Research blog

We believe in the transformative power of digitalization

We actively contribute to technology evolution by finding weaknesses so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
SIM cards are prone to remote hacking
telco
open source
7/21/2013
Mobile networks differ widely in security, none protect well in all dimensions
telco
open source
7/14/2012
Payment terminals allow for remote PIN capture and card cloning
cryptography
device hacking
7/12/2012
Cryptographic problems are reduced to their true hardness by SAT solvers
cryptography
5/17/2011
The physical access control market is ripe for an upgrade to modern technology
cryptography
device hacking
9/16/2010
Legic Prime RFID cards rely on obscurity and consequently did not withstand scrutiny
cryptography
hacking projects
open source
7/20/2010