Skip to main content
Tag

security by design

The DOSS Component Tester – Comprehensive security testing of IoT devices Insights

The DOSS Component Tester – Comprehensive security testing of IoT devices

By Sascha Hackel, Martin Schneider, Ramon Barakat and Luca Jungnickel, Fraunhofer FOKUS Introduction and motivation IoT devices surround us every day, whether they are integrated into cars, medical devices, smart home applications, or critical infrastructure. These devices are an integral part of our daily lives, and the need for secure…
Software Requirements Classification using Large Language Models (LLMs) Insights

Software Requirements Classification using Large Language Models (LLMs)

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) The definition of software requirements, both functional and non-functional, is the first step of the Software Development Lifecycle (SDLC). The correct specification of these requirements is critical for the production of high-quality and dependable software…
Top 10 (+2) Things You Need to Know About the EUCC Implementing Act Insights

Top 10 (+2) Things You Need to Know About the EUCC Implementing Act

The European Common Criteria-based cybersecurity certification scheme (EUCC) By Roland Atoui and Ayman Khalil, Red Alert Labs   With the introduction of the European Common Criteria-based cybersecurity certification scheme (EUCC), the European Commission makes a significant advancement in a time when cybersecurity threats are more serious than ever. Supported by…
Using digital twins for improving the security of cyber-physical systems – the DOSS approach Insights

Using digital twins for improving the security of cyber-physical systems – the DOSS approach

By Levente Buttyán, CrySyS Lab, Budapest University of Technology and Economics  Digital twins are virtual copies of physical devices or entire systems that can be used to address various challenges in the design, testing, and operation of those devices and systems. During the design phase, a digital twin can, for…
The DOSS approach for Vulnerability Prediction using Large Language Models (LLMs) Insights

The DOSS approach for Vulnerability Prediction using Large Language Models (LLMs)

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) Background and Existing Challenges Software Security is a matter of major concern for software-based systems and their broader supply chain since the exploitation of a single vulnerability can lead to far-reaching consequences both for the…