Security Explorations conducts security and vulnerability research with respect to the most challenging software security technologies.
During our research efforts, we investigate in detail security of a target software or technology in order to find weaknesses in its design and implementation.
As true researchers, we investigate each target very thoroughly. This very often involves development of custom reverse engineering or code analysis tools. Without these tools we would not be able to successfully complete most of our projects.
Passion and years of experience in binary analysis allows us to deal even with the most challenging tasks.
When interacting with vendors of affected technologies we usually follow our Disclosure Policy.
Copyright 2008-2012 Security Explorations. All Rights Reserved.