Research Blog
Stay up to date with the newest security advisories, vulnerability reports, and platform developments—keeping your products secure and compliant.
Featured research articles
All research articles
Binary Static Analysis - The Final Frontier
Uncover ONEKEY's new Binary Zero-Day Identification feature, designed to identify vulnerabilities in executable binaries. Click now to find out more.
Latest Developments in Unblob (3)
Discover the latest developments in UNBLOB. Explore FileSystem Sandboxing, UI enhancements, and advanced Pattern Identification in our latest blog post 👇️
Making TOCTOU Great again - X(R)IP
ONEKEY Seucrity Insight: Delve into TOCTOU vulnerabilities in embedded systems utilizing XiP. Discover how these gaps at the hardware level can compromise secure boot processes.
Security Advisory: Clock Fault Injection on Mocor OS - Password Bypass
Discover the critical vulnerabilty in the Mocor OS on UNISOC SC6531E devices that allows unauthorised users to bypass locks via clock fault injection.
Security Advisory: Unauthenticated Remote Command Execution in Multiple WAGO Products
Security Advisory: Critical unauthenticated command injection vulnerability in the "Legal Information" plugin of the WAGO Series PFC100 web interface.
Latest Developments in Unblob (2)
Revolutionize firmware extraction with UNBLOB! Discover the latest developments & advancements in this cutting-edge project. Don't miss latest blog post!
Leveraging ChatGPT to build a Hardware Fault Injection Tool.
This security insight explores the process of building an AI-assisted Teensy-based fault injection framework for testing system security. Learn more here!
check out white papers
Explore in-depth whitepapers on cybersecurity and compliance, designed to strengthen your product’s security and compliance.
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.