Embedded Security Assessment
Key Facts
- Holistic and in-depth security analyses at all levels of the embedded system stack (e.g. of firmware, update processes, diagnostic and debug functions, hardware, specific security mechanisms, etc.).
- The scope can be individually defined and ranges from end-to-end tests and tests of individual components to detailed analyses of systems on chip (SoC) or other microcontrollers. If required, passive and active side-channel attacks can also be carried out (e.g. through power analysis or fault injection)
- Many years of expertise and a highly specialized, state-of-the-art laboratory environment certified to ISO 27001 and TISAX L3.
Categories
- Certification and Approval
- Testing Services
- Other Services
- Consulting
Key Facts
- Holistic and in-depth security analyses at all levels of the embedded system stack (e.g. of firmware, update processes, diagnostic and debug functions, hardware, specific security mechanisms, etc.).
- The scope can be individually defined and ranges from end-to-end tests and tests of individual components to detailed analyses of systems on chip (SoC) or other microcontrollers. If required, passive and active side-channel attacks can also be carried out (e.g. through power analysis or fault injection)
- Many years of expertise and a highly specialized, state-of-the-art laboratory environment certified to ISO 27001 and TISAX L3.
Product information
Product Expert
