Card image Card image

Look at some of our
security case studies

Cybersecurity AI case studies
report

Robotics - CAI and alias0 on:
Mobile Industrial Robots (MiR)

CAI-powered security testing of MiR (Mobile Industrial Robot) platform through automated ROS message injection attacks. This study demonstrates how AI-driven vulnerability discovery can expose unauthorized access to robot control systems and alarm triggers.

Threat Modeling Premium ARM

Web - CAI and alias0 on:
Mercado Libre's e-commerce

CAI-powered API vulnerability discovery at Mercado Libre through automated enumeration attacks. This study demonstrates how AI-driven security testing can expose user data exposure risks in e-commerce platforms at scale.

EIC Accelerator case studies
Threat Modeling Premium ARM

Threat Modeling:
Premium AMR1 manufacturer's autonomous mobile robots.

A cybersecurity threat model analysis of Premium AMR1, an autonomous mobile robot (AMR) used in industrial automation. This study assesses cyber risks and attack surfaces, providing recommendations for securing robotic fleets.

Threat Modeling Low Cost ARM

Threat Modeling:
Low cost AMR1 manufacturer's autonomous mobile robots.

A cybersecurity threat model analysis of low cost AMR1, an autonomous mobile robot (AMR) used in industrial automation. This study assesses cyber risks and attack surfaces, providing recommendations for securing robotic fleets.

report

Robotics - CAI and alias0 on:
Mobile Industrial Robots (MiR)

CAI-powered security testing of MiR (Mobile Industrial Robot) platform through automated ROS message injection attacks. This study demonstrates how AI-driven vulnerability discovery can expose unauthorized access to robot control systems and alarm triggers.

Product case studies
Services case studies
report

Threat model: Pick & Place with a
ROS 2 manipulator

This cyber security case study shows a threat model performed in a fully modular ROS 2 articulated robotic arm. The application considered is MARA, a modular robot operating on an industrial environment while performing a pick & place activity.

report

Penetration testing: Low cost
commercial drone

This cyber security case study presents a brief penetration testing report alongside a novel exploit demonstration affecting the Tello Drone by Ryze and DJI.

Do you have
any questions?

Get in touch with our team and we'll do our best to get back to you.

Let's talk