IoT & Hardware Security
IoT & Hardware Security Testing
Secure the Physical Devices That Run Your Operations
Connected devices — industrial controllers, medical devices, smart building systems, consumer IoT, and embedded hardware — expand your attack surface beyond software into the physical world. Once an IoT device is compromised, attackers gain persistent access that is often impossible to detect with traditional monitoring. SIRI Law LLP’s hardware security team combines firmware analysis, hardware interface testing, and protocol analysis to identify vulnerabilities before they are exploited.
Overview
IoT & Hardware Security Testing: Technical Depth Meets Legal Oversight
IoT security is fundamentally different from application or network security. Devices often lack security update mechanisms, use hardcoded credentials, transmit data over unencrypted radio protocols, and expose debugging interfaces that were left enabled after manufacturing.
Our hardware security team brings hands-on expertise in embedded systems — including binary reverse engineering, firmware extraction via JTAG and UART interfaces, and protocol analysis across Bluetooth, Zigbee, Z-Wave, BLE, and LoRa.
We assess devices in your real operating context — not just in isolation — to understand how a compromised device could be used to pivot into connected backend systems or affect operational processes.
AI-Powered Edge Device Security
AI inference is moving to the edge — devices running on-device ML models, computer vision pipelines, and embedded neural networks face unique attack vectors including model extraction, adversarial input attacks at the hardware level, and side-channel attacks against inference computation.
We assess AI edge devices against both traditional IoT attack vectors and emerging AI-specific threats, including physical adversarial attacks on camera-based ML systems and model extraction from edge inference hardware.
Services Offered
What We Handle
- Firmware extraction and static binary analysis
- Firmware dynamic analysis — emulation, fuzzing, runtime analysis
- Hardware debugging interfaces — JTAG, UART, SPI, I2C testing
- Wireless protocol security — BLE, Zigbee, Z-Wave, LoRa, Wifi
- Mobile application security (companion apps) — Android & iOS
- Cloud backend and API security for IoT platforms
- Secure boot mechanism bypass and firmware update security
- Hardcoded credential discovery and extraction
- Bootloader security and secure element assessment
- Side-channel attack analysis — power, timing, electromagnetic
- Industrial control system (ICS/SCADA) security testing
- Medical device security assessment (FDA/MDR context)
- Smart building and physical security system assessment
- AI edge device security — on-device ML model extraction
Client Benefits
Why Clients Choose SIRI Law LLP
Real Hardware Expertise
We work with physical devices, oscilloscopes, logic analysers, and soldering equipment — not just software emulation. Real hardware assessment reveals real vulnerabilities.
Full Attack Surface Coverage
Device, firmware, wireless protocols, companion app, and cloud backend — we assess the complete attack surface, not just the device in isolation.
Medical Device & ICS Specialisation
Specialist knowledge of healthcare device regulation (MDR, FDA) and ICS security standards (IEC 62443) for regulated environments.
Responsible Disclosure Support
For consumer device manufacturers, we provide responsible disclosure advisory — helping navigate CVE reporting, vendor notification, and public disclosure timelines.
Representative Matters
Typical Engagements
All matters described generically to protect client confidentiality.
Medical Device Assessment
Identified unauthenticated Bluetooth Low Energy communication in a medical monitoring device — allowing an attacker within BLE range to send arbitrary commands. Reported to manufacturer with responsible disclosure coordination.
Industrial Controller Security
Extracted and reverse-engineered firmware from an industrial PLC — discovering hardcoded administrator credentials used across all device deployments globally. Critical finding with supply chain implications.
Smart Building System
Assessed a building management system — identifying cleartext Modbus communication between controllers and a direct path from the building network to corporate IT infrastructure.
Consumer IoT Security
Conducted a comprehensive security assessment of a consumer smart home hub — identifying 7 vulnerabilities including UART root shell access, hardcoded API keys, and unencrypted cloud communications.
What to Expect
Client Outcomes
Detailed Firmware Analysis Report
Full static and dynamic analysis results — including identified functions, hardcoded credentials, encryption weaknesses, and attack surface mapping.
Hardware Test Evidence
Photographic and video evidence of hardware interface access, protocol captures, and exploitation demonstrations.
Regulatory Context
Findings are framed in the context of relevant regulations — MDR for medical devices, IEC 62443 for industrial systems, ETSI EN 303 645 for consumer IoT.
Frequently Asked Questions
Can you test our device before we ship it?
Yes — and pre-ship security assessment is our most strongly recommended engagement type for device manufacturers. Security issues found before manufacturing are orders of magnitude cheaper to fix than post-market. We offer both early-stage architecture review and full hardware penetration testing of final prototype units.
Do you need multiple units of our device?
Typically we request 2–3 units for a thorough assessment — one for non-destructive testing, one for potentially destructive hardware access (e.g., decapping, desoldering), and a spare. For early-stage assessments, a single unit is sufficient.
Can you assess our device remotely?
Wireless protocol analysis, mobile application testing, and cloud backend assessment can be conducted remotely. Physical hardware interface testing (JTAG, UART), firmware extraction, and side-channel analysis require devices to be present at our lab or an assessor on-site.
Ready to Strengthen Your Security Posture?
We begin every engagement with a scoping call — no commitment required.
Also see: All Cybersecurity Services · Cloud Security Testing

