eShard's Avatar

eShard

@eshard.bsky.social

Beyond testing tools, solutions that deliver expertise. ๐ŸŒ Chip & binary security testing www.eshard.com

24 Followers  |  7 Following  |  77 Posts  |  Joined: 21.01.2025  |  1.625

Latest posts by eshard.bsky.social on Bluesky


The Germanyโ€™s Agency for Innovation in Cybersecurity explains further in their blog:

๐Ÿ”—https://www.cyberagentur.de/presse/widerstandskraft-fuer-die-kryptographie-von-uebermorgen/

30.01.2026 16:24 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

eShard is proud to join the SPARTAQUS project with Bundeswehr University Munich under the German government "SCA4PQC" program.

Over the next 4 years, weโ€™ll push state of the art tooling and #PQC security testing expertise to evaluate real world implementations for side-channel leakage.

30.01.2026 16:24 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

Weโ€™re hiring at eShard โœจ
๐Ÿ”— eshard.com/careers

29.01.2026 12:48 โ€” ๐Ÿ‘ 0    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

We helped #DEKRA set up their new SoC cybersecurity lab, integrating our tools and tightening the workflow so SCA and EMFI tests are repeatable from day one.

๐Ÿ”— How we did it: eshard.com/posts/dekra-...

#hardware #cybersecurity #hardwarehacking

28.01.2026 15:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

๐Ÿ†• iOS emulator update: we now have an #AI assistant to support your iOS security investigations.

What do you think? ๐Ÿ’ฌ
Our shortlist is still ongoing: u.eshard.com/ios-emulation #ios #software #cybersecurity

20.01.2026 12:54 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Our first webinar of the year is done. Thanks to everyone who joined!

โ–ถ Up next: ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—›๐—ฎ๐—ฟ๐—ฑ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—›๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด - ๐— ๐—ผ๐—ฑ๐—ฒ๐—ฟ๐—ป ๐—ง๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€

Stay tuned, more details coming soon.
#webinar #hardware #cybersecurity

15.01.2026 17:17 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

It's this week ๐Ÿ”ฅ Register now to not miss out!

13.01.2026 15:01 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

#Webinar | Kicking off the year with hands-on fault injection on modern devices.

We will look at recent attacks on MCUs, MPUs, and FPGAs, and how FI countermeasures can be validated early in development.

๐ŸŒSession 1: u.eshard.com/m8ahb
๐ŸŒŽSession 2: u.eshard.com/TjdEa

05.01.2026 15:33 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Post image

We wish everyone happy holidays! ๐Ÿ’™

23.12.2025 14:58 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
"Early Adopter Program" shortlist โ€” iOS emulator on esReverse esReverse is a powerful collaborative platform built for binary security investigations. With dedicated dynamic analysis resources, it offers full-system emulation and Time Travel Analysis to help res...

๐Ÿ“ฉ Apply to the shortlist: u.eshard.com/ios-emulation

18.12.2025 10:56 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

Update on the iOS emulator ๐Ÿ”ฅ

Weโ€™ve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.

Still cooking, but weโ€™re getting close to sharing it with you. And more is coming with iOS26...

#ios #emulation #devsecops

18.12.2025 10:54 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image Post image Post image

We're at the AMD Security Working Group in Munich, Germany. ๐Ÿ“

#hardware #cybersecurity #pqc

09.12.2025 14:51 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image

We're on our way to Germany for the @AMD Security Working Group.

We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.

#cybersecurity #hardware #postquantumcryptography

08.12.2025 10:10 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse
YouTube video by VECTOR 35 Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse

We're live! ๐Ÿ”ด Come watch us: youtu.be/nzar2L4GUJ8

05.12.2025 15:14 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse YouTube video by VECTOR 35

๐Ÿ”ด We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: www.youtube.com/live/nzar2L4...

#cybersecurity #reverseengineering #binary #softwareengineering

05.12.2025 09:19 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Our Keccak webinar is a wrap! ๐Ÿ”ต Thank you to everyone who joined.

Ready for the next one? Tell us what you want to see next and we will make it happen. ๐Ÿ˜‰ #cybersecurity

04.12.2025 17:30 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Itโ€™s this week ๐Ÿ”ต Join us for a deep dive into Keccak and the side-channel angles behind its applications.

Register below โฌ‡
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ

#webinar #pqc #postquantum #nist

01.12.2025 13:24 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image Post image Post image

KMAC is one of the main ways Keccak is used in modern systems, which is why weโ€™re exploring it through a practical use case in our next webinar.

