We specialize in IoT security, safeguarding connected devices from emerging threats and vulnerabilities. Our radio security expertise focuses on protecting wireless communications from interception and tampering. Additionally, we provide comprehensive embedded security solutions, ensuring the integrity and resilience of embedded systems against various cyber threats.
Protecting interconnected devices and networks from vulnerabilities and attacks.
Read MoreEnsuring the integrity and protection of embedded systems against cyber threats.
Read MoreEnsuring the integrity and protection of embedded systems against cyber threats.
Read MoreProtecting interconnected devices and networks from vulnerabilities and attacks.
Read MoreEnsuring the integrity and protection of embedded systems against cyber threats.
Read MoreEnsuring the integrity and protection of embedded systems against cyber threats.
Read MoreAdvancing Security and Reliability in Modern Hardware Systems
At the Hardware Integrity Research Group, we are dedicated to advancing the security and reliability of modern hardware systems. ensuring hardware integrity has become a critical concern. Our team specializes in identifying and addressing vulnerabilities across a wide range of hardware platforms, from communication channels to embedded systems. We work with industry partners and academic institutions to develop cutting-edge strategies, such as cryptographic hardware implementations and firmware analysis
Read MoreOur team performed a security analysis of the Sleepace Smart Belt, focusing on its data transmission and potential vulnerabilities. We examined the encryption and authentication mechanisms used to protect sensitive sleep and health data, identified weaknesses in its Bluetooth communication, and assessed its firmware for potential exploits, offering comprehensive recommendations to strengthen overall device security.
We performed a key fob relay attack to assess vulnerabilities in a client's automotive security system. By capturing and relaying signals between the key fob and the vehicle, we demonstrated how an attacker could unlock doors and start the engine without the owner's consent. This exposed weaknesses in communication range and signal encryption, prompting the client to implement stronger encryption, signal validation, and rolling code mechanisms to protect against such attacks
We conducted a security review of the Smart Nova Ring, analyzing its IoT communication protocols and firmware. By identifying weaknesses in data transmission and storage, we highlighted vulnerabilities that could be exploited for unauthorized access to sensitive health data. Our assessment included a thorough evaluation of encryption methods and authentication processes in use. We provided actionable recommendations to enhance security measures, ensuring the protection of user data and maintaining the integrity of the device
We have successfully implemented advanced hardware-level security for 32-bit microcontrollers, In our work, we integrated secure firmware storage using cryptographic methods, ensuring that only authenticated and validated firmware is executed, preventing unauthorized access or tampering. Additionally, we deployed memory protection mechanisms, enforcing encryption and strict access controls
We systematically examined the Smart Nova Ring's firmware for vulnerabilities that could compromise security and functionality. We employed static and dynamic analysis techniques to identify potential weaknesses in the code and configuration settings. Our findings revealed several areas susceptible to exploitation, including inadequate input validation and outdated libraries. To mitigate these risks, we recommended targeted patches and best practices for secure firmware development and maintenance
We successfully implemented a comprehensive supply chain security solution for a client utilizing the MCU. To protect against firmware tampering and unauthorized cloning, we encrypted and signed firmware updates, ensuring only authenticated code could be installed. The secure boot process verified the firmware signature before execution, preventing unauthorized installations throughout the supply chain. Additionally, we deployed hardware-based memory protection to block unauthorized access to sensitive data.
Founder
Technical Lead
Hardware Penetration Tester
Firmware Analyst
Web Application Penetration Tester
Radio Security Expert
At the Hardware Integrity Research Group, we are dedicated to advancing the security and reliability of modern hardware systems.Ensuring hardware integrity has become a critical concern.