Hardware security & solutions

Services

Digital Forensics Supply Chain Verification In-Depth IC Exploration IC Obsolescence Management IP Infringement Investigation Hardware Security Evaluation Design Review Reverse Engineering Lab setup Support

Our independent laboratory service specialises in the  Reverse Engineering & Data Extraction of Integrated Circuits. We offer services to customers concerned by security evaluation, obsolescence management, supply chain verification, infringement investigation and digital forensics.

Olivier Thomas working on SEM imagery in Texplained's lab

Overview of services provided

IC Security Evaluation

Challenge: Certifications like Common Criteria, EMVCo, and FIPS assess IC security but often overlook invasive attacks, leaving chip makers and buyers uncertain about real-world protection against piracy and counterfeiting.

Our Approach: We provide end-to-end IC security analysis—imaging and reverse-engineering the chip’s internals, identifying vulnerabilities, and testing attacks when necessary. Our detailed Risk Assessment reports include images, netlists, and clear insights into weaknesses and attack methods.

Your advantage:
- Chip buyers gain technical clarity to choose secure, cost-effective solutions.

- Chip makers get a “red team” perspective, enhance anti-piracy measures, and unlock new security-focused selling points.

IC Obsolescence Management

Challenge: Critical systems—like military and industrial applications—often outlast their chips, facing early obsolescence while needing decades of operation. Designs can also be lost or damaged over time.

Our Approach: We reverse-engineer the chip’s internal hardware (GDSII, Netlist, RTL), recover its datasheet, and extract embedded code. Then, we enable replacement through emulation on a modern target.

Your Advantage: Replace a single critical component affordably, ensure system continuity, and maintain long-term customer satisfaction.

Illustration of a military vehicle in black and white with a digital microchip and arrows overlay, symbolizing electronic systems, embedded technology, and hardware reverse engineering in obsolescence management.

Supply Chain Verification

Challenge: When chip makers outsource manufacturing, hidden backdoors can be introduced—threatening brand integrity, data privacy, and safety across industries. These vulnerabilities, often added during production, allow attackers to exploit debugging access and compromise devices.

Our Approach: We compare the original GDSII design with samples from the factory. Any discrepancies trigger in-depth analysis to detect potential backdoors.

Your Advantage: Gain confidence in your supply chain with enhanced hardware security and trust.

Illustration of a person with a magnifying glass examining microchips on a circuit board, with skull icons symbolizing malware or hardware security threats.

IP Infringement Investigation

Challenge: Chip design requires massive R&D and investment for a market advantage. When your IP is unfairly exploited, your market position, time-to-market, and R&D efforts are all at risk.

Our solution: We analyze suspected integrated circuits (ICs), meticulously comparing their core functionality and layout against your IP. Our detailed technical reports provide the crucial evidence you need to support litigation, protect your innovation, and reclaim your competitive lead.

Your Advantage: Ensure complete control and protection over your semiconductor innovations, from design integrity to defending against IP exploitation.

Close-up of a computer circuit board under a magnifying glass with document and shield icons labeled “IP,” symbolizing intellectual property protection and semiconductor design security.

Digital Forensics

Challenge: Modern criminal investigations face a significant hurdle: the increasing security of devices like smartphones and crypto wallets. These "unbreakable" protections, while safeguarding personal data, also shield crucial criminal information that law enforcement agencies (LEAs) need to apprehend suspects.

Our Approach: We use our most advanced methods and constantly develop new tools to extract information directly from a device's secure elements or the ROM code on its application processor.

Your Advantage: Equip yourself to innovate and build new solutions for extracting crucial, clear evidence from the most advanced and secure devices on the market.

Illustration of a smartphone with a fingerprint icon under a magnifying glass, symbolizing digital security over a binary code background.

Tell us more about your need