• Français
  • English


You want to protect your applications and Trustlets* (payment, content sharing, games, IoT controller, …) by looking for their vulnerabilities, checking their compliance (PSD2) and securing their interactions
*Application running in the trusted environment of the mobile platform (TEE, Secure Element)

Main challenges

In addition to the diversity and the economic stakes, there are many constraints, whether you are in the design or post-design phase:

  • knowledge, implementation and compliance to standards
  • expertise required in cryptography
  • vulnerability research and/or risk analysis by specialists acting as attackers
  • lack of end-to-end security knowledge (software and hardware).

Our solutions

rom the design to the post-deployment phase, get benefit from the expertise of our recognized and dedicated mobile team:
  • in security (cryptography, native code analysis, vulnerability research…) with an offensive approach
  • with an end-to-end understanding (from the application to the smartphone) for the analysis of native parts as well as interpreted code (Java)
  • with the use of our open source tools (LIEF, QBDI, …) to find complex vulnerabilities and speed up analysis time
To access the main works realized by our teams: visit our blog