Do You Trust Your Software Manufacturer? Reverse Engineering of Third-Party Products
If you use security-critical hardware or software from third-party companies in your company, you must inevitably trust the statements of the manufacturer. If there is concern about past security incidents, this trust often fades.
Reverse engineering can be used to analyze code paths in such third-party products, from embedded hardware to desktop applications. In this way, security mechanisms, weaknesses and inner functioning can be disclosed and assessed. In this way, it can be evaluated whether security mechanisms have been used and commitments have been complied with.
We analyze all common architectures, whether x86 or ARM, micro controller or server farm, malware or accounting application.