top of page

.png)

Embedded
Security
For
Everyone

_edited.png)
Embedded Security Isn't Easy
You might assume that following manufacturer recommendations and industry best practices will be enough to secure your embedded system. But did you know that attackers can use power analysis to recover encryption keys from both hardware and software AES implementations? Or that fault injections can be used to bypass state of the art secure boot implementations?
We are here to help you learn the fundamentals, test your system, and understand the threats facing your embedded hardware security implementations.
.png)
AVAILABLE NOW
HuskyPlus
Trigger on a matching analog waveform of up to 512 samples
A new "SAD Explorer" tool to visualize and tune SAD parameters
A new "interval threshold" property to make SAD triggering easier to tune
bottom of page