Embedded Security Watch
- State-of-the-art synthesis of attacks/countermeasures and on any new security topic
- Independent audit of published attacks and practical feasibility report
- Security trend newsletter report
Because threats are constantly evolving, Secure-IC keeps long-term relations with all its clients to maintain the highest level of threat protection and awareness.
At the early stage of a project, Secure-IC offers trainings on security certification and good practices to build a secure architecture.
During the specification stage, we accompany our clients in the definition of their technological needs according to the desired security level and in the construction of a security architecture fitting them.
During our clients SoC design phase, Secure-IC can also achieve system level review to highlight potential weaknesses in implementation and propose guidance and countermeasures to enhance the security.
Security Trend Newsletter Reports
Expertyzr: Security reports from the Security Science Factory by Secure-IC
Secure-IC offers you the opportunity to get access to its line of State-of-the-art reports, redacted by its security experts, daily involved in research, development and consulting activities, with real hands-on knowledge of the covered subjects. The reports contain thorough analysis and essential information that will help readers build up-to-date knowledge of the covered subject, and enable them to make informed decisions pertaining to hardware security.
These reports are regularly updated to take into account the latest advances in the covered subjects.
Secure-IC can also provide custom-made reports on request, as well as on-site or remote workshops, training sessions and presentations.
If you previously already ordered a version of any of the listed reports in the past and would be interested in an update, please contact our company to talk about it.
Secure-IC’s available reports (custom reports are available upon request):
- State-of-the-art on recent powerful attacks
This report provides the ten most prominent attacks on embedded systems in terms of operational impact, which were published recently.
- State-of-the-art on Hardware Trojans
This document provides an overview of the security issues related to Hardware Trojans. The scope of this study is: “Extensive view of Hardware Trojans threat, status in research, countermeasure implementation trends”.
- State-of-the-art on attacks relevant to automotive systems
We present the different state-of-the-art approaches tackling system safety, system cyber-security and in a broader sense system security. We review and explain similarities and discrepancies between them. We also present innovative methodologies which aim at combining in symbiosis security and safety during the whole design flow, and list some detailed attack scenarios.
- State-of-the-art of countermeasures in automotive
This deliverable guides the reader into the wealth of protection options which exist today.
- State-of-the-art of security evaluation and validation techniques for automotive
This document explores practical tests that are performed during the validation phase (bottom to top-right in the V-diagram of design development). We also detail few tests and evaluations which help increase the assurance in the sufficiency and the correctness of the protection functions.
- State-of-the-art on cyberattacks and software and hardware countermeasures
This report presents cyberattacks and lists a number of hardware and software countermeasures, proposed for major microprocessor architectures, either implemented by the industry and currently in use, or proposed in academic literature by academic research group.
- State-of-the-art Post Quantum Cryptography
The next generation of cryptography is here. In fact, with the coming soon of quantum computers,modern cryptographic algorithms are threatened. Actually, those computers allow simplifying the computation of complex mathematical problems supposed to be robust for the time being. For this reason, the need for new resistant algorithms becomes clear and even mandatory. For this purpose, the NIST is about to select the next candidates. This consultation report will provide you with everything you need to learn about post-quantum cryptography (PQC) such as the taxonomy of algorithms, their implementation, analysis, and the state-of-play of NIST competition.
Are you interested in a report? Please contact us: corporate-marketing[AT]secure-ic.com