we can make
your software
safe
SCROLL
We have a proven record of breaking security of software as shown by our security research laboratory. We broke security of Nokia Series 40 Platform devices, digital satellite TV set-top-boxes and VOD platform of Polish Canal+ SAT-TV operator, secure cryptographic processors from STMicroelectronics, Java based cloud hosting environments coming from Oracle, Google and Gemalto (now Thales DIS) SIM cards among others.
We are a security and vulnerability research company from Poznań, Poland. We build products and provide services in software security space to customers from government, financial, telecommunication, cloud and Pay-TV sectors.
We do not limit ourselves to software evaluations. We build custom products for code analysis, reverse engineering, security testing and software IP protection.
We have solid 25+ years of practical experience in reverse engineering and vulnerability research. The company builds on top of that to provide unique services and solutions to customers worldwide.
1. Software security
evaluation
This service is ideal for customers who are in a need of a comprehensive software security review of their products or solutions. During the work conducted as part of the service, we analyze the source code and documentation of a customer's software in a search for security defects in its design and implementation.
2. Custom security
research
Custom research projects are conducted with respect to the technology or software of a customer's choice. This can include both open or closed (in binary form) software of arbitrary 3rd parties. At the end of the project, all results of our research efforts are prepared in a form of a research paper. All accompanying proof of concept codes are included in it as well.
3. Intelligence
acquisition
This service is dedicated for companies and organizations from a national security and military sectors in particular. As a result of the service, on demand reverse engineering and security research of a given target is conducted with the goal to provide a customer with specific intelligence about it (such as an in-depth knowledge about target's operation and internals, information about its security protections, weaknesses and backdoors).
4. Security evaluation
of smart cards
This service is dedicated for companies and organizations from financial, government, transportation and telecommunication sectors in particular. It is being offered as a direct follow up of discovering multiple security issues in Java Card technology by our company. This service combines the best of our skills and experience acquired over 20+ years of breaking software security and reverse engineering binary code. As part of the service, security analyses is conducted with respect to smart cards of a customer choice such as SIM, banking, transportation or identity cards.
5. Tools development
This service is for customers that are in a need of dedicated software tools for reverse engineering and binary code analysis. As part of the service, custom debuggers, runtime tracers, emulators, decompilers or code obfuscators are built to suit customer needs.
This service is ideal for customers who are in a need of a comprehensive software security review of their products or solutions.
During the work conducted as part of the service, we analyze the source code and documentation of a customer's software in a search for security defects in its design and implementation.
Custom research projects are conducted with respect to the technology or software of a customer's choice. This can include both open or closed (in binary form) software of arbitrary 3rd parties.
At the end of the project, all results of our research efforts are prepared in a form of a research paper. All accompanying proof of concept codes are included in it as well.
This service is dedicated for companies and organizations from a national security and military sectors in particular.
As a result of the service, on demand reverse engineering and security research of a given target is conducted with the goal to provide a customer with specific intelligence about it (such as an in-depth knowledge about target's operation and internals, information about its security protections, weaknesses and backdoors).
This service is dedicated for companies and organizations from financial, government, transportation and telecommunication sectors in particular. It is being offered as a direct follow up of discovering multiple security issues in Java Card technology by our company.
This service combines the best of our skills and experience acquired over 20+ years of breaking software security and reverse engineering binary code.
As part of the service, security analyses is conducted with respect to smart cards of a customer choice such as SIM, banking, transportation or identity cards.
This service is for customers that are in a need of dedicated software tools for reverse engineering and binary code analysis. As part of the service, custom debuggers, runtime tracers, emulators, decompilers or code obfuscators are built to suit customer needs.