Legacy sustainment without source
A discontinued vendor's product is still in production and the source or design files are gone.
Reverse Engineering
Software, hardware, firmware, mechanical, security, and protocol analysis. Six specialist disciplines covering binary analysis, decompilation services, PCB reverse engineering, IC analysis, firmware extraction, and protocol documentation — all under NDA.
All engagements operate under mutual NDA with documented chain-of-custody for physical samples.
Overview
Reverse engineering services recover the design, logic, and behavior of systems whose source, specifications, or design files are unavailable, untrusted, or insufficient. The work spans every layer where engineers ask “what does this thing actually do?” — compiled software, embedded firmware, integrated circuits, mechanical assemblies, and proprietary protocols.
Our reverse engineering services produce evidence-grade artifacts — annotated source, schematics, specifications, test harnesses — sufficient for engineering action, regulatory submission, and audit review. Every engagement starts with a written legal basis (DMCA §1201(f), EU Software Directive Art. 6, or licensed access) and runs under mutual NDA with documented chain-of-custody for physical samples.
The six service categories below cover the full surface area. Most engagements span more than one — firmware analysis depends on hardware access, security research depends on protocol mapping, sustainment programs combine software and mechanical work. We staff each engagement with the senior engineers whose disciplines actually carry the work.
Service Categories
Each can stand alone or combine on a single engagement.
Decode binaries. Recover logic. Restore source code.
PCB analysis. Schematic recovery. Chip-level reverse engineering.
Extract, analyze, and document embedded firmware.
3D scanning. CAD reconstruction. Physical part recreation.
Vulnerability discovery. Code audits. Exploit research.
Document protocols. Reverse APIs. Decode formats.
Practice leads
Each discipline has a named practice lead — the same person from kickoff through handover. No subcontracting, no offshore handoffs. Names redacted pre-NDA; introduced at scoping.






When to Engage
A discontinued vendor's product is still in production and the source or design files are gone.
A regulator or auditor needs verified behavior of a system the vendor's documentation does not cover.
An internal or board-level decision requires independent verification of a closed-source dependency.
Components in your supply chain need evidence-grade verification of authenticity.
Reading or writing a vendor's proprietary protocol or file format where no specification is available.
An acquisition target's claimed architecture or security posture needs independent validation.
Cross-Industry
Process
Eight phases on every engagement. Read the full methodology →
Discovery
Legal Framework
Sample Logistics
Analysis
Documentation
Reconstruction
Verification
Knowledge Transfer
Questions
Reverse engineering services recover the design, behavior, and architecture of systems you do not have source or specifications for. We work across software (binaries, firmware), hardware (PCBs, ICs), mechanical parts, and protocols. Output is documented evidence — annotated source, schematics, specifications — sufficient for engineering, regulatory, and audit use.
Yes, when performed for interoperability, security research, error correction, or other lawful purposes. In the United States, DMCA Section 1201(f) provides an explicit interoperability carve-out. The EU Software Directive (2009/24/EC) Article 6 grants similar rights. We document the legal basis for every engagement in writing before work begins.
Most engagements run between four and fourteen weeks. Single-board PCB recovery and well-bounded software analysis run shorter; full chip-level reverse engineering, multi-product firmware programs, and large code audits run longer. We provide a fixed scope letter with milestones before any analysis begins.
Every engagement runs under mutual NDA executed before any artifact changes hands. Materials are stored on encrypted-at-rest infrastructure under our sole control. Where IP cleanliness matters we run analysis and reconstruction with separate teams and a written specification as the only bridge.
Deliverables vary by service: annotated source code (software RE), hierarchical schematics and BOMs (hardware RE), verified firmware images and documentation (firmware RE), parametric CAD and drawings (mechanical RE), findings reports and CVE filings (security research), or written protocol specifications (protocol RE). Every engagement also ships with a methodology appendix.
Engagements start with a scoping phase under NDA. Project length and pricing depend on system complexity, source-code or sample availability, and required deliverable depth. We work fixed-bid for well-bounded scopes and time-and-materials for exploratory work. Specific rates are shared after intake.
Automotive (ECU recovery, CAN bus), aerospace and defense (sustainment, ITAR-eligible work), medical devices (FDA-aligned firmware analysis), industrial and manufacturing (legacy controller recovery), IoT and embedded (firmware extraction at fleet scale), and cybersecurity (vulnerability research, threat analysis). Cross-industry work is common.
Yes. When reverse engineering surfaces vulnerabilities affecting third-party products, we coordinate disclosure under a published policy: vendor notification first, agreed remediation window, CVE filings, public publication only after remediation or with vendor consent. Track record across 30+ CVEs.
All inquiries reviewed under mutual NDA. We respond within two business days with a written scope letter.
Start a project