xen1thLabs

Cyber criminals with varying levels of sophistication – from lone actors to large state-sponsored teams – are working tirelessly to find zero-day vulnerabilities, new hardware and software exploits, sophisticated avenues to bypass cryptography, and new opportunities to compromise mobile devices and telecommunication networks.

Through the DarkMatter xen1thLabs, we strengthen our clients’ defences, shrink the attack surface, and limit system exploits. On behalf of consumers, vendors, and developers, our team uses advanced technologies and human intelligence to build a full understanding and assessment of any product, service or solution that we study, in order to identify vulnerabilities, backdoors and other security weaknesses across all areas of hardware, software, cryptography and mobile.

xen1thLabs operates four labs: Hardware, Software, Cryptography, and Mobile and Telecommunications — providing an integrated testing environment that covers the full spectrum of cyber security vulnerabilities.

  • Services

    The most experienced engineers employ the most advanced equipment to provide the most reliable assessments possible. Our state-of-the-art equipment includes focused ion-beams and scanning electron microscopes that allow us to examine down to the transistor… Read more

    The most experienced engineers employ the most advanced equipment to provide the most reliable assessments possible. Our state-of-the-art equipment includes focused ion-beams and scanning electron microscopes that allow us to examine down to the transistor level on a silicon chip. We also have made significant investments in side-channel analysis technologies, and high-performance GPUs (graphics processing units) and FPGAs (field-programmable gate arrays) for advanced cryptanalysis and crypto validation.

  • Hardware

    We reveal blind spots in hardware protection. Our services are based on the deep expertise of our specialists in such… Read more

    We reveal blind spots in hardware protection. Our services are based on the deep expertise of our specialists in such domains as:

    • Reverse engineering
    • Side-channel analysis
    • Imaging
    • Sectioning and visual inspection
    • Fault analysis
    • Chemical and elemental analysis
    • Circuitry analysis
    • Load and soak testing

    Our advanced knowledge, backed by technical skills and best-in-class equipment, allows us to explore security gaps across a vast spectrum that is invisible to most others. We also identify manufacturing defects and misconfigurations that can be leveraged by attackers.

  • Software

    Software remains the most attractive target for attackers looking to exploit vulnerabilities to obtain privileged rights, reach critical data or… Read more

    Software remains the most attractive target for attackers looking to exploit vulnerabilities to obtain privileged rights, reach critical data or degrade an entire solution or network. With software protection in mind, our security professionals offer white-, grey- and black-box testing services in areas such as:

    • Vulnerability assessment through dynamic analysis and fuzzing of the overall software stack
    • Software reverse engineering
    • Code review
    • Network and infrastructure penetration testing.
  • Cryptography

    Although extremely powerful, the complex nature of cryptography means it is prone to design and implementation flaws. To address this,… Read more

    Although extremely powerful, the complex nature of cryptography means it is prone to design and implementation flaws. To address this, our experts test and validate cryptographic algorithm design and implementations as an integral part of our cryptography testing and cryptanalysis services. Specific assessments include:

    • Cryptographic protocols validation
    • Algorithms and schemes cryptanalysis covering symmetric and asymmetric ciphers, as well as hash functions and derivatives
    • Hardware-based side-channel attacks
    • Testing a wide variety of cryptographic modules and FPGA-based implementations

    Testing pseudo- and true- random number generators, source of entropy and entropy management modules

  • Mobile and Telecommunications

    We identify mobile security threats across the whole software and hardware stack, covering microcode, kernel, operating system and user space.… Read more

    We identify mobile security threats across the whole software and hardware stack, covering microcode, kernel, operating system and user space. We assess mobile security challenges of any complexity, across any platform to give our clients the information needed to fortify their mobile environments.

    Test & Validation Labs also specialises in evaluating and testing wireless protocols such as 4G, 3G, 2G, Wi-Fi and IP layers.

  • Innovation Centre

    Complementing the work of the Test & Validation Labs, the Innovation Centre ensures DarkMatter and its customers remain at the… Read more

    Complementing the work of the Test & Validation Labs, the Innovation Centre ensures DarkMatter and its customers remain at the frontiers of cyber security and cyber attack abatement.

    The Centre’s software and hardware engineers and cryptographers bring to their work a sophisticated and comprehensive global perspective on the cyber threat landscape. Then, building on their expertise, they develop two types of proprietary solutions: those that harden third-party products and services, and DarkMatter’s own products and solutions designed to address current threats not adequately addressed by the market.

    This work includes looking ahead to emerging threats that may be several months or years in the future and building the cryptographic, software and hardware products and services needed to protect against these future attacks.

    Because the nature of cyber threats is one of continual evolution, the Innovation Centre represents the most advanced thinking and state-of-the-art approach to tomorrow’s cyber threats. It represents our promise to our customers to provide truly secure end to end communications and the broader information assurance that they require.