Our Services

Training

We provide training in security from hardware to the cloud covering HDL development, secure algorithms, side channel analysis, computer and network forensics.

Professional Services

We provide digital forensic, e-discovery services and penetration testing and assessment.

Blockchain Strategies

We develop strategies for blockchain implementation in financial and IoT services. We also provide consultancy, training, ASIC design services for digital currencies and Bitcoin mining.

Design Services

We provide design and test services for secure products such as smart cards and IoT devices.

Training Courses

Our Latest Security Articles

protect IP

Secure IC Design

The old way of delivering a product to market was to reuse as much IP as possible and verify that the correct functionality has been achieved. Todays secure systems such as smart cards and embedded systems can no longer rely on this design method.

Read More
rootoftrust training provides the skills to counteract attacks

Attacking Hardware

Embedded devices can be attacked in numerous ways to leak privileged information. These attacks focus on vulnerabilities in the implementation of secure functions or in the chip itself. Countermeasures have been proposed to tackle these vulnerabilities singularly however attackers now use multiple attacks to achieve the same aim. The most popular attacks are described below.

Read More
blockchain relies on cryptography

Financial Cryptography

The use of cryptographic currency and smart contracts (scripts residing on the blockchain that allow the automation of complex transactions) will revolutionise trading. Its potential is staggering but there are also challenges in implementing such complex structures. Learn what cryptographic finance entails and how to enter the market securely.

Read More
secure semiconductor chip

Hardware Trojans

Due to the proliferation of semiconductor and embedded devices in all areas of industry including telecommunications, e-commerce and security, the threat from hardware trojans has never been greater or more menacing. Learn what they are and what you can do about them.

Read More