Welcome on reassure.eu

Robust and Efficient Approaches to Evaluating Side Channel and Fault Attack Resilience

Implementing cryptography on embedded devices is an ongoing challenge. Every year new implementation flaws are discovered and new attack paths are being used by real life adversaries.

Whilst cryptography can guarantee many security properties, it crucially depends on the ability to keep the used keys secret even in face of determined adversaries.
Over the last two decades a new type of adversary has emerged, able to obtain, from the cryptographic implementation, side channel leakage such as recording of response times, power or EM signals, etc.

To account for such adversaries, sophisticated security certification and evaluation methods (Common Criteria, EMVCo, FIPS…) have been established to give users assurance that security claims have withstood independent evaluation and testing. Recently the reliability of these evaluations has come into the spotlight: the Taiwanese citizen card proved to be insecure, and Snowden’s revelations about NSA’s tampering with FIPS standards eroded public confidence.


  • Improve the efficiency and quality of all aspects of certification using a novel, structured detect-map-exploit approach that will also improve the comparability of independently conducted evaluations.
  • Cater for emerging areas such as the IoT by automating leakage assessment practices in order to allow resistance assessment without immediate access to a testing lab.
  • Deliver tools to stakeholders, such as reference data sets and an open-source leakage simulator based on instruction-level profiles for a processor relevant for the IoT.
  • Improve existing standards by actively pushing the novel results to standardization bodies.

REASSURE’s consortium is ideal to tackle such ambitious tasks. It features two major circuits manufacturers (NXP, MORPHO), a highly respected side channel testing lab (Riscure), an engaged governmental representative (ANSSI), and two of the most prominent research institutions in this field (UCL, University of Bristol).

Last news

REASSURE final deliverables available

The project final deliverables have been uploaded on the website, see the resources tab.

Join us for a webinar on the topic of Leakage Detection in software

Through this webinar, we aim to help you grasp the intuition behind leakage detection methodologies, and walk you through the content of our in-depth online training that is freely accessible. For the already advanced attendees, we will reserve time for live questions.

This free webinar will take place on the 26th of February, at 15.00 CET. Follow this link for more information.

Inspector Cloud now available

Inspector Cloud, a cloud-based hardware security solution for Side Channel Analysis, is now available. Register for free here.

New publications

Two REASSURE papers were published at Cardis and TCHES 2019. They can be downloaded from the Resources tab.

Full version of tutorial scripts

All the slides and python scripts that were presented at our tutorial on leakage detection are now available on the tutorial page.

Free tutorial on leakage detection

REASSURE will organize a free tutorial on leakage detection, to be held at CARDIS 2018. For more information and registration, follow the tutorial tab.

New public deliverable

Deliverable D2.4: “Report on Instruction Level Profiling” has been released. It is available from the resources tab.

Deliverables published

Deliverables D2.1: “Shortcut Formulas for Side Channel Evaluation” and D2.2: “Interim report on automation” have been released in December. They are available from the resources tab.


Two REASSURE-related papers were presented at CARDIS 2017. They are available from the resources tab.

New publications

Two new REASSURE papers were presented at the International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017). They can be downloaded from the Resources tab.