Nowadays the hyperconnected world faces a complete new thread landscape, as any device having Internet connectivity is potentially vulnerable and subject to attacks and malicious activity.
At RootSys, we provide security review services for IoT devices and the firmware running on IoT devices, in order to identify vulnerabilities through a review of the hardware and the software stack. As in some cases a source code inspection is not possible, we use reverse engineering techniques during the review process to determine the exact usage of what the IoT device does and which attack vectors exist, also including the analysis of hardware debug interfaces.
At the end of every IoT review, RootSys provides a technical report including all identified vulnerabilities along with a severity rating according to industry standards.
We use cookies in order to design and improve our website optimally for you. If you continue, we assume that you agree with the use. Further details and information about your right of objection can be found in our Privacy Policy