Any Questions?
To get in touch with our team, please visit the contact page below.
Contact UsLorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique. Duis cursus, mi quis viverra ornare, eros dolor interdum nulla, ut commodo diam libero vitae erat.
Radiance applies VR/RE expertise beyond weapon systems to new classes of embedded computing devices and cyber-physical systems--ICS, energy grid infrastructure, and mission essential operational technologies.
We support software and hardware reverse engineering on a wide range of weapon systems for NGIC, MSIC, and NASIC.
Radiance has experience designing and building microelectronics in FPGA and ASIC form that are resistant to side-channel attacks and cryptographic key extraction.
Our team provides state-of-the-art research developing Protected Technology products for sale. These products include volume protection, x-ray detection and classification, and cryptographic solutions with Physically Unclonable Function (PUF) integration.
Radiance develops binary instrumentation packages, tracing solutions, timing solutions, custom processor modules, reverse engineering scripts, and weapon systems focused dynamic analysis tools to aid exploitation and promote vulnerability discovery.
Our team develops custom carvers and recovery reduction tools to increase the types of files recovered and lessen the triage time to analyze recovered data.
We can provide a highly scalable, component-level network vulnerability analysis revealing risk profile and mitigation opportunities down to the component and sub-system levels.
Radiance has developed tools for verifying hardware design including validation of legacy systems to identify vulnerabilities and create exploits.
One of Radiance’s strengths includes our experience exploiting embedded and special purpose computers. We apply this expertise to weapon systems, ICS/SCADA controls, energy grid applications, vehicles, network, communications, and other cyber-physical and Internet of Things (IoT) systems.
Radiance provides technical support to 5G advanced feature set to include cloud native services, service base and zero trust architecture, network functions, virtualization, and network slicing.
In support of OUSD R&E, we conduct experiments and demonstrations of 5G supporting operational C2 communications, data exchange, and applications for urban, regional, and national emergencies.
Our team delivers scientific and engineering expertise for studying, researching, planning, developing, testing, and evaluation of 5G technology to improve the warfighter experience by delivering modern, robust, secure, and reliable communications.
We research & develop techniques to discover, analyze, and mitigate vulnerabilities, & develop tools to harden/secure 5G systems.
Our team of experts develops instrumentation packages for range testing and conducts thorough lab experimentation before deploying to the range. We also provide on-site data collection and operator support to ensure a seamless testing process. Our post-event analysis provides deep-dive analytical support to explain the reasons for technique success or failure.
Our expertise in developing high fidelity models is used in cyber and electronic warfare testing, including developing high fidelity sensor models, specialized hardware emulations, and whole system emulations of weapon systems.
We support Mission Partners to accelerate technology transition to the warfighter with operational cyber systems, platforms, CONOPs, & TTPs.
Radiance applies a diverse skill set of strong AI/ML fundamentals that enable tackling a wide range of problems and applications with robust, on-premises HPC resources.