security by design Archives - Page 3 of 3 - IoTAC


IoTAC Software Security Evaluation Framework

Quantitative Security Assessment based on Static Analysis Software security was traditionally treated as an afterthought in the overall development cycle of software products, being introduced after the software product was implemented (or even used) mainly through the inclusion of external protection mechanisms (e.g., intrusion detection and prevention techniques). According to…

IAM at the heart of the zero trust approach

The rapid rise of cyberattacks of all kinds, particularly ransomware, is pushing companies to expand their defense perimeter by applying a zero-trust approach. But how does it work? And more importantly, how can its effectiveness be calibrated? Often, an organization’s first instinct is to implement zero trust at the network…
Yann Morvan
July 15, 2022

Vulnerability prediction based on Natural Language Processing Techniques

1. Vulnerability Prediction - Importance and Challenges Vulnerability prediction is responsible for the identification of security hotspots, i.e., software components (e.g., classes) that are likely to contain critical vulnerabilities. For the identification of potentially vulnerable software components, vulnerability prediction models (VPM) are constructed, which are mainly machine learning models that…

The IoTAC Software Security by Design (SSD) Platform – Concept and Preliminary Overview

Software Security by Design The high interconnectivity that characterizes modern IoT Systems, along with the increasing accessibility of their devices through the Internet, renders their security an aspect of major concern for IoT users and providers. The importance of securing IoT Systems is further supported by the important security incidents…