Hero

APPLIED RESEARCH

elttam’s Applied Research service helps organisations understand and respond to nuanced security challenges which requires deep security expertise.

Our team has specialised skills assessing emerging technologies, supply chain security, and security products and controls.

coverage

Research-driven assessments

Areas of expertise

Emerging Technologies
Emerging Technologies
Supply Chain Security
Supply Chain Security
Mitigating Controls
Mitigating Controls
Security Features and Products
Security Features & Products
Open-source Software
Open-source Software
Vulnerability Research
Vulnerability Research






approach

Deep technical expertise for niche challenges

In today’s world the threat landscape is always evolving. With many organisations building technologies that are highly targeted by skilled threat actors, which requires them to extend beyond typical assurance practices to apply research to support focusing on high-risk attack surfaces and nuanced vulnerabilities.

At elttam, our team has experience working alongside leading organisations that have advanced threat models, where deep technical expertise is essential to understand the relevant threats to uncover tangible insights and drive strategic countermeasures.

Outcomes

Deliverables

For our applied research assessments, we tailor the deliverables in accordance with our customers requirements. This often includes a technical report and supporting technical artefacts, proof-of-concept code, and bespoke tooling.

Icon Identify advanced security vulnerabilities
Icon Understand critical supply chain risks
Icon Stay on the pulse of emerging threats
Icon Bolster critical security controls

Latest from Our Blog

view all articles
Blog A Monocle on Chronicles

By Matt October 02, 2024

This post provides an overview of Talkback Chronicles for viewing snapshots of trending infosec resources for points in time, and also how to subscribe to a new weekly Newsletter feature.

Blog DUCTF 2024 ESPecially Secure Boot Writeup

By daniel August 01, 2024

This blog post covers a DUCTF 2024 pwn challenge called "ESPecially Secure Boot", which required writing an exploit for CVE-2018-18558.

Blog plORMbing your Prisma ORM with Time-based Attacks

By Alex Brown July 08, 2024

Part two of our ORM Leak series about attacking the Prisma ORM and leaking sensitive data in a time-based attack.