IoT security and hardening
Over the years, smart connected devices have become smaller, cheaper, and easier to use in critical infrastructure, fintech, defence and industrial systems. Such devices often work with sensitive data and IP: gather and send telemetry data, run ML models, process video and photos, or control other devices—so, they should be protected against unauthorized access and misuse.
Edge Compute / IoT / ICS / SCADA security issues are centered around a fragmented ecosystem (different OS, languages and hardware capabilities), power and performance constraints, and unique threat models (grab-n-run). Unless specific actions are taken to secure the devices, applications, and communications, they are at risk.
IoT security challenges
Software and firmware vulnerabilities
Lack of strong cryptography and TEE
Platform security is complicated
Closed and legacy systems
IoT security solutions and approaches
Data and IP protection
OS security and hardening
Reverse engineering protections
// Relevant products
A DATABASE SECURITY SUITE
A CROSS PLATFORM CRYPTO LIBRARY
// Custom solutions and consulting
OS and device hardening for IoT
IP protection and anti-reverse engineering
Secure communications for IoT
Specialized cryptography for IoT
Auditing and reviewing
Have a question? Get a human to answer it!
Why do IoT security with us
Relevant engineering experience
Addressing real-world risks
Suitable for hard tasks
For innovators, by innovators
We've started Cossack Labs to develop new tools and methods for protecting the data and enabling novel solutions to emerging problems — so that at the edge of your innovation, you’ve already got fitting tools handy.
There are many ways we can help: with our products, bespoke solutions, and engineering services. Leave your contact information to connect with our team:
Cryptographic failures in RF encryption allow stealing robotic devices
Stunned by losing their robotic devices, [REDACTED] learnt that they were hijacked by attackers even with communication being encrypted. Having researched its firmware and found numerous cryptographic failures, we've crafted a few demos on how cryptography goes wrong in real life.
Secure Search Over Encrypted Data
What is searchable encryption and how to perform secure search over encrypted data.
Crypto wallets security as seen by security engineers
Read about building secure crypto wallets and issues we found when doing crypto wallet security audits. Hot non-custodial wallets store private keys, sign crypto transactions, and claim to be secure. But are they?