Dropbox Client Research: Get Code, Emulate MiM Attack – to Protect Sensitive Data
Reverse engineering techniques were applied to the Dropbox application to implement advanced Dropbox compatibility for a DLP solution
Reverse engineering techniques were applied to the Dropbox application to implement advanced Dropbox compatibility for a DLP solution
Business case study about DLP system creation with some unique security features: file system drivers, clipboard protection, temporary file encryption...
Apriorit Research Department case on reverse engineering (see PDF) of halmacpi.dll file to learn Windows 7 power management stages and perform hardwar...
Business case study about development of specific PC solution for mobile device data acquisition and synchronization
Apriorit Research Department case on reverse engineering (see PDF) of internal Windows APIs to provide kernel-level Windows file system filtering. Thi...
Apriorit Research Department case on reverse engineering (see PDF) of network bridges creation in Windows 8 by means of internal APIs. This reverse en...
Business case study about corporate security system development to support multiple client monitoring agents (process monitoring, service monitoring...
Business case study about mobile OS virtualization and development of the "switch" between virtual OS on an Android device. This important mobile virt...
Business case study about the development of the low level disk interaction project engaging boot loaders, disk drivers, deep research
Business case study describing backup system creation with some advanced features
Tell us about
your project
...And our team will:
Do not have any specific task for us in mind but our skills seem interesting? Get a quick Apriorit intro to better understand our team capabilities.