| π Chip Security Testing | Side-Channel, Fault Injection, Failure Analysis |
| π Binary Analysis | Vulnerability & Malware Research |
| Website | https://eshard.com/ |
| π Chip Security Testing | Side-Channel, Fault Injection, Failure Analysis |
| π Binary Analysis | Vulnerability & Malware Research |
| Website | https://eshard.com/ |

esReverse is a powerful collaborative platform built for binary security investigations. With dedicated dynamic analysis resources, it offers full-system emulation and Time Travel Analysis to help researchers dive deep into the kernel and userland. Today it supports Windows, Linux, Android and IoT, and iOS is next. Leveraging QEMU as part of its emulation framework, esReverse will soon allow iPhone environments to be emulated and analyzed just like other systems. The first version, supporting the latest iOS, is planned for early 2026. Through this Early Adopter Program, a limited group will be selected to gain exclusive access before the public release. Fill out the form to apply for the shortlist. By submitting, you agree to the terms and conditions of the Early Adopter Program.
Update on the iOS emulator π₯
Weβve been deep into acceleration work lately, and the performance is already very promising for an emulated iOS18.
Still cooking, but weβre getting close to sharing it with you. And more is coming with iOS26...
We're at the AMD Security Working Group in Munich, Germany. π
We're on our way to Germany for the AMD Security Working Group.
We'll be showcasing a demo of a side channel attack targeting ML-KEM on an STM32, and how we approach hardware investigations.

π΄ We're going live with Binary Ninja, at 10am EST (3pm GMT / 4pm CET / 11pm SGT). Join us here: https://www.youtube.com/live/nzar2L4GUJ8
#cybersecurity #reverseengineering #binary #softwareengineering
Our Keccak webinar is a wrap! π΅ Thank you to everyone who joined.
Ready for the next one? Tell us what you want to see next and we will make it happen. π #cybersecurity #hardware #postquantum
Itβs this week π΅ Join us for a deep dive into Keccak and the side-channel angles behind its applications.
Register below β¬
Session 1: https://u.eshard.com/wcUfh
Session 2: https://u.eshard.com/4hGSQ
KMAC is one of the main ways Keccak is used in modern systems, which is why weβre exploring it through a practical use case in our next webinar.
Choose your timeslot and register below β¬
Session 1: https://u.eshard.com/wcUfh
Session 2: https://u.eshard.com/4hGSQ
#pqc #nist