Research

Security Explorations conducts security and vulnerability research with respect to the most challenging software security technologies.

During our research efforts, we investigate in detail security of a target software or technology in order to find weaknesses in its design and implementation.

As true researchers, we investigate each target very thoroughly. This very often involves development of custom reverse engineering or code analysis tools. Without these tools we would not be able to successfully complete most of our projects.

Passion and years of experience in binary analysis allows us to deal even with the most challenging tasks.

SIM / USIM cards

SIM / USIM
cards

Read more

Microsoft Warbird and PMP

Microsoft Warbird
and PMP

Read more

Cinterion IoT devices

Cinterion IoT
Devices

Read more

Microsoft PlayReady

Microsoft
PlayReady

Read more

Java Card

Java Card

Read more

NC+ SAT TV Platform

NC+ SAT TV
Platform

Read more

ST DVB Chipsets

ST DVB
Chipsets

Read more

Google App Engine for Java

Google App Engine
for Java

Read more

Oracle Database Java VM

Oracle Database
Java VM

Read more

Oracle Java Cloud Service

Oracle Java
Cloud Service

Read more

Java SE

Java SE

Read more

Digital satellite TV platform

Digital satellite
TV platform

Read more

Mobile Java and Nokia phones

Mobile Java and
Nokia phones

Read more