eShard

@eshard@infosec.exchange
51 Followers
5 Following
75 Posts
Beyond testing tools, solutions that deliver expertise.
πŸ”’ Chip Security TestingSide-Channel, Fault Injection, Failure Analysis
🌐 Binary AnalysisVulnerability & Malware Research
Websitehttps://eshard.com/
We wish everyone happy holidays! πŸ’™
πŸ“© Apply to the shortlist: https://u.eshard.com/ios-emulation
"Early Adopter Program" shortlist β€” iOS emulator on esReverse

esReverse is a powerful collaborative platform built for binary security investigations. With dedicated dynamic analysis resources, it offers full-system emulation and Time Travel Analysis to help researchers dive deep into the kernel and userland. Today it supports Windows, Linux, Android and IoT, and iOS is next. Leveraging QEMU as part of its emulation framework, esReverse will soon allow iPhone environments to be emulated and analyzed just like other systems. The first version, supporting the latest iOS, is planned for early 2026. Through this Early Adopter Program, a limited group will be selected to gain exclusive access before the public release. Fill out the form to apply for the shortlist. By submitting, you agree to the terms and conditions of the Early Adopter Program.

Google Docs

Update on the iOS emulator πŸ”₯

We’ve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.

Still cooking, but we’re getting close to sharing it with you. And more is coming with iOS26...

#ios #emulation #devsecops

We're at the AMD Security Working Group in Munich, Germany. πŸ“

#hardware #cybersecurity #pqc

We're on our way to Germany for the AMD Security Working Group.
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.

#cybersecurity #hardware #postquantumcryptography

We're live! πŸ”΄ Come watch us: https://youtu.be/nzar2L4GUJ8
Binary Ninja Live Stream: Analyzing TTD traces in BN with esReverse

YouTube

πŸ”΄ We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: https://www.youtube.com/live/nzar2L4GUJ8

#cybersecurity #reverseengineering #binary #softwareengineering

Our Keccak webinar is a wrap! πŸ”΅ Thank you to everyone who joined.

Ready for the next one? Tell us what you want to see next and we will make it happen. πŸ˜‰ #cybersecurity #hardware #postquantum

It’s this week πŸ”΅ Join us for a deep dive into Keccak and the side-channel angles behind its applications.

Register below ⬇
Session 1: https://u.eshard.com/wcUfh
Session 2: https://u.eshard.com/4hGSQ

#webinar #pqc #postquantum #nist

KMAC is one of the main ways Keccak is used in modern systems, which is why we’re exploring it through a practical use case in our next webinar.

Choose your timeslot and register below ⬇
Session 1: https://u.eshard.com/wcUfh
Session 2: https://u.eshard.com/4hGSQ
#pqc #nist