Our offerings include:
Mobile & Embedded Systems
Battelle has decades of experience producing, supporting and enhancing mission-focused field tools for government clients including:
State-of-the-art facilities, including:
Hardware Security Research Lab – boasts wide-ranging, in-house hardware security R&D tools, equipment and facilities that are staffed by a team of highly qualified embedded systems engineers, physicists and mathematicians.
Mobile Systems Analysis Lab – where Battelle uses its experience and expertise to address the rapidly growing number of diverse mobile and wireless devices.
Automotive Security Research
Battelle offers expansive expertise in automotive research and development – from building vehicles to keep military personnel safe to connected vehicle solutions.
Learn more about how Battelle is helping industry and government analyze the threat of automotive cyber attacks by way of understanding attack vectors, identifying threats and generating solutions.
Achieve cyber mission success.
Contact one of our experts today to learn more.
Custom Software Resources
The Mission-Focused Tools team utilizes a number of custom, proprietary software resources to reduce time and increase efficiency, effectiveness and mission success.
Examples of these tools include:
Visual Analysis & Reverse Engineering
At its core, Battelle CantorDust™ is a visual analysis and reverse engineering tool that analyzes binary data to find weaknesses and malware.
Battelle engineers also utilize CantorDust to rapidly process binary data—examining huge quantities in a just seconds. It then displays the data in a visual format, allowing analysts to obtain unmatched insight into data structure, allowing extraction and analysis of previously invisible patterns and relationships.
Anonymous Internet Communication Technology
Battelle PEAR™ allows discreet conduct of online activity without attribution via optimization to keep network connections secure and impenetrable. PEAR effectively eliminates the possibility of adversaries using more common attacks on a secure network.