How do we analyze?¶
Explore how ONEKEY analyzes firmware and identifies security vulnerabilities.
In this section, you can learn more about:
Tip
Click on an arrow to open the relevant page.
- How ONEKEY extracts a firmware using unblob.
- Supported formats and filesystems.
- How ONEKEY analyzes the extracted data.
- RTOS detection, 0-day binary analysis and binary hardening.
- How the platform identifies software components.
- Matching CVEs with identified components.
- Security issues the platform can identify and how to mitigate them.