Software from the Security Viewpoint
- Assessment of the level of security against illegal software use
- Testing of resistance to unwanted application modifications
- Assessment of the application's resistance to the extraction of algorithms carried out by an attacker
- Assessment of the code's resistance to modifications (patching)
Hardware from the Security Viewpoint
- Analysis of the code and data protection against their reading out from a hardware device
- Evaluation of the risk of attacker's code being run on the device
Quality of the Process of Cryptographic Keys Generation
- Analysis of the procedure of cryptographic keys generation
- Analysis and assessment of the quality of "randomness" for random number generators
- Analysis of possible attacks on generators