How to backdoor digital microelectronics in 5-minutes or less

Common techniques for disguising implants and triggers

Types of non-malicious undocumented functionality

How does ESPY detect unintended functionality?

ESPY Support

HOW-TO: Step-by-step manual analysis

Fast Testing vs. Deep Testing

Surfacing suspicious wires using thresholding techniques

HOW-TO: UsingTrigger-Solver to examine suspect code

Certification Support

When to use ESPY Prequal vs ESPY Certify

HOW-TO: Perform validation inquiry

Walkthrough demo of our certification process

Establish a trusted IP library

Reach out for support now!

Service Level support may also be contacted at the contact shown on your contract.