Modern embedded devices are under attack at an unprecedented rate. These devices exist in every facet of society from mobile phones to hard drives. All of these devices are being protected through the use of encryption algorithms. However, attackers can still bypass these protections due to vulnerabilities in the implementation of the encryption algorithm. As a result, we need a method to test the security of encryption implementations within embedded devices. Our contribution is a set of methods: power analysis and the use of debugging ports to detect the existence of a chosen set of vulnerabilities in the device.