Security measures for software for IoT devices required in the DX era.
We offer "ATTC Control Flow Integrity," the definitive solution for defending against buffer overflow attacks that fundamentally resolves BOF vulnerabilities without the need for source code changes. Eliminating cyber attacks through return address tampering. "Our monitoring process detects return address tampering." "Embedding tampering detection functionality into the program itself" provides dual-layer defense to completely neutralize return address tampering attacks. 【Features】 ■ Fundamentally disables ROP attacks ■ Minimal burden on users ■ Low cost ■ Small overhead *For more details, please download the PDF or feel free to contact us.
Inquire About This Product
basic information
【Available Platforms】 ■Devices ・Raspberry Pi 4 2GB/4GB/8GB ・Raspberry Pi 3 model B+ ■OS ・Raspberry Pi OS (32bit Raspbian GNU/Linux 10 (Buster)) ・with desktop ■Base Software ・gcc (Raspbian 8.3.0-6+rpi1) or higher ・GNU make 4.2.1 or higher, etc. *For more details, please download the PDF or feel free to contact us.
Price range
Delivery Time
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(2)
Download All CatalogsCompany information
Our company is a security firm with unique technology that fights and challenges unknown threats. Based on high technical capabilities in network, application, and architecture, we pursue unknown threats with a strong commitment to security and create solutions when none exist. We develop groundbreaking solutions that are not constrained by conventional wisdom, and we proactively think about what our customers will want next and take action to realize it. Please feel free to contact us with your requests.