Code Extraction Attacks on a RISC-V
HOST, San José, 1-4 May 2023Partners Mines Saint-Etienne, CEA Leti and Texplained will present a paper and a practical demo of a physical attack allowing extraction of encrypted chips and 3 different countermeasures to prevent from them. There are 2...
read morePractical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier
See how Reverse Engineering is used to create compatible printer cartridges, console remote controllers and other peripherals. From Sample preparation, to reverse engineering, countermeasures circumventing and hack strategization and operation, a concrete case study...
read moreReport – Counterfeit, Clones and Genuine Printer Cartridges – HP
As an independent expert lab in IC security, Texplained was mandated by HP Legal Teams to compare Counterfeits, Clones & Genuine Printer Cartridges.The operation consisted in plugging in the different cartridges, observing the behavior of the printers, and...
read moreTexplained’s Expertise Serving Europe fights against crime and terrorism
Texplained Leading the Hardware Approach to Extract Essential Information for Decryption in a Major European Project Encrypted mobile phones are often a key factor in criminal cases; the data stored in these devices may contain critical evidence. With most telephones...
read moreSilicium on the Inside
You've always wanted to see what's inside an Integrated Circuit? This video shows you the internal architecture of a chip, down to its Standard Cell Library....
read morePR – Neotion partners with Texplained creating stronger Secure by Design ICs
Aubagne, France – April, 3rd, 2018 – NEOTION, a leading provider of secure solutions for Pay-Tv industry and recently targeting the IoT market, has selected Texplained, another French company with a team of experts in Secure ICs Architecture and Reverse Engineering,...
read moreOn the Impact of Placement on Integrated Circuit Reverse-Engineering
On the Impact of Placement on Integrated Circuit Reverse-Engineering Integrated Circuit (IC) Reverse-Engineering (RE) requires delayering and imagery steps. Those tasks are both challenging as the resulting pictures - made with a Scanning Electron Microscope (SEM) -...
read moreThe problem of IC counterfeiting and its solution
The problem of IC counterfeiting and its solution Clarisse GINET - CEO @Texplained Counterfeit Information and Communication Technology (ICT) goods accounted for 6.5 % of ICT global market in 2013, representing USD 143 bn of loss for the whole related industry...
read moreHow to become a silicon level security professional?
How to become a silicon level security professional? Hardware attacks are often thought to be about spying bus on a circuit board (PCB) or being about measuring an Integrated Circuit power consumption (SPA, DPA, ...) in order to extract its cryptographic keys and...
read moreBehind the horror are important and real hardware security questions
Behind the horror are important and real hardware security questions Olivier Thomas - Founder and CTO @ Texplained As CTO of Texplained but mainly as a hardware reverse-engineer, I wanted to comment on some of the recent articles I read about extracting the secrets...
read more