Margin Research — Cybersecurity Research & Development

Moving research into products

Margin Research is a boutique cybersecurity firm located in NYC.

We specialize in software program analysis, reverse engineering, vulnerability research, and offensive threat intelligence.

Work with us

If you think we're the right fit, let's chat. Our team will work with you to architect the ideal solution.

Contact us
graphical divider
Image

Bespoke solutions to the hardest problems

Margin Research takes great pride in creating highly-tailored solutions for the most complex and unique problems in our industry. Our team is versatile and responsive, allowing us to quickly identify your needs and seamlessly integrate with the dynamics of your team.

By offering constant, close contact with our technical team members, we are able to deliver fast and accurate results without the fear of nuance being lost in translation.

Proven excellence

Our team has extensive experience in the fields of automated program analysis, vulnerability discovery, behavioral analytics, and inauthentic behavior discovery. Multiple members of Margin Research have worked with the United States Department of Defense and affiliated companies, both in the fields listed above and in software development.

This breadth of knowledge and experience is constantly expanding and builds the foundation upon which we are able to tackle the industry’s toughest challenges.

Image

How we can help

Applied Research & Development

Using proven methods and techniques, we provide custom tailored research solutions for your unique needs.

Security Consulting

Use our decades of experience to improve your security design, implementations, and threat modeling.

Program Analysis

Incorporate the latest software analysis techniques to find defects and improve your code.

Reverse Engineering

Lost your source code? Looking to add software compatibility? We will reverse engineer embedded and mobile devices, firmware, and other software to meet your needs.

Vulnerability Research

We will use both black and white box techniques to identify vulnerabilities in your software.

Trainings

Bring your team up to speed on the state-of-the-art vulnerability research, program analysis techniques, and tools.

Learn More
graphical divider

Meet the team

Sophia d'Antoine
Sophia d'Antoine
Claudia d'Antoine
Claudia d'Antoine
Dave Aitel
Dave Aitel
Alice Bibaud
Alice Bibaud
Lucien Brulé
Lucien Brulé
Tim C
Tim C
Michael C
Michael C
Tom Cornelius
Tom Cornelius
Matthew Deffinger
Matthew Deffinger
Ian Dupont
Ian Dupont
Bill Eyler
Bill Eyler
Brandon Falk
Brandon Falk
Tom G
Tom G
Joe Lothan
Joe Lothan
José-Alexandre M
José-Alexandre M
Trevor P
Trevor P
Ian Palleiko
Ian Palleiko
Nick R
Nick R
Evan Richter
Evan Richter
Ian Roos
Ian Roos
Warren S
Warren S
Ali S
Ali S
Justin S
Justin S
Abraham W
Abraham W
arrow-up icon