|
|
Services
Hardware Security
- UART analysis
- JTAG analysis
- SPI/eMMC Flash Desoldering Reading/Writing
- Glitching
- Firmware Reverse Engineering
- Secure Boot bypass
Software Security
- Reverse Engineering
- Penetration Testing
- Architectural Risk Analysis and Threat Modeling
- Secure Code Review
- Secure Design Review
- Security Requirements
- Systems development lifecycle (SDLC) integration
- Static/Dynamic Analysis
- Ethical Hacking
Infrastructure
- Network Analysis
- Host and Device Analysis
- Ethical Hacking
- Reverse Engineering
RF
- Custom RF analysis
- 2.4 GHZ Wireless Analysis (Zigbee, 802.11)
- Firmware Reverse Engineering
|