- Home
- Areas of Expertise
- Computer Security
Computer Security
Barr Group's experienced computer security expert witnesses review patent portfolios and advise attorneys in cyberbreach and IP litigation. Many Barr Group engineers have hands-on experience designing secure computing platforms. And our cybersecurity expert team includes several who have testified in high-profile civil and criminal trials.
Need an expert for cybersecurity litigation? Contact us >
Cybersecurity and Cyberbreaches
From electronic medical devices and health records to safety-critical automotive electronics and mission-critical cloud-hosted business applications and distributed databases, the stakes have never been higher for network/data security and privacy.
At Barr Group we have been in the business of designing secure computers since our founding and our staff includes world-leading cybersecurity experts and trainers. Our areas of expertise include:
- Symmetric and asymmetric (public key) encryption and decryption
- Elliptic curve cryptography (ECC)
- Digital rights management (DRM) for software activation, e-books, etc.
- Privacy and cybersecurity of electronic voting systems (e-voting)
- Encryption and decryption algorithms such as DES, RSA, and AES
- User authentication and digital signatures
- Zero-knowledge tests and secure hashes (e.g., MD5)
- Firewalls and secure network protocols (TLS/SSL, SSH/SFTP, WAP/WEP)
- Biometric security, including fingerprints, retina scans, and facial recognition
- Computer viruses and other malware such as trojans and ransomware
- Distributed Denial of Service (DDoS) and other attacks
- Trusted computing modules like TPM and secure bootloaders
Barr Group's cybersecurity experts are familiar with all major operating systems--such as Linux/Android, iOS, and Windows--and programming languages, including Java, JavaScript, C/C++, C#, Objective-C, Python, Perl, PHP, and assembly.
Request your computer security expert now >
Expert Witness Services
Barr Group's computer security experts support plaintiffs and defendants in litigation in U.S. District Courts, at the International Trade Commission (ITC), and before the Patent Trial and Appeal Board (PTAB). Our services include:
- Technical assistance with drafting of discovery requests
- Software source code review and analysis
- Source code comparisons for copyright and trade secret theft
- Prior art review for patent invalidity
- Reverse engineering of electronics and schematics review
- Forensic analysis of malware, including binary code disassembly
- Extraction of system logs and electronically-stored metadata
- Investigation of cyber attacks and data breaches
- Security audits and penetration testing
- Expert reports, declarations, and witness statements
- Testimony at deposition, oral hearings, and trials
Our experience with computer security litigation is extensive and includes electronics and source code analysis and testimony for a large number of cases in numerous U.S. District Courts and the Superior Court of Québec, including in relation to satellite TV hacking and signal interception.
Barr Group has a demonstrated ability to quickly activate one or more engineers to match the size, scope, and complexity of any project.
The following is a representative subset of Barr Group's experts who have experience designing and/or testifying about these technologies:
Smart Grid Technologies Expert Profile
Cloud Storage and Filesystem Expert Profile
Automated Surveillance Systems Expert Profile
Advanced Military Radar Systems Expert Profile
Payment and Transaction Processing Expert Profile
Data Center and Cloud Storage Expert Profile
Online and Digital Privacy Expert Profile
Malware Detection Systems Expert Profile
Electronic Warfare and SIGINT Expert Profile
E-Commerce Payment Security Expert Profile
Fingerprint Biometric Systems Expert Profile
NFC and Contactless Payments Expert Profile
Internet and Web Technology Expert Profile
Cellular Wireless Air Interface Expert Profile
Deep Learning & A.I. Systems Expert Profile
Drone and UAV Navigation Expert Profile
Distributed Sensor Networks Expert Profile
Electronic Voting Machine Expert Profile
Distinguished professor of computer science with expertise in electronic voting, artificial intelligence, digital libraries, and electronic payment and e-commerce systems.
Flash Memories & Filesystems Expert Profile
Digital Signature & Document Expert Profile
Connected Vehicle Telematics Expert Profile
Linux-Based Computer Systems Expert Profile
Space and Satellite Systems Expert Profile
Smartphone Software & Apps Expert Profile
Video Encoding & Streaming Expert Profile
High-Performance Computing Expert Profile
Just-in-Time Compilation Expert Profile
Penetration Testing Security Expert Profile
Software and Binary Disassembly Expert Profile
ASIC FPGA and SoC Design Expert Profile
TCP/IP Internet Protocols Expert Profile
Smart Grid Electrical Power Expert Profile
Short-Range Wireless Protocols Expert Profile
Cybersecurity & Cyber-Warfare Expert Profile
Ultrasound Medical Imaging Expert Profile
Biometrics and Tamper Detection Expert Profile
Wireless Protocols and Standards Expert Profile
Cloud Computing Architectures Expert Profile
Wired & Wireless Networks Expert Profile
Embedded Software Design Expert Profile
Secure Computer Systems Expert Profile
Distinguished professor of computer science with expertise in electronic voting, artificial intelligence, digital libraries, and electronic payment and e-commerce systems.
Don't see the right expert for your project among this subset?