Skip to content

How do we analyze?

Explore how ONEKEY analyzes firmware and identifies security vulnerabilities.

In this section, you can learn more about:

Tip

Click on an arrow to open the relevant page.

  • How ONEKEY extracts a firmware using unblob.
  • Supported formats and filesystems.
  • How ONEKEY analyzes the extracted data.
  • RTOS detection, 0-day binary analysis and binary hardening.
  • How the platform identifies software components.
  • Matching CVEs with identified components.
  • Security issues the platform can identify and how to mitigate them.