ABOUT US
Based in Sophia Antipolis, one of the French main Technology Technopoles, Texplained was created in 2013 to fill the need for a better security in the world thanks to exploration and protection of Integrated Circuits. With a unique experience & knowledge combining IC hacking and digital circuits designing, we address the security of chips at every stage of their lifecycle. A team of technical experts in several complementary fields of application make this great work possible:
- Our Software team develops our cutting-edge / innovative tool for reverse engineering automation
- Our Hardware guys explore ICs and extract data from them, with the help of our sw folks. They also accompany customers in their developments of new hardware countermeasures
- Our Lab crew focuses on preparation of chips for their exploration
We believe in a Secure World.
EFFICIENCY & CUSTOMIZATION
WHAT WE PROPOSE
- In-depth IC explorations: from specific targeted Risk Assessment to complete extraction of a chip and its embedded data
- Investigation when IP infringement is suspected & provision of a technical proof usable in case of litigation
- In-depth IC exploration for Hardware Backdoor detection
- Analysis of Pirate Devices for targeted actions to fight against unfair & illegal competition
- Recovery of obsolete IC‘s internal and accompaniment on its replacement
- Learn about IC Reverse Engineering techniques
- Discover real world pirates attacks used for IC’s code extraction
- Become familiar with chip’s depackaging, delayering and imaging in our lab
- Get trained by experts in IC hacking and FA dedicated to Reverse Engineering
- Jump in even if you are a newby in hardware security
- Different options available: in conferences, in Texplained’s office, onsite
- Ask for a customized training fine-tuned to your need
- World’s first Hardware IPs offering Security by Design
- Based on our unique expertise in real world pirate attacks
- Trusted efficiency protecting the embedded code and data
- Highly integrated and adaptable to any chip’s architecture
- Finely customizable for each application’s need for security
- Using a negligible surface area and power consumption
- With no impact on the chip’s performance
WHAT WE PROPOSE
FOR
- A Valuable knowledge on methods for secure IC’s data recovery
- A Customized accompaniment by a trustable partner on your needs
- A Control of your device’s protection at every stage of its lifecycle
- An Efficient answer to your current security issues
- A solution to protect your assets (Hardware IPs, Embedded code, etc.)
- A better control of the supply chain (Hardware Trojans)
- A way to fight against piracy even when the device is already in the field
=> IN THE END, A BETTER COMPREHENSION AND A BETTER PROTECTION
MiguelThere was a first surprise when we realized what pirates can actually do on chips. Then Texplained brought to us a deep understanding of the threats to our devices. The next step will be to bring a better security to our solution, in order to ensure confidentiality to our data.
FIND US ON
| | |