Today’s threat landscape for commercial off-the-shelf (COTS) drones is developing at a rapid pace and threatens both our domestic safety and military abroad. Adversaries are building and selling sophisticated, low cost components that can be weaponized, including radio frequency (RF) jamming and non-kinetic methods. Red Balloon offers end-to-end cybersecurity support for UAS manufacturers and operators, including: secure UAS and ground control design consulting; supply chain assurance through red team assessments; and intrusion detection solutions to protect UAS against attacks at the hardware and firmware level.
With cyber threats becoming more sophisticated, ensuring the security of your UAS is critical. Our embedded security experts provide comprehensive consulting services to secure your UAS and ground control infrastructure design. From threat modeling and identifying vulnerable security architectures to advising on hardware/software components and recommending security implementations, our consultants deliver holistic support to help secure your UAS and ground control systems against the latest threats.
Our embedded security experts have extensive experience with penetration testing embedded devices. We bring this expertise to our UAS red teaming services by leveraging advanced reverse engineering techniques at both the hardware and firmware level ranging from black box to white box assessments. Our team demonstrates how a dedicated adversary could exploit a particular embedded system and characterize the mission threats that depend on the compromised device. Red Balloon Security’s engineering activity includes, but is not limited to: firmware static and dynamic analysis, hardware/supply chain analysis, identification of hardware or software vulnerabilities, and security recommendations.
Our Symbiote solution provides runtime protection of device firmware and is designed specifically for embedded devices. Symbiote continuously monitors firmware in real-time for any modifications to critical conditions of the device, including corruption of device memory, control flow, and processes. Symbiote is embedded into the firmware of UAS and ground control infrastructure and can deliver both detection and prevention against cyber attacks.
Sal Stolfo was an original founding member of Red Balloon Security, Inc.
Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.