hardware-security-company.png

Arep Center 1, Traverse des Brucs  06560 Valbonne Sophia Antipolis – International Technopole

ContactContact us +33 489 688 320

SECURE IC REVERSE ENGINEERING & DATA EXTRACTION

TRAININGS – TOOLS – SERVICES

FIND OUT

TEXPLAINED IS PROUD TO BE PART OF MAJOR EUROPEAN PROJECTS2 MAJOR EUROPEAN PROJECTS:

HARDWARE EXPLORATION & PROTECTION

We are experts in Integrated Circuits (IC) Reverse Engineering and security. We can support you at any stage of your product’s lifecycle: => In-depth Custom Hardware Explorations for: – Data extraction for Forensics purposes – In-depth exploration for Hardware Backdoor detectionEvaluation of ICs resiliency against hardware attacks – IP Infringement investigation & technical proof – Pirate Devices analyses & support for content protection – IC obsolescence management => Trainings => Accompaniment on early stage of Secure ICs Architecture and Design to tape out => Anti-counterfeiting & anti-piracy digital IPs => Online Resources => Lab services: – Failure Analysis tasks – Deprocessing and high resolution imagery of ICs internal architecture

IC_LAB

Suscribe to our newsletter

  • Latest Researches on Hardware piracy & Security
  • Cutting-edge Reverse Engineering Tools
  • State of the Art Sample Preparation Processes
  • Up to Date & High Level skills in Hardware & Software

%

TRUSTABLE

%

UNIQUE EXPERTISE

> 12 YEARS OF EXPERIENCE IN HARDWARE SECURITY INDUSTRY & REAL WORLD PIRATE ATTACKS

THEY SPEAK ABOUT US

ORSHIN

2023/09/11 – ORSHIN – Video Presentation

ORSHIN: Open-source ReSilient Hardware and software for Internet of thiNgs (Project funded by Europe)Watch this 2' Video presenting ORSHIN project, which goal is to create the first generic and integrated methodology, called trusted lifecycle, to develop secure...
Discover the article
Linear Code Extraction

2023/09/03 – Read our paper! RISC-V: 3 countermeasures to prevent from linear code extraction

"Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core"Our paper, presented, demonstrated and published at 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), is now readable on IEEE XploreAuthors:...
Discover the article
FPGA Picture

2023/04/17 – Lightweight Countermeasures Preventing Against Linear Code Extraction Attacks on a RISC-V

HOST, San José, 1-4 May 2023Partners Mines Saint-Etienne, CEA Leti and Texplained will present a paper and a practical demo of a physical attack allowing extraction of encrypted chips and 3 different countermeasures to prevent from them.   There are 2...
Discover the article
Invasive Attacks

2023/03/03 – Practical Invasive Attacks, How Hardware is Hacked For Compatible Product Creation by Thomas Olivier

See how Reverse Engineering is used to create compatible printer cartridges, console remote controllers and other peripherals. From Sample preparation, to reverse engineering, countermeasures circumventing and hack strategization and operation, a concrete case study...
Discover the article
Print Color

2022/12/16 – Report – Counterfeit, Clones and Genuine Printer Cartridges – HP

As an independent expert lab in IC security, Texplained was mandated by HP Legal Teams to compare Counterfeits, Clones & Genuine Printer Cartridges.The operation consisted in plugging in the different cartridges, observing the behavior of the printers, and...
Discover the article

Texplained is hiring!

Failure Analysis Engineer