Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…
The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…
CRITICAL CHALLENGES IN THE INTERNET OF THINGS IoT devices are widely used and the number of such devices is still growing at a very fast pace because of their importance in ”smart everything” applications, especially the smart grid, smart homes, smart vehicles, smart cities, in industry with smart manufacturing known…
An important building block of the IoTAC project is the transfer of the project results to the standardization. These activities promote the success and impact of the achievements developed in the project, such as the IoTAC architecture and its underlying security modules. Naturally, standardization is a long-lasting process. Therefore, various…
Axel Rennoch and Sascha Hackel, Fraunhofer FOKUSJune 20, 2022
As part of the IoTAC project, the IoT-enabled Honeypot solution will be deployed in four pilot cases: a smart home setup, a prosumer cell operation, a connected car network, and a drone operation use case. In each case, the honeypot will play a pivotal role in detecting and recording malicious…
Julian Fietkau, SECT, TU BerlinMay 30, 2022
The Front-end Access Management (FEAM) system will be deployed at each of the four pilot locations. The four pilots are the smart home in Greece, the prosumer cell operation in Hungary, the connected car in Spain and the drone operation in France. In all the four cases the core security…
Andras VilmosApril 14, 2022
What is the Zero Trust Model? The goal of the zero trust security model is to protect corporate networks against access threats by enforcing a “never trust, always verify” approach. You can implement zero trust security by ensuring your network does not trust any device or user by default. It…
Gilad David Maayan, Agile SEOMarch 18, 2022
1. Vulnerability Prediction - Importance and Challenges Vulnerability prediction is responsible for the identification of security hotspots, i.e., software components (e.g., classes) that are likely to contain critical vulnerabilities. For the identification of potentially vulnerable software components, vulnerability prediction models (VPM) are constructed, which are mainly machine learning models that…
Miltiadis Siavvas, Centre for Research & Technology – HellasFebruary 25, 2022
1. Static Analysis and Software Security - Importance and Challenges A software vulnerability is defined as a weakness in the specification, development, or configuration of software such that its exploitation can violate a security policy. The exploitation of a single vulnerability can have far-reaching consequences both for the user and…
Miltiadis Siavvas, Centre for Research & Technology – HellasJanuary 28, 2022
Software Security by Design The high interconnectivity that characterizes modern IoT Systems, along with the increasing accessibility of their devices through the Internet, renders their security an aspect of major concern for IoT users and providers. The importance of securing IoT Systems is further supported by the important security incidents…
Recent Comments