IoT / Hardware Security

Nowadays the hyperconnected world faces a complete new thread landscape, as any device having Internet connectivity is potentially vulnerable and subject to attacks and malicious activity.

At RootSys, we provide security review services for IoT devices and the firmware running on IoT devices, in order to identify vulnerabilities through a review of the hardware and the software stack. As in some cases a source code inspection is not possible, we use reverse engineering techniques during the review process to determine the exact usage of what the IoT device does and which attack vectors exist, also including the analysis of hardware debug interfaces.

At the end of every IoT review, RootSys provides a technical report including all identified vulnerabilities along with a severity rating according to industry standards.