Research-led cyber security
Steadnet focuses on lightweight cyber security research for IoT, ESP32s, Raspberry Pis, and small compute environments where modern AI needs to work within real hardware limits.
Multi-modal AI demo
import tensorflow as tf
binary = load_executable("sample.exe")
image = binary_to_grayscale(binary)
header = extract_header_bytes(binary)
model = tf.keras.models.load_model("hybrid_edge_model.h5")
visual_features = model.visual_stream(image)
byte_features = model.byte_stream(header)
decision = model.fusion([visual_features, byte_features])
print(decision.family, decision.confidence)
Inference path
Visual stream + byte stream -> fusion
Executable sample
Parallel features
Model decision
Output
Threat family detected
Applied research and advisory
Our AI models analyze vast datasets to identify emerging cyber threats and vulnerabilities before they impact your systems, shifting security from reactive to truly proactive. Ideal for high-security projects.
AI-powered automation rapidly contains and remediates cyber security incidents, minimizing downtime and human intervention, ensuring business continuity for critical operations.
Implement dynamic, AI-driven access policies based on user behavior and context, enforcing true Zero Trust principles across your entire ecosystem, including all IoT devices (from industrial sensors to hobbyist boards).
Our AI monitors data flows, access patterns, and behavior on all endpoints, including IoT and small compute boards like Raspberry Pi and Arduino, to detect unusual activities indicating potential insider threats or data exfiltration.
AI continuously assesses your cloud environments for misconfigurations, compliance deviations, and vulnerabilities, ensuring a strong security posture crucial for any high-security project.
Augment your human analysts with advanced AI capabilities for faster threat hunting, intelligent alert correlation, and significantly reduced alert fatigue, ensuring comprehensive cyber security.
Why it matters now
01
Research is focused on constrained environments where memory, power, latency, and cost matter.
02
Visual malware patterns can be paired with structural byte features to reduce reliance on a single signal.
03
ESP32s and Raspberry Pis can support distributed experiments for monitoring, collection, and lightweight analysis.
04
The work treats AI as an available engineering tool that can be tested, measured, and improved today.
Research notes
By Phil Steadman | May 19, 2026
I am now getting close to the end of my PhD research, and the work is becoming more practical and exciting. The core question has stayed the same: how can artificial intelligence help detect malware in environments where traditional security tooling is too heavy, too slow, or too dependent on cloud-scale resources?
A particularly interesting direction has been looking at ESP32s and Raspberry Pis together. On their own, these devices have very different strengths. ESP32s are low-cost, low-power microcontrollers that can sit close to sensors and simple networked devices. Raspberry Pis provide more compute and flexibility, making them useful as small edge gateways or local analysis nodes. Used together, they create a practical testbed for exploring distributed security monitoring at the edge.
This connects directly with my recent work on multi-modal malware detection. In the paper draft, I explored how visual malware representations can be combined with structural byte and header features, rather than relying on a single stream of evidence. That matters because modern malware can use packing, polymorphism, and other evasion techniques to make one view of a file less reliable. Combining different views gives the model more context.
The next challenge is not just improving model accuracy on datasets such as MalwareVision-2025 and Malimg. It is understanding how these ideas can move toward real, resource-constrained hardware. A Raspberry Pi might handle feature extraction, local coordination, or lightweight inference, while ESP32 devices could help collect signals from the environment or act as part of a distributed sensing layer.
What makes this exciting is that the hardware is accessible. This is AI being tested now, on devices that students, researchers, hobbyists, and small teams can actually afford. As I approach the end of the PhD, that practical bridge between research and real-world edge security is where I want the work to go next.
By Phil Steadman | June 18, 2025
It's an exciting time to be in cybersecurity, especially with the rapid advancements in Artificial Intelligence. I'm thrilled to share that I'm now halfway through my PhD journey, focusing on a fascinating and crucial area: the detection of malware using artificial intelligence on small compute boards.
For years, the power of AI in cybersecurity has been evident in large-scale data centers and cloud environments. However, the proliferation of IoT devices - from industrial sensors to consumer gadgets, and even popular hobbyist platforms like Raspberry Pi and Arduino - presents a unique challenge. These devices often have limited computational resources, making traditional, heavy-duty malware detection methods impractical.
My research delves into developing lightweight, efficient AI models capable of identifying sophisticated malware behavior directly on these resource-constrained devices. This involves exploring novel machine learning techniques that can operate effectively with minimal memory and processing power, providing a crucial layer of defense for the expanding IoT landscape and other high-security projects where every byte and cycle counts.
The implications for real-world cyber security are immense. Smart home devices, embedded systems in critical infrastructure, and custom-built robotics projects all need stronger protection at the edge. This work is not just academic; it's about building a more secure digital foundation for everyone.
I'm looking forward to sharing more updates as I progress. Stay tuned for insights into my findings and how this research can contribute to practical, AI-driven cyber security solutions.
Contact
Talk to Steadnet Cyber about AI malware detection, embedded security research, and practical approaches for IoT and small compute environments.
Contact Steadnet CyberPhil Steadman, Cyber Security Leader
Email: phil@steadnet.com