Software from the Security Viewpoint

  • Assessment of the level of security against illegal software use
  • Testing of resistance to unwanted application modifications
  • Assessment of the application's resistance to the extraction of algorithms carried out by an attacker
  • Assessment of the code's resistance to modifications (patching)

Hardware from the Security Viewpoint

  • Analysis of the code and data protection against their reading out from a hardware device
  • Evaluation of the risk of attacker's code being run on the device

Quality of the Process of Cryptographic Keys Generation

  • Analysis of the procedure of cryptographic keys generation
  • Analysis and assessment of the quality of "randomness" for random number generators
  • Analysis of possible attacks on generators