Consider the end of life-cycle for electronic devices, and assume a company is upgrading to newer machines. If they weren't responsible in destroying electronic waste, it may make its way to India, Japan or Ghana where hackers can read the data from hard-drive discs and steal sensitive personal data such as credit card information. On the other hand of the issue, the US military confiscates foreign electronic devices routinely and may need to reverse engineer said devices for key intelligence. In both these scenarios, hardware encryption plays a huge role and Warden Systems strives to be at the forefront of Embedded Security.
Side-Channel Attack Devices
As a chip computes instructions, its electronic load varies requiring more Voltage, and this can be read on the power pins of the chip, as well as an increase in sound and heat. Measuring these third-party effects, or side channels, gives the necessary information to break any software encryption. Typically, conducting these attack requires a high-end oscilloscopes and a lab environment, however Warden Systems produces a $1000 portable side-channel attack solution. The Chip Whisperer™ is a desktop device that synchronizes on clock edge with the victim board and automatically attacks using known encryption schemes like RSA and SHA-1 or 2 for reverse engineering purposes.
Trusted Platform Module Integration
Warden Systems' Cryptology Lab helps electronic designers and engineers protect their hardware from hackers or malicious third-party software and hardware by integrating Trusted Platform Modules into their design. We also help with software development to connect the cryptoprocessor to the main processor using ARM or x86/64 architectures and help to keep the device compliant with ISO/IEC standards.
Dynamic Analysis for Low-Level Software
Using the latest versions of IDA Pro and dynamic analysis of the hardware registers on a processor, Warden Systems can identify information leaks, new Malware strains and Zero-Day exploits. This branch of Warden is typically research oriented, although we can help clients further test their devices and see if they are susceptible to these exploits using honeypots, or see if they have already been compromised.