What we do

We help creators of smart and connected devices (in the field of automotive, home automation, industrial and medical) to design, develop and operate their systems with the proper level of protection and to keep them protected over time.

The object of our activity is the “system”, which can either be a single device, an equipment composed of several interconnected devices, or an ecosystem that includes embedded devices, mobile apps and the cloud.

With protection, we mean lowering the risk that threats materialize by exploiting any vulnerability related to electronic systems. Namely, this is accomplished by protecting:

• The Firmware that is executed on the embedded systems;
• The communication between entities of the system;
• The access control to the system functionality;
• Key management necessary for the operation of the system.

Security is a process

A single component is not going to solve security problems: security is a combination of HW, SW and procedures designed and combined to ensure the highest level of security and to resist future threats still unknown.

1.

Study the security requirements of a device, a system, a task

We take into consideration and analyze every aspect of the device / system / task: communication between entities, authentication of entities within a system, creation and management of keys and storing of sensitive data.

2.

Identify vulnerabilities and assess their impact

We help the creators to evaluate their devices, systems and activities in order to identify the assets and the possible threats they are exposed to.

3.

Propose countermeasures suited to the specific context

We propose to architects and designers possible countermeasures and we define together the security requirements suitable to the specific context.

4.

Develop the elements necessary to fulfil the security requirements

We personally implement countermeasures or we provide to developers with references, prototypes, IPs necessary for state-of-the-art implementation of the requirements.

5.

Manage and maintain elements that support the security on behalf of customers

Security spans the entire life of the device, because what is secure today might be broken tomorrow. Every aspect of a device / system / task must be constantly monitored and updated to resist new threats.

6.

Educate about the security of connected devices

Disseminate the culture of security in general is essential to promote our activity. Introductory courses are useful for designers and developers, specific trainings are justified only in special cases.

Our key competencies

System Security

Analysis of system assets and definition of system level requirements for the entire life cycle of the product/service

Device specification

Orchestrate all the security ingredients of an embedded system: microcontroller, secure element, communication modules...

Cryptography

Use, selection and implementation of cryptographic algorithms for embedded systems

Board level protection

Know-how on state of the art attacks and development of effective countermeasures

Protocols

Use, definition and analysis of security protocols for protecting communication channels

Methodologies

Methodologies and tools to evaluate and guarantee the robustness of the solutions, Support for certification

Projects done, Consulting and Training

Get in touch with us

Are you looking more information or a professional consulting? Fill in the following form:

  I have read and agree to the Privacy Policy

Send