DEVELOPMENT OF BLOCKCHAIN STORAGE
- Safe environment for handling key material
- Inaccessibility of key material from the network
- Securing transactions by using a proprietary virtual machine
CRYPTOGRAPHIC WALLETS
- Design of an architecture and development of software for cryptographic wallets
- Compliance of the developed cryptographic wallets with hardware platform security requirements
- Use of well-known and proprietary cryptographic protection algorithms
- Ability to integrate the cryptographic wallet into existing hardware platforms supporting various data transfer technologies (NFC, Bluetooth, GSM)
INVESTIGATION OF INFORMATION SECURITY INCIDENTS
Investigation of information security incidents on blockchain platforms
- Conducting expert forensics activities in the field of violations of the security status of cryptographic exchanges, currencies, ICO programs and blockchain platforms as a whole
- Detection of identification characteristics of users of cryptographic currency wallets
- Identification of potentially dangerous Ethereum smart contracts
AUDIT OF BLOCKCHAIN PLATFORMS
- Evaluation of the security virtual machines blockchain platforms via software reverse engineering and static analysis of its source codes
- Static analysis of source codes of smart contracts
- Introduction of protective properties in smart contracts
- Construction of the state transition graph smart contract and identification of the fixed states smart contract
DESIGN AND DEVELOPMENT OF SERVICES
DESIGN AND DEVELOPMENT OF SERVICES FOR EXCHANGE, TRADE AND PAYMENTS IN CRYPTOASSETS
- A single solution for the most popular cryptocurrencies
- Centralized crypto assets exchange
- Carrying out payments in crypto assets by trade enterprises (acquiring)
- Organization of the trading terminal of the crypto assets trader with a flexible system of limit policies and security of trade operations
- Combined bank cards with accounts in fiat and cryptographic currencies
AUTOMATED SCANNING OF DARKNET
- Aggregation of useful data from darknet networks (TOR, I2P, etc.) with the purpose of detecting abnormal activities of cryptographic wallets
- Identification of a set of characteristics of cryptographic wallets from darknet
- Development of automated utilities for scanning cryptographic wallets and their activity in darknet networks
MONITORING OF BLOCKCHAIN PLATFORMS CONDITIONS
Tracking the activity of cryptographic wallets of different currencies with the aim to identify indirect identification features of wallet holders
DECENTRALIZATION OF ENTERPRISE INFORMATION SYSTEMS
Transfer of centralized enterprise infrastructures to the blockchain technology using a proprietary virtual machine or on the basis of Ethereum
CRYPTOGRAPHIC CURRENCY
Development of cryptographic currencies and their provision with special properties