CONSULTING
We draw on our experience in the infrastructure and security arenas to advise on project viability and to help the development of innovative applications.
We specialize in convergence, researching new attack vectors and defenses which cross the boundaries between software and hardware.
We assist technical departments and software development teams of major organisations around the world with our R&D team expertise.
PROJECTS

Inverse Path staff is routinely active in creating new security research projects, many of which have been featured at conferences like BlackHat, CanSecWest, DEFCON, HITBSecConf, PacSec among others.

Here is a selection of our most popular research projects:

"Fully arbitrary 802.3 packet injection: maximizing the Ethernet attack surface"


A research featuring novel techniques for security testing of network equipment. Abstract, slides and tools are available.

"Chip & PIN is definitely broken - Credit card skimming and PIN harvesting in an EMV world"


A security overview of the EMV protocol featuring new findings regarding PIN interception. Abstract and slides are available.

"Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage"

A project about new and unconventional TEMPEST techniques. Abstract, slides and white paper are available.

"Unusual Car Navigation Tricks: Injecting RDS-TMC Traffic Information Signals".

Our research about satellite navigation systems. Abstract, slides and released tools are available.

OPEN SOURCE

Inverse Path is involved in open source in many ways. We write and release several open source tools relating to security and network management. We audit and release fixes for other open source software.

Here is a selection of the projects we are actively involved with: