ObjectSecurity Capabilities
Experience and Track Record.
We Can Prove It.
Our innovative technologies and capabilities include:
We are experts in binary vulnerability analysis automation, incl. for embedded systems such as OT/ICS devices, ECUs and more. This includes automated reverse engineering, weakness analysis, vulnerability analysis, software composition analysis, static analysis, dynamic analysis, AI/ML based binary analysis and more. See our leading binary vulnerability analysis automation product ObjectSecurity OT.AI Platform for more.
We have strong Artificial Intelligence and Machine Learning (AI/ML) capabilities, and are leading experts in safe, responsible, and trusted AI/ML. We have the capabilities to fine-tune and optimize LLMs using advanced techniques. We are also skilled in enabling effective and save use of AI for business. See our AI/ML Trust Analysis product for more.
Our innovative technologies ingest and analyze supply chain data, and detect risks and anomalies. We are using graph analysis based, statistical, heuristical, algorithmic, and AI/ML based approaches. See our SCRAMS product for more.
We have over two decades of thought leadership and excellence in Zero Trust access control, including fine-grained, contextual, attribute-based access control. Our innovative, award-winning technologies make authoring access policies easier, and enforcing them more effective. See our OpenPMF product for details.
Our 5G experts are developing technologies to automatically detect 5G networks, then characterize the devices and analyze the network for cybersecurity vulnerabilities. The automated technology uses state-of-the-art machine learning (ML) models for deep learning and the latest software-defined radio technology to efficiently monitor the 5G spectrum and effectively classify weaknesses in the network that an attacker could exploit. Our Char5G prototype is implemented on FPGA/SOC
We have extensive expertise in data cleansing and preprocessing, including from multiple legacy data sources (e.g. procurement data, MRO and logistics data, data for AI/ML etc.). For example, we developed a Data Cleansing Platform (DCP) technology under our “TAV-SCRAMS” MRO optimization project.
We developed innovative technologies to analyze printed circuit boards (PCBs) and their components using AI/ML and patented approaches to avoid reliance on “golden units”. See our AFMEP Microelectronics Supply Chain Provenance project (integrated in our SCRAMS product) for details.
We are experts in modeling complex data in graph databases, as well as ingesting data. For example, our SCRAMS, TAV-SCRAMS and AFMEP technologies ingest relevant information from complex procurement systems into graphs to make them analyzable.
Our technologies and projects include SemanticXWiki, an open source technology we developed under an ESA funded project.
We have over 20 decades of experience in application, middleware, microservice, container security, including secure architecture, development, integration, assessment, technical support etc. We also continue to maintain SecureMiddleware™, which includes a mature legacy open source CORBA middleware with security extensions.
We provide highly skilled professional services around our core capabilities, including AI/ML consulting, binary analysis services, contract R&D, technical expert witness, training, advisory etc.