Your demanding (and unique) projects require expertise and for us to search more, share, imagine and customize solutions to address your security challenges on the long term.
For more than 10 years, we make no compromise on our knowledge-rich and specialized personnel in both hardware and software security areas with the same passion and curiosity.
Mastering connected devices (IoT) security (yours or your suppliers ones) has become critical for compliance, IP Protection and data privacy.
From the early stage of design to post-deployment phase, our end-to-end security and regulation expertise (software, hardware, mobile application and cloud) will provide you audits, advice and exhaustive reports taking into account your hardware and cost constraints.
You have the responsibility to ensure that your Cloud infrastructure has the right level of security, that State of the Art practices are applied (rights management, Company rules,..) or migrate your on-premise assets on the cloud without losing control ?
At any stage of your project you can benefit from our end-to-end security expertise ( (application, cloud, DevOps, Kubernetes, connected device, …) to support or challenge your architectural choices.
Transparency and high-level of functional and cryptographic security are required for a successful crypto-currency launch under time constraint.
Our security expertise (cryptography, vulnerability research, code review and upskilling capacity) and our blockchain specific languages and eco-systems knowledge and tools will provide you with a high reputation audit.
You have to evaluate and certify your products by an ANSSI official CESTI organization (Centre d’Evaluation de la Sécurité des Technologies de l’Information) to address French Public/Defense markets with a competitive advantage ?
Leverage our recognized team security expertise (cryptography, reverse-engineering, …) along the entire CSPN process (Certification de Sécurité de Premier Niveau) so support your definition and redaction of the security target “CDS” (cible de sécurité) and by evaluating your product in order to write the “RTE” evaluation report (rapport technique d’évaluation).
You deliver contents or services (streaming, gaming, IP protected content) and you want to ensure that the security in place is robusts enough to protect your business model? How do you know the intellectual property or the sensitive information stored in your solution is protected with the right level of security?
Whether it is a userland desktop application, a driver or involving a hardware security component, you will get an estimate of the attack cost to guide your business decisions.
You want to use cryptography in the design and development phases or to apply it to your existing software or hardware device and you are looking forward to challenge security robustness, its maintenance and its adequacy to regulatory constraints.
Leverage the expertise of our team (offensive and defensive, R&D, cryptography scientists, …), our CESTI agreement (= certified Evaluation Lab), our methodology and our tools to provide you with audits and advice on both your software (DRM, communication, messaging, authentication…) and hardware (HSM, Electronic Payment Terminal, …)
To build a secure connected vehicle with production and delivery time constraints, you have to master and integrate multiple technology suppliers.
From pre-production to deployment phase, you can audit your solutions or your suppliers, receive advice and exhaustive reports. You will benefit from our 10 years reverse-engineering expertise in Automotive (ECU, IVI, protocols and communication with the unit) and from our specific tools to emulate your architecture.
Your unique project not only requires security expertise but also an approach combining research, creativity and challenging the status quo to reach your strategic goals and imagine a solution to your long term security challenges.
Since more than 10 years, we make no compromise on our knowledge-rich and specialized personnel in both hardware and software security areas with the same passion and curiosity
What is the impact on your global security of this new Commercial Off-the-shelf solution (COTS)? Before you deploy it, or because it is already in your systems, you want to ensure that its behavior is exactly as advertised by the editor without creating new attack paths in your defense?
You will get the attack surface of that COTS and an estimate of the cost for an attacker to use it to intrude deeper into your systems. You will then be able to optimize your security posture considering these new risks.
Our training can be purchased by customer for internal needs. We provide the content (slidedeck), the tools and the experts to teach the training, and we can also organize the logistic (finding and booking an appropriate location).
We deliver these training as well within conference program. To get registered, please refer to the conference website.
Multi-platform library to parse, modify and abstract ELF, PE, MachO and other executable formats, injecting code or unpacking without focusing on the details.
Cross-platform, cross-architecture dynamic binary instrumentation framework to observe a program during runtime and automate data collection and processing.
Cross-platform, cross-architecture dynamic binary analysis framework providing symbolic engine, taint analysis and AST representations of instructions.