Blog

Some Use Cases and Discussion
Voyager Analytics: BlueRiSC Maritime Systems Solution
Voyager Analytics: BlueRiSC Maritime Systems Solution 800 450 Yeasir Pervej

At BlueRiSC, Inc., we develop state-of-the-art embedded system solutions in sensing applications as well as security. We understand the demand for advanced sensing solutions combined with AI-drive analytics in both commercial and defense markets.In August…

read more
ThreatSCOPE Use Case: Healing the Heartbleed OpenSSL vulnerability
ThreatSCOPE Use Case: Healing the Heartbleed OpenSSL vulnerability 1024 555 BlueRiSC

In this previous post we showed how ThreatSCOPE can be used to identify and analyze the HeartBleed vulnerability in the OpenSSL library. In this post we will show how ThreatSCOPE can be used to insert…

read more
Building Trust in Mobile Devices with BlueRiSC MRoT
Building Trust in Mobile Devices with BlueRiSC MRoT 467 310 BlueRiSC

The mobile device market has grown tremendously and affects every facet of human life. Mobile attacks can disrupt life-saving operations, endanger personnel, and expose government systems to exploitation. These threats will continue to grow and…

read more
ThreatSCOPE Use Case: Analyzing the Heartbleed OpenSSL vulnerability
ThreatSCOPE Use Case: Analyzing the Heartbleed OpenSSL vulnerability 450 310 BlueRiSC

To show the applicability of ThreatSCOPE as an analysis tool for real-world vulnerabilities we highlight its capabilities by performing a vulnerability-centric reverse engineering of the OpenSSL library. This example captures the connection points, vulnerability points,…

read more
Bypassing Windows Login Passwords with CaptureGUARD Gateway for Forensic Acquisition
Bypassing Windows Login Passwords with CaptureGUARD Gateway for Forensic Acquisition 467 310 BlueRiSC

Live memory acquisition is becoming increasingly important for digital investigations. One of the biggest obstacles with memory acquisition, however, is that in many cases a computer under investigation is locked, requiring a password that is…

read more
BlueRiSC DFI New Article (Digital Forensics Investigator): Hardware-Assisted Advanced Forensics and Cyber Threat Detection
BlueRiSC DFI New Article (Digital Forensics Investigator): Hardware-Assisted Advanced Forensics and Cyber Threat Detection 1024 682 BlueRiSC

The goal of any computer investigation is to obtain as much evidence as possible from the computer, while at the same time ensuring the integrity of the evidence. It is equally important that investigators are…

read more