Emproof will be at Embedded World North America this November to talk about why embedded security often fails and how manufacturers can defend themselves against rising IP theft, exploitation, and regulatory risk.
In spite of widespread use of cryptography, hardware security, and network protection, embedded devices remain vulnerable to software reverse engineering and exploitation. Attackers routinely use free tools like Ghidra to steal proprietary algorithms and code, hardcoded keys, bypass controls, and to identify weaknesses in software – posing serious risks to intellectual property, safety, and compliance.
“Many OEMs already use good security practices but are still at risk because binary-level attacks are fast, accessible, and all too often overlooked,” said Brian Kelly, CEO, Emproof. “We’re helping teams strengthen protection where it matters most, without disrupting how they build.”
At its booth, Emproof will demonstrate how embedded developers and manufacturers can protect their binaries from these threats without redesigns, source code access, or hardware changes.
Visitors can interact with a live side-by-side demo running on real embedded boards, comparing how unprotected and protected firmware behave under analysis. The demo shows how attackers use widely available tools to reverse engineer embedded software, and how Emproof Nyx prevents code, keys, and functionality from being exposed, while maintaining performance and compatibility and integrating easily with existing architectures and toolchains.
On 5th November, Dr Nils Albartus, Technical Solutions Director at Emproof, will present ‘Why Embedded Security Fails, and What to Do About It’ as part of the Safety & Security conference track.
The session will investigate real-world attack paths and show why common protections break down in practice — and what embedded teams can do differently to defend their software.
Emproof Nyx secures software by making it harder to reverse engineer, tamper with, or exploit. It also supports compliance with emerging regulations such as the EU Cyber Resilience Act and the US Cyber Trust Mark, both of which emphasise stronger protections for connected devices.
At Embedded World North America, visitors to the Emproof booth will learn how to:
- Prevent reverse engineering of binaries and proprietary algorithms
- Protect cryptographic keys and secrets from extraction
- Enforce license controls and feature restrictions in deployed code
- Add runtime safeguards such as control-flow integrity and stack canaries
- Retrofit protection into third-party or legacy firmware with no source code