
A vulnerability analysis based on dynamic testing and automated verification
Dynamic analysis for runtime security testing
Automatic analysis of vulnerabilities in the wireless interface
Comprehensive testing for Bluetooth, Wi-Fi, ZigBee, and Z-Wave protocols