- Detailed description of the testing process and attack protocols;
- Information about existing and potential vulnerabilities of the SIM/USIM;
- Description of the attacks and unusual SIM/USIM responses;
- Conclusion about the possibility of obtaining confidential information from SIM/USIM;
- Conclusion about possibility of compromising SIM/USIM;
- Recommendations for improving SIM/USIM security.
Device security testing
What you get
Questions? Please complete the form to have a sales expert contact you to discuss your business needs as soon as possible.