Reverse Engineering

 Home / Services / Reverse Engineering

Reverse Engineering

Security software analysis

    Each software carries a hidden threat in the form of made at the design stage errors and vulnerabilities, and sometimes deliberately embedded software "bookmarks". Often the software has multi-level protection system that actively impeding the investigation and conceal their purpose. The study reveals security applications: made at the design stage vulnerabilities and gaps that lead to the implementation of information security threats; explore the functionality and purpose of malware, viruses and Trojans, in the investigation of security incidents...

Audit security software will identify current threats and vulnerabilities, such as:

  •     • Logical errors, configuration errors, random errors;
  •     • So-called "bookmarks", implemented by the manufacturer for unauthorized access;
  •     • Hidden and unsafe data channels;
  •     • Unsafe functions and methods that lead to unauthorized access to information;
  •     • Buffer / stack overflow, format string, and others.
Also, security audit will give a reasonable assessment of the security software from unauthorized copying and circumvention of the licensing system.

Import substitution

    We solve the problem of substitution of imported electronic equipment by analogues: the creation of domestic counterparts control boards, software, chips, electronic components, control units, industrial controllers, etc.
    Modern microcontrollers have several degrees of protection, which considerably complicate the study: bits read protection firmware, cryptographic mechanisms to protect public key, lifetimers, all kinds of hardware mechanisms, including tampers and non-repairable production, special bookmarks against copying, etc. Our team consists of some of the world's best experts to address all of these problems. Development "from scratch" often comes in dozens or even hundreds of times harder to develop analogues of existing solutions.

We perform a complete cycle of import substitution of electronic equipment:

  •     • Analysis and development of analogue of circuit design;
  •     • Removal of locks and security systems;
  •     • Development of analogue hardware units;
  •     • Development of analogues on the basis of the national components;
  •     • Software Development.


If you have any questions or need advice - send an e-mail: info@itpsl.org