Support
Education
How to backdoor digital microelectronics in 5-minutes or less
Common techniques for disguising implants and triggers
Types of non-malicious undocumented functionality
How does ESPY detect unintended functionality?
ESPY Support
HOW-TO: Step-by-step manual analysis
Fast Testing vs. Deep Testing
Surfacing suspicious wires using thresholding techniques
HOW-TO: UsingTrigger-Solver to examine suspect code
Certification Support
When to use ESPY Prequal vs ESPY Certify
HOW-TO: Perform validation inquiry
Walkthrough demo of our certification process
Establish a trusted IP library
Reach out for support now!
Service Level support may also be contacted at the contact shown on your contract.