Skip to main content
Category

Insights

Model-based security analysis Insights

Model-based security analysis

By András Földvári and András Pataricza, Budapest University of Technology and Economics  In today’s connected world, complex IoT systems play a critical role in several critical industries, where cybersecurity intrusions affecting the IT part may lead to severe or catastrophic consequences amplified by the controlled physical process. Here, the assurance…
The Evolution and Future of IoT: A Strategic Cybersecurity Outlook Insights

The Evolution and Future of IoT: A Strategic Cybersecurity Outlook

Paul Gedeon, Red Alert Labs The Internet of Things (IoT) has become a cornerstone of modern life, connecting devices across industries, homes, and entire cities. As we head towards an era of unprecedented connectivity, where trillions of devices will interact autonomously, the demand for secure, resilient IoT systems has never…
The DOSS IoT Supply Trust Chain (STC) Concept Insights

The DOSS IoT Supply Trust Chain (STC) Concept

By András Vilmos, DOSS Project Coordinator The Supply Chain Security Challenge In today's interconnected world, businesses and individuals increasingly rely on IoT devices, software, and services from a variety of sources, making supply chain security critical. The complexity and opacity of modern supply chains, combined with the implicit trust placed…
Automatic Vulnerability Categorization: Are Large Language Models (LLMs) the solution? Insights

Automatic Vulnerability Categorization: Are Large Language Models (LLMs) the solution?

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) Problem Statement The early identification and mitigation of software vulnerabilities is critical for the development of secure software. To facilitate the vulnerability identification and mitigation process, several tools and techniques have been proposed over the…
Automated Penetration Testing of IoT systems using formal and AI-based techniques Insights

Automated Penetration Testing of IoT systems using formal and AI-based techniques

By Gábor Pék, CrySyS Lab, Budapest University of Technology and Economics  Automated penetration testing is one of the recent challenges of cyber-security with the visionary goal of discovering and exploiting system- and software vulnerabilities with no human involvement at all. Over the last couple of years various automated and semi-automated…
The DOSS Use Cases Insights

The DOSS Use Cases

By Joana Gracia and Leonardo Gonzalez, Tecnalia, Dimitrios Tsoukalas, Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) and György Rácz, Budapest University of Technology and Economics (BME) Connected Car The Connected Car demonstration will involve a control station and multiple vehicles, both real ones and simulated…