arrows arrow-right arrow-left menu search rss youtube linkedin twitter facebook arrow-play

Custom Software & Hardware Solutions

Our rapid prototype development and advanced technology are suitable for special mission deployment.

Mission-Focused Tools

Battelle helps you gain rapid tactical advantage and improves mission outcomes by developing security solutions that combine hardware and software vulnerability discovery, reverse engineering capabilities and cyber forensics expertise with specialized tools and facilities. 


Our offerings include:

Mobile & Embedded Systems

Battelle has decades of experience producing, supporting and enhancing mission-focused field tools for government clients including:

  • Vulnerability discovery

  • Reverse engineering

  • Unique embedded system design and engineering

  • Software development

  • Rapid prototyping

  • Testing and limited-quantity manufacturing

State-of-the-art facilities, including:

Hardware Security Research Lab
– boasts wide-ranging, in-house hardware security R&D tools, equipment and facilities that are staffed by a team of highly qualified embedded systems engineers, physicists and mathematicians.

Mobile Systems Analysis Lab – where Battelle uses its experience and expertise to address the rapidly growing number of diverse mobile and wireless devices.

Automotive Security Research

Battelle offers expansive expertise in automotive research and development – from building vehicles to keep military personnel safe to connected vehicle solutions. Learn more about how Battelle is helping industry and government analyze the threat of automotive cyber attacks by way of understanding attack vectors, identifying threats and generating solutions.

Achieve cyber mission success.
Contact one of our experts today to learn more.
Contact Us

Custom Software Resources

The Mission-Focused Tools team utilizes a number of custom, proprietary software resources to reduce time and increase efficiency, effectiveness and mission success.

Examples of these tools include:

Visual Analysis & Reverse Engineering
At its core, Battelle CantorDust™ is a visual analysis and reverse engineering tool that analyzes binary data to find weaknesses and malware.

Battelle engineers also utilize CantorDust to rapidly process binary data—examining huge quantities in a just seconds. It then displays the data in a visual format, allowing analysts to obtain unmatched insight into data structure, allowing extraction and analysis of previously invisible patterns and relationships.

Anonymous Internet Communication Technology
Battelle PEAR™ allows discreet conduct of online activity without attribution via optimization to keep network connections secure and impenetrable. PEAR effectively eliminates the possibility of adversaries using more common attacks on a secure network.


Vehicle Cyber Security
Battelle is helping industry and government analyze and develop solutions to vehicle cyber security threats through hardware and software vulnerability discovery, reverse engineering, cyber forensics and specialized tools and facilities. Learn more


From research to development to operational deployment, Battelle provides focused expertise and solutions across the full spectrum of computer and system architectures—from the smallest component to worldwide systems. Look to us for expert rapid prototype development and advanced technological solutions suitable for special mission deployment.

Accelerating Cyber Vulnerability Analysis with Binary Files Rendered as Images


The keystone of cyber vulnerability analysis involves accurate scrutiny of binary data consisting of ones and zeros. A typical suspect data stream may contain billions of ones and zeros complicating the analysis process. Traditional analytic tools rely on binary files being organized in a standard structure with header and signature. Unfortunately, malware often modifies established structure in order to hide malicious code. A modified structure breaks traditional tools, which forces analysts to manually examine mountains of raw data with a hex editor. Manual analysis of a data stream requires skilled experts doing tedious work that can take weeks or months. Even then, discovery of the vulnerability might occur long after execution of a hidden exploit.


Battelle created Cantor Dust, a unique interactive software tool that renders binary files as images to speed the process of data-stream analysis. By translating binary information into a visual abstraction, reverse engineers and forensic analysts can sift through mountains of arbitrary data in seconds. Even previously unseen instruction sets and data formats can be easily located and understood through their visual fingerprint. Whether searching for exploitable code, stealthy malware, cryptographic keys, or network anomalies, Cantor Dust uses advanced statistical analysis to provide new visual translation techniques that dramatically accelerate the analysis process for security investigators of all backgrounds. A primary use is condensing complex binary structure into simple visual patterns that quickly reveal deviations in structure, such as those created by steganographic techniques that hide messages in data.


Battelle’s Cantor Dust is helping reverse engineers and forensic analysts to use interactive imagery for sifting through megabytes of arbitrary data in seconds, and immediately identify structural deviations leading to identification of malware and other vulnerabilities. Without Cantor Dust, investigators must use arduous manual analysis that often yields no results.