Chipset/SOC penetration testing

Riscure Chipset Penetration testing is tailored to the needs of chipset manufacturers who would like to evaluate risks of an actual attack in-the-wild. Based on our strong expertise in both software and hardware security, we continuously innovate to take in account the constantly evolving security landscape, as well as your needs.

This service can be delivered in one of two packages so that you can tailor the evaluation focus and budget to your needs. Please select the options in the form below and feel free to get in touch with us, should you have any questions.

What do you get?
The penetration testing results give an indication how your product stands against known and emerging attacks from a ceratin class. It allows you to develop fixes or mitigations, when deemed required, to prevent any exploitation in the field that could impact your business.  Beyond improving the security of your current product, Riscure can also advise on further technical improvements. The provided input helps to raise security awareness among your developers and also reduces the cost of security vulnerabilities in future development.

Why Riscure?
Riscure differentiates itself from other labs with its extensive knowledge on embedded and chipset security and by performing thorough and innovative security evaluations in an efficient manner. Based on the effectiveness of our service, we pride ourselves in typically having long term relationships with many of our customers.  We will be happy to demonstrate that we can also exceed your expectations. 

Our Approach
The penetration testing starts with information gathering to understand the target, threat model and attack mitigation mechanisms. This is followed by the testing of the target which can include logical, fault injection and side channel attacks, depending on the threat model and your requested option. In order to compromise the integrity, confidentiality or availability of the assets, we typically try to bypass existing protection measures such as Secure Boot implementation or retrieve secrets such as cryptographic keys.

Options

Option

Option

Option

Option

Option

Option

Option

Option