With an ever-increasing range of connected devices and services in our homes, cities and in industrial and infrastructure settings, cybersecurity has never been so important. From payment systems to IoT and connected vehicles, our team of experts is experienced in providing evaluation, testing and certification services to help ensure that devices work together with robust security.
Applus+ is a security laboratory accredited to carry out a wide range of security evaluations for security, payment and identification schemes. We also provide cybersecurity assessment and training services to help our customers identify their needs from the very beginning of product development.
Independent Security Evaluations
The cybersecurity experts team has no knowledge or access to internal information about the target of evaluation.
The cybersecurity experts team has partial information about the target of evaluation.
The cybersecurity experts team has all the internal information about the target of evaluation.
The cybersecurity experts team audit the source to verify that the proper security controls are present and that they work as intended. Code review is a way of ensuring that the application has been developed so as to be “self-defending” in its given environment.
Evaluation for a Certification Scheme
We are an accredited laboratory to conduct security evaluations under the following certification schemes:
Applus+ has many years of experience doing security evaluations and carrying out penetration tests on all kind of TOEs. Penetration testing gives the perfect simulation of a real attack where the cybersecurity experts team try to infringe the security of the assets and check the vulnerabilities of the product.
State-of-the-art attacks and ad-hoc tools made by lab experts:
PCB HW Hacking
On Software & Firmware
Strong background in embedded systems, secure boot, TEE and white box crypto:
Binary Reverse Engineering
Source Code Audits
Dynamic Tamper / Hooking
SW Timing Analysis & CCA
On Communication Protocols
For IP stack protocols, industrial systems and proprietary protocols:
All layer attack (OSI Model) including customised HW to stimulate at lower layers (wired & wireless protocols)
Dynamic Tamper / Hooking
Note: Because Applus+ Laboratories is accredited as a third party laboratory by several evaluation and certification schemes, and in order to guarantee its impartiality, Applus+ engineers are never involved in actual product development or solutions implementation. Our independent evaluations are not accredited and their aim is to provide evaluation results to vendors who are seeking to understand the level of security of their products, despite no certificacion scheme is available yet.
Applus+ uses first-party and third-party cookies for analytical purposes and to show you personalized advertising based on a profile drawn up based on your browsing habits (eg. visited websites). You can accept all cookies by pressing the "Accept" button or configure or reject their use. Consult our Cookies Policy for more information.
Cookie settings panel
They allow the operation of the website, loading media content and its security. See the cookies we store in our Cookies Policy.
They allow us to know how you interact with the website, the number of visits in the different sections and to create statistics to improve our business practices. See the cookies we store in our Cookies Policy.
Based on your behavior on the website (where you click, how long you browse, etc.) we establish parameters and a profile for you to display ads that correspond to your interests. See the cookies we store in our Cookies Policy.