Your Benefits from our Embedded/IoT Security Services
  • High customer orientation

  • Extensive technical experience with a wide range of complex embedded system architectures

  • Own Hardware Security Lab

  • Well-structured Embedded Security Auditing Workflow

  • Detailed Security Audit Reports including a description of the conducted tests, the identified security flaws and suggested security fixes

  • Our Proof-of-Concept Exploits enable demonstration and ensure high reproducibility

  • Individualized Security Trainings

  • In-depth technical expertise

Our Approach

Definition of Attacker Model

Attack Surface Analysis (ASA)

Technical Security Audit

Proof of Concept (PoC)

Security Audit Report

For our Embedded Security Audits, we use a well-defined auditing workflow:

Step 1 - Definition of Attacker Model and Audit Depth: Together with our customers, we define the audit depth, aggressiveness, specific customer requirements and types of attackers that should be considered during the security tests. For embedded systems, this also includes the consideration of different types of physical access types.

Step 2 - Attack Surface Analysis (ASA): In accordance with the defined attacker model, we analyze which parts of the embedded hard- and software components can be reached by attackers (attack surface).

Step 3 - Technical Security Audit: This is the main part of the security audit. We typically use a combination of established automated and manual testing techniques to identify security vulnerabilities. Depending on the audit depth this may include hardware analysis, firmware extraction using techniques from our Hardware Security Lab as well as firmware and protocol security testing.

Step 4 - Proof of Concept (PoC): For identified security vulnerabilities, we develop Proof of Concept (PoC) exploits. The PoC exploits demonstrate the identified vulnerabilities, they ensure high reproducibility of our results and they can be utilized for testing purposes during development of subsequent security fixes.

Step 5 - Security Audit Report: In the final step, our customers receive a detailed report that includes a description of the conducted tests, the identified security flaws and suggested security fixes.

Our Analysis Techniques
  • Communication Protocol Analysis and Testing

  • Firmware Extraction

  • Static and Dynamic Code Analysis
    (Disassemling, Debugging and Decompilation)

  • Firmware Reverse Engineering

  • Source Code Reviews

  • Manual Code Analysis

  • Guided Firmware-in-the-Loop Fuzz Testing with the Trustworks Fuzz Testing Suite

  • Our PROSPECT technology allows us to employ advanced emulation technologies to conduct tests on systems with proprietary peripheral devices

Want to know more ?

Black-Box Security Audit/Penetration Test

In a typical scenario, you have a proprietary hardware or embedded system product installed and/or utilized at your site which should be tested for security. For instance, this could be an embedded office product such as a printer or camera, an IoT device, an automation or critical infrastructure field component, a control unit within an automotive or aviation infrastructure or even a single chip solution such as an NFC chip.


In a Black-Box Security Audit we do not have access to the source code and design documents of the hardware product. Depending on the audit requirements defined together with the customer, we can utilize the broad range of capabilities of our Hardware Security Lab to conduct security tests. In a typical scenario, we start with a lab test system installation in which the component that should be tested is included in a way so that its core functionality can be observed and utilized. At that point, depending on the security audit requirements, high- and low-level tests can be performed. High-level tests typically involve protocol testing such as on web interfaces or proprietary protocols. With low-level tests the firmware and/or the contained logic is extracted from the device for subsequent analysis. In the case of firmware, we work with the binary firmware in the configuration utilized within the device. We have extensive knowledge, internally developed testing tools and a more than 13 year long experience in Black Box security testing. To conduct security tests, we analyze the firmware under test within a product specific security testing environment and leverage established auditing techniques.

White-Box Security Audit and Source Code Review

In a White-Box Embedded Security Audit, the customer such as a hardware manufacturer or an in-house development division provides us with access to the design documents and source code of the product. Depending on the designs and programming languages, we utilize established review tools and manual reviews to identify security threats and vulnerabilities.

A White-Box Security Audit can be extended with static and dynamic code analysis on the embedded systems under test.

Communication Protocol Security Audit

In a Communication Protocol Security Audit, we focus on the security of the communication protocols ranging from high-level web interfaces to low-level proprietary bus or wireless communication protocols. In a typical scenario, we start with a lab test system installation in which the component, that should be tested, is included in a way so that its core functionality can be observed and utilized. Within the test setup we can scan for utilized protocols and services as well as analyze employed communication protocols for vulnerabilities. Depending on the audit requirements, we utilize established scanning and protocol analysis tools as well as manual protocol analysis to identify security threats and vulnerabilities.

Whenever necessary, we can resort to custom protocol testing tools and developments. This may also include the combination with advanced logic and firmware code analysis techniques to identify protocol functions in undocumented, proprietary communication protocols.

Wireless Security Audit

Your equipment uses wireless communication and you are not sure how easily it could get compromised? Are simple wireless replay attacks sufficient to compromise your physical security?
From Wi-Fi networks to digital directional radio links and NFC communication, we can analyze wireless communication channels as well as protocols for security vulnerabilities. Depending on the wireless technologies, we often use a combination of commercial testing equipment combined with Software Defined Radio (SDR) techniques. Especially SDR provides us with sophisticated signal analysis and signal generation capabilities. If in addition to the wireless signal also the wireless systems (e.g. a radio modem, a tag reader, etc.) can be accessed, we can effectively combine a wireless security audit with an embedded software security audit to obtain deep knowledge of proprietary (and possibly cryptographically protected) wireless protocols as well.

Security Concept Review

You are a hardware manufacturer or an embedded system developer and you plan to include your new security concept into an upcoming product release? We can help you address many security challenges through Security Concept Reviews.
We identify potential vulnerabilities and develop possible solutions for your security design and architecture concept. Our security review includes a detailed analysis of your concept, it highlights the concept’s security strengths and weaknesses, provides possible solutions to mitigate the weaknesses and ultimately allows you to increase the security of your upcoming product release at an early state prior to the software implementation.

Security Design & Architecture Consulting

Your embedded systems and/or hardware product needs a new security design or the current one should be improved? We bring in our security expertise and experience to help you in developing a solid security design and architecture that fulfills your requirements. We are used to working together with development teams and we understand many of the typical challenges that need to be addressed in complex embedded products.