Our automated solution, Emproof Nyx, delivers high levels of software security and IP integrity to all embedded systems.
The ubiquity of embedded systems will not only make security more important for individual items and products, it will also bring with it formal and defined requirements for security that will affect every sector. From software and semiconductors to aviation and IoT.
Emproof Nyx will help all affected sectors to meet the requirements and guarantee high levels of embedded software security. So, what’s the solution? The answer is not redesigning a system, but rather, adding protection from outside. Protection that takes up only a tiny fraction of programming or software space but that nevertheless makes attacks difficult or impossible. The solution is Emproof Nyx.
Insertion of code guards to detect and prevent the exploitation of memory corruption vulnerabilities and control-flow hijacking attacks.
A technique to make the internal workings of a program difficult to understand, typically by replacing clear and concise code with something that is more complex and harder to interpret.
On start-up the deployed software image is checked against a known verified version enabling a customer-defined action (e.g., set device to safe-state, blow a fuse).
If additional security measures such as unique identifier data or hardware security modules are available, these are incorporated to provide enhanced security.
Code Transformation techniques used to slow down and increase the randomised data making fuzzing ineffective when used to attack the device.
In a few minutes you’ll see how Emproof Nyx’s advanced binary transformation technology shields your applications and firmware from cyber threats. The code protection feature prevents reverse engineering and intellectual property (IP) theft, whilst the security hardening feature fortifies your software against exploitation attacks written in memory unsafe languages like C/C++ and more.
Virtually every embedded device that runs software will benefit from the advanced security protections offered by Emproof Nyx – including protection against reverse engineering and exploitation attacks. This is especially the case in applications that handle sensitive data, are interconnected, or run critical and functional safety.
Strong obfuscation transforms code layout to conceal algorithms and data.
Multi-layered security architecture secures the entire device.
Static and dynamic anti-tamper solutions to prevent reverse engineering.
Your embedded device can be protected at any stage of development or in its life cycle.
Protects devices as international cyber policies are updated.
Easily incorporated into existing software flow.
Compatible with all toolchains.
Only requires access to binary files.
Developed for devices with limited memory and minimum speed.
Optimizes protection for size or speed.
Protect the entire software or only critical modules.
Our binary transformation technology guarantees that the original software semantics are preserved, even with our added security functionality. The user can choose which sections of code need to be protected, how strongly and also which sections cannot be translated due to real-time constraints. We use formal proofs such as translation validation to ensure the correctness of our translations. In addition, we adhere to ISO 26262 functional safety standards.
View our FAQs to learn more about our solution.
Our functional safety compliant and trusted solution protects your embedded system.