Choose your timeslot and register below โฌ‡
Session 1: u.eshard.com/wcUfh
Session 2: u.eshard.com/4hGSQ
#pqc #nist

27.11.2025 13:31 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

eShard and PQShield teamed up to put an ML-KEM hardware implementation through a real side-channel evaluation.

Take a look at what we found โžก๏ธ eshard.com/posts/pqshie... #pqc #postquantum #nist #hardware

26.11.2025 14:59 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Video thumbnail

A short teaser of what weโ€™ll cover in our Keccak webinar.
Weโ€™ll walk through this KMAC256 state-recovery workflow step by step during the session.

Secure your spot ๐Ÿšจ
๐Ÿญ๐Ÿฌ ๐—”๐—  ๐˜€๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป (4am EST | 5pm SGT): u.eshard.com/wcUfh
๐Ÿฑ ๐—ฃ๐—  ๐˜€๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป (4am EST | 5pm SGT): u.eshard.com/4hGSQ

#pqc #postquantum #nist

25.11.2025 16:12 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Welcome! You are invited to join a meeting: Webinar | Side-channel attacks on Keccak. After registering, you will receive a confirmation email about joining the meeting. In 2015, NIST standardized a new family of hash and extendable-output functions known as SHA-3, all built on the Keccak algorithm. Since then, Keccak has been adopted in several other standards, incl...

Want to understand how Keccak is applied and how it leaks in real scenarios? Join our webinar on December 4th.

10 am CET (4am EST | 5pm SGT) โžก u.eshard.com/wcUfh
5 pm CET (11am EST | 12am SGT) โžก u.eshard.com/4hGSQ

#pqc #nist #hardware

21.11.2025 13:32 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

Did you know?
Keccak is everywhere, quietly protecting real systems, such as:
โ€ข Connected devices checking data integrity
โ€ข Firmware updates verifying authenticity
โ€ข Embedded products securing messages
โ€ข PQC standards like ML-KEM, ML-DSA, and SLH-DSA
โฌ‡

21.11.2025 13:32 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image Post image Post image

We're at Hardwear-io in the Netherlands ๐Ÿ‘‹ #cybersecurity

21.11.2025 11:02 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image Post image Post image

We're in Tokyo presenting our iOS emulator at the CODE BLUE Conference.

๐Ÿ“ฒ You can still join our early adopter program: u.eshard.com/ios-emulation #events #cybersecurity

18.11.2025 10:56 โ€” ๐Ÿ‘ 4    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?

๐Ÿ”— Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity

03.11.2025 17:20 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

D-7 for the Hardwear.io Netherlands ๐Ÿ”ฅ

We're bringing our glitching fault injection demo to show how a tiny electrical glitch can change the full behavior of a chip. See you there!

#cybersecurity #events

13.11.2025 17:46 โ€” ๐Ÿ‘ 2    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Weโ€™ve updated our Post-Quantum Cryptography catalog of knowledge and attacks.

โœ…Updated SCA and FI research on Kyber
โœ…Improved CPA on Kyber
๐Ÿ†•SASCA on Kyber targeting NTT
๐Ÿ†•Chosen ciphertext attack on Keccak in Kyber
๐Ÿ†•CPA on Dilithium

Request the full list of notebooks: www.eshard.com/contact #pqc

13.11.2025 12:40 โ€” ๐Ÿ‘ 0    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Next week weโ€™ll be at Code Blue in Japan. ๐ŸŽŒ

Come join our #CTF, AngryPangolin, for a chance to win a Binary Ninja license or a Flipper Zero.

#reverseengineering #ios #softwaresecurity

12.11.2025 10:29 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Keccak powers SHA-3, KMAC and many post-quantum algorithms, but how does it behave under side-channel analysis?

๐Ÿ”— Register here: u.eshard.com/wcUfh
Second session: u.eshard.com/4hGSQ
#webinar #pqc #nistsecurity

03.11.2025 17:20 โ€” ๐Ÿ‘ 4    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

Proud to join FORTRESS, an European Union funded project shaping Europeโ€™s quantum-secure future.

eShard contributes its expertise in side-channel and fault-injection analysis to help validate hybrid secure boot architectures.

๐ŸŒ Learn more: pq-fortress.eu

31.10.2025 14:51 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0

@eshard is following 7 prominent accounts