What is a Honeypot? Honeypots are software designed to detect novel and emerging attack patterns against a specific system. Hence, a vulnerable version of the protected system will be created, which typically represents the easiest way to attack a system. With special preparation, a honeypot serves as a trap that…
Insights
In the IoTAC project, we are looking at different IoT architectures to identify best practices, potential weaknesses and to understand the difference between the various approaches. Below we give a short summary of four architectures we have analyzed. ISO/IEC Internet of Things (IoT) Reference Architecture ISO/IEC 30141 is an…
Certification ensures that a process or product meets the requirements of a known standard or specification, often audited by an independent third party. Validation ensures that a product meets pre-determined requirement specifications and can be seen as “sub-process” of certification. In both cases, those standards or specifications are usually the…

Martin Schneider and Sascha Hackel, Fraunhofer FOKUSMarch 25, 2021
In recent years the rapid proliferation of Internet-connected devices is driving an unprecedented growth of Internet of Things (IoT) systems and applications. This enables the evolving of the functionalities that they provide to end-users, but also in terms of the technologies that they comprise. Specifically, non-trivial state-of-the-art IoT systems comprise…

Intrasoft InternationalMarch 11, 2021
The Internet has been steadily growing since its birth back in the second half of the last century. This constant growth was driven by different trends in different epochs. The most recent trend is to connect all sorts of embedded devices to the Internet, including home entertainment systems, industry equipment,…

Levente Buttyán, CrySyS Lab, BMEFebruary 25, 2021
Recent Comments