WHAT WE DO.

Syscall 7 performs software development, analysis, and security auditing for a wide variety of technologies and industries.

Contact Us Today!

If you need help developing, analyzing, or securing your software, then we can assist you! Our team of software experts can handle any software-related challenge. No job is too big or too small. We understand software and operating system internals and can handle anything from low-level microcode running on a PIC processor to a Javascript UI running on an AWS backend. Reach out today to learn more about how we can develop, analyze, or secure your software.

Contact Us Today!

Software Development

Embedded Systems

Our recent experience includes providing full-stack embedded Linux support for custom hardware built around a variety of chips to include Xilinx’s Zynq Ultrascale+, NVIDIA’s Tegra K1, and NXP’s i.MX 6.  We have enabled system functionality via a variety of standard interfaces to include:

  • Ethernet (RGMII, SGMII)

  • USB 2.0 and 3.0 (Host, Device, OTG)

  • SDIO WiFi Modules

  • SPI, I2C, and UART devices

  • I2S Audio Input

  • Custom RF Implementations

  • NAND and NOR Flash devices

  • Capacitive Touchscreens

  • QSPI

  • eMMC

  • DDR3, DDR4 Memory

Bare Metal

Need to bring up your board?

Low Level Development

We can develop bootloaders, exception handlers, or memory management for your custom hardware.

Real-Time OS

Need to develop a custom app?

Custom Applications

We can help you develop a custom application running in a real-time operating system environment.

Embedded Linux

Need to use Linux on your hardware?

Kernel and Userspace

We can help you setup a Linux-based development environment for your custom hardware product.

System and App Software

Our company thrives on helping our clients solve their software challenges. While the field of software development is very broad, our team of software craftsmen covers the most popular technologies and frameworks used today. Reliable solutions developed with technical excellence is why our clients keep coming back to Syscall 7.

Contact us today!

Our team of software experts has command over all of the most popular programming languages used today. Below is a sampling of our strongest experience:

  • C
  • C++
  • Shell script with bash, awk, and sed
  • Assembly (i386, x86-64, MIPS, PowerPC, ARM)
  • Python
  • Java
  • Ruby/Rails
  • .NET Languages

Like text editors, everyone has their favorite distribution of Linux. At Syscall 7 we have experience with them all.

  • Red Hat
  • CentOS
  • Ubuntu
  • Fedora
  • Raspbian
  • Custom Linux distros based on Yocto, Buildroot and OpenWrt

We have experience setting up and maintaining the following build systems:

  • GNU autotools
  • GNU make
  • Scons
  • cmake
  • Jenkins

We have experience setting up and maintaining source code using a variety of version control systems:

  • subversion (svn)
  • git
  • cvs
  • StarTeam

We have experience developing applications and drivers targeting a range of operating systems, including:

  • VxWorks
  • VRTX
  • Linux
  • FreeBSD, NetBSD, and OpenBSD
  • OS X
  • Windows
  • Android

No app is an island, and in today’s world, that means networking is central to so many applications these days. We have experience developing custom networking solutions at every level of the network stack. We are just as comfortable at the Ethernet layer as we are at the socket layer. We have developed a variety of unique communications protocols that are tailored to our clients’ needs. To help debug and analyze those protocols, we have developed Wireshark plugins in C and in Lua to dissect and parse the communications.

Our developers are experienced with a range of UI frameworks such as Qt and the .NET family of technologies.

We have developed device drivers on several different operating systems for a variety of hardware controllers. Below is a small sampling of our experience:

  • Wired and wireless network interface controllers
  • Flash devices and controllers
  • PCI
  • SPI
  • I2C
  • USB

Enterprise Dataflow

We can help you design, develop, and launch your cloud-based platform. Our team has deployed enterprise applications on all the major cloud providers.

Software Analysis

Reverse Engineering

Software Reverse Engineering is sometimes the only method for addressing certain kinds of challenges. Here are some of the reasons why you might need to hire a competent firm to provide reverse engineering services for your business:

  • Interoperability – If your company is developing novel ways to interact with existing technology, then you might find yourself needing to identify the binary interfaces of closed-source, proprietary systems. For example, your product might want to speak a certain undocumented protocol in order to control a hardware device for which there is no published documentation.
  • Reclaim Ownership of Data – Sometimes closed-source technology holds a customer’s data hostage so a customer cannot switch providers. In this case, you might need to reverse engineer that particular product in order to regain ownership of your own data.
  • Combat Malware – If your company has been the victim of a cyber attack, understanding the internal workings of the malware with which you were attacked is vital to a successful mitigation campaign.
  • Recover Source Code – Sometimes companies lose their own source code and only have access to the binary executables. Reverse engineering technologies are so good these days that oftentimes we are able to reconstruct something very close to the original source code from just the raw binary executable.

Our team of reverse engineers are skilled in analyzing binary images targeting a wide range of computing platforms. 

  • Technology Litigation

  • Medical Devices

  • Auto Industry

  • Industrial Controls & SCADA

  • Firmware Images

  • Linux-Based Systems

  • Windows Software

  • Malware

Static Analysis

Analsys Sans Execution

Disassembling the Binary

Reconstruct the Logic

Dynamic Analysis

Analysis Through Execution

Executing the Code

Monitor at Runtime

Binary Dissection

Dissecting Files and Protocols

Files and Protocols

Model the Data

Performance Analysis

If your application performance is not optimal, your users will suffer and your competitors will seek to take advantage of that. Optimal performance means different things in different application contexts. Reliability is always an important factor, and so is responsiveness. We can generate metrics tailored to your specific application to help you find ways to improve the reliability and responsiveness of your software.

Source Code Review

Security Audits