Green Shoe Lab: IoT/ICS Security Research

Helping to Fight the Never-Ending “Cat and Mouse” Security Game

We design and build embedded systems, which means we understand—first-hand—how messy the attack surface gets when physical processes meet connected devices. IoT and industrial control environments aren’t just “IT with sensors”; the risks are broader and the stakes are higher.

We deliver end-to-end security assessments for Internet-connected products and OT deployments: teardown and hardware review (JTAG/SWD/UART exposure, tamper paths), firmware extraction and reverse engineering, secure-boot and key-management validation, RF/OTA update testing, and web/API/mobile penetration testing tied back to your cloud. In plants and buildings, we map assets and exercise ICS protocols (e.g., Modbus/TCP, DNP3, BACnet, PROFINET) to uncover unsafe states, segmentation gaps, and escalation paths.

The outcome isn’t just a bug list—it’s a prioritized mitigation plan: threat models, hardening guidance, SBOM and update strategy, and practical fixes aligned to frameworks like IEC 62443 and NIST 800-82 where applicable. Our research focuses on embedded hardware, firmware, and human-facing control surfaces (web/HMI/mobile) across consumer IoT, home/building automation, and industrial IoT.

Services at a glance:

  • Vulnerability assessments & penetration testing (hardware → firmware → RF → app/cloud)
  • ICS/OT security reviews (PLCs/RTUs/HMIs, network segmentation, protocol fuzzing)
  • Exploit reproduction & proof-of-concepts to validate real-world impact
  • Secure design & remediation support (secure boot, key rotation, OTA, SBOM)
  • Executive-level risk summaries that translate findings into uptime and safety gains

greenshoelab.com