default banner

Pen-testing (penetration testing)

Security exercise where a cyber-security expert attempts to find and exploit vulnerabilities in a computer system. The purpose of this simulated attack is to identify any weak spots in a system's defenses which attackers could take advantage of.

Physically Unclonable Function (PUF)

Physically Unclonable Functions or Physical Unclonable Functions are functions implemented in a device that is produced or configured with the security objective that random fluctuations in the production process lead to different behaviors and are difficult to reproduce physically. PUF is usually used to generate keys

POCGI (Power & Clock Glitch Injector)

POwer and Clock Glitch Injector (POCGI) is a solution of Secure-IC used to perform modifications of voltage and clock frequency such as underfeeding (voltage can be finely tuned to a lower value to make the target more sensitive to injection keeping the target fully functional), Power Glitch (sudden modification of the system power supply modifies the behavior of the target which will not work properly) and Clock Glitch (frequency change of the internal clock for a short period generates errors).

Probing

Attack methodology consisting in reading the values that can be transmitted on a wire in the electronic system, this can be done for example with a focused ion beam

Public Key Infrastructure (PKI)

Set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption. The purpose of a PKI is to facilitate the secure electronic transfer of information for a range of network activities such as e-commerce, internet banking and confidential email.

Contact