Securing the Internet of Things

Widespread connectivity of consumer electronic devices is intended to expand and enhance the user experience, but has also led to numerous attack vectors and intrusions into consumer’s personal information and corporate intellectual property.

Common vulnerabilities:

  • Insecure communications
  • Unauthenticated software updates
  • Software vulnerabilities
  • Unpatched operating systems
  • Unfettered physical access
  • Consumer information exposure
  • IP Theft / Counterfeiting

Star Lab solutions:

  • Secure boot
  • Software/data encryption
  • Jailbreak prevention
  • Positive control of resources
  • Trusted update mechanisms
  • Mandatory access control
  • Tamper resistance
  • IP protection


Star Lab security products assume a worst-case threat scenario: a hands-on physical attacker and/or root-level virtual attacker. These threat models, combined with years of experience performing red-team assessments helps to ensure that our defensive solutions are up to the challenge of protecting sensitive software against even the most dedicated attackers.

Do you have electronics-related security needs?

Contact Us