SECURITY RESEARCH

we can make

your software

safe

SCROLL

e-mail:contact@agsecurityresearch.com
EXPERIENCE

WE

We have a proven record of breaking security of software. We broke security of Nokia Series 40 Platform devices, digital satellite TV set-top-boxes of Polish Canal+ SAT-TV operator, secure cryptographic processors from STMicroelectronics, Java based cloud hosting environments coming from Oracle and Google and Gemalto SIM cards among others.

WE

We are a security and vulnerability research company from Poznań, Poland. We build products and provide services in software security space to customers from government, financial, telecommunication, cloud and Pay-TV sectors.

WE

We do not limit ourselves to software evaluations. We build custom products for code analysis, reverse engineering, security testing and software IP protection.

WE

We have solid 20+ years of practical experience in reverse engineering and vulnerability research. The company builds on top of that to provide unique services and solutions to customers worldwide.

THE GALAXY
IS OUR
LIMIT

DESCRIPTION

This service is ideal for customers who are in a need of a comprehensive software security review of their products or solutions.

During the work conducted as part of the service, we analyze the source code and documentation of a customer's software in a search for security defects in its design and implementation.

DESCRIPTION

Custom research projects are conducted with respect to the technology or software of a customer's choice. This can include both open or closed (in binary form) software of arbitrary 3rd parties.

At the end of the project, all results of our research efforts are prepared in a form of a research paper. All accompanying proof of concept codes are included in it as well.

DESCRIPTION

This service is dedicated for companies and organizations from a national security and military sectors in particular.

As a result of the service, on demand reverse engineering and security research of a given target is conducted with the goal to provide a customer with specific intelligence about it (such as an in-depth knowledge about target's operation and internals, information about its security protections, weaknesses and backdoors).

DESCRIPTION

This service is dedicated for companies and organizations from financial, government, transportation and telecommunication sectors in particular. It is being offered as a direct follow up of discovering multiple security issues in Java Card technology by our company.

This service combines the best of our skills and experience acquired over 20+ years of breaking software security and reverse engineering binary code.

As part of the service, security analyses is conducted with respect to smart cards of a customer choice such as SIM, banking, transportation or identity cards.

DESCRIPTION

This service is for customers that are in a need of dedicated software tools for reverse engineering and binary code analysis. As part of the service, custom debuggers, runtime tracers, emulators, decompilers or code obfuscators are built to suit customer needs.

DESCRIPTION

The Java / SIM Card introspector (Alpha stage) is a non-commercial tool that facilitates security evaluation, reverse engineering and vulnerability testing of Java / SIM cards.

It implements application and security codes management, file system inspection / modification and SIM Toolkit applications testing among others.

The tool embeds the functionality that can be used to reverse engineer and exploit vulnerabilities targeting selected real-life SIM / USIM cards.

MEDIA ABOUT US

Forbes

Cnn

Dark Reading

Bloomberg

Ars technica

Computerworld

Reuters

BBC News

CBS

CONTACT
contact@agsecurityresearch.com
PGP KEY