EmberCrypt

Embedded Device Security | Reverse Engineering | Side Channel Attacks




About


EmberCrypt's main focus is on automotive and embedded device security. Set up by Jan Van den Herrewegen, who wrote his PhD thesis Automotive Firmware Extraction and Analysis Techniques at the University of Birmingham, EmberCrypt remains closely attached to the automotive security field. With experience in ECU firmware readout, ECU reverse engineering and side-channel attacks we are confident we have the know-how to guide you in your automotive projects.



Bitcoin hardware wallet recovery

Forgot the PIN of your hardware wallet? We can recover the seed phrase of the following crypto hardware wallets:

  • Trezor Model One, Trezor Safe
  • Ledger Nano
  • ...

Please contact us with a detailed description of your hardware wallet (including version no., passphrase set, …) for a quote.


Reverse Engineering

We are experienced in reverse engineering both commodity (Windows, Linux, Android) and embedded software using various state-of-the-art tools (IDA, Ghidra, Frida).

  • Immobiliser key diversification
  • Automotive diagnostics (seed-key, firmware update, ...)
  • Android app reverse engineering
  • Windows/Linux executables

ECU Firmware Readout

We offer a repair & recovery service of various (read/write protected) automotive MCUs, including but not limited to:

  • Renesas 78K0, 78K0R, V850(Ex), RH850, R32C
  • ST Micro STM8, STM32
  • NXP SPC560

Please contact us with a detailed description of your requirements for a quote.