Menu
Object
SIM card
Methods
Device security testing 
Reverse engineering

What you get

  • Detailed description of the testing process and attack protocols;
  • Information about existing and potential vulnerabilities of the SIM/USIM;
  • Description of the attacks and unusual SIM/USIM responses;
  • Conclusion about the possibility of obtaining confidential information from SIM/USIM;
  • Conclusion about possibility of compromising SIM/USIM;
  • Recommendations for improving SIM/USIM security.

Contact sales

Questions? Please complete the form to have a sales expert contact you to discuss your business needs as soon as possible.