Skip to main content
Tag

security by design

Automated Penetration Testing of IoT systems using formal and AI-based techniques Insights

Automated Penetration Testing of IoT systems using formal and AI-based techniques

By Gábor Pék, CrySyS Lab, Budapest University of Technology and Economics  Automated penetration testing is one of the recent challenges of cyber-security with the visionary goal of discovering and exploiting system- and software vulnerabilities with no human involvement at all. Over the last couple of years various automated and semi-automated…
The DOSS Use Cases Insights

The DOSS Use Cases

By Joana Gracia and Leonardo Gonzalez, Tecnalia, Dimitrios Tsoukalas, Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) and György Rácz, Budapest University of Technology and Economics (BME) Connected Car The Connected Car demonstration will involve a control station and multiple vehicles, both real ones and simulated…
The DOSS Component Tester – Comprehensive security testing of IoT devices Insights

The DOSS Component Tester – Comprehensive security testing of IoT devices

By Sascha Hackel, Martin Schneider, Ramon Barakat and Luca Jungnickel, Fraunhofer FOKUS Introduction and motivation IoT devices surround us every day, whether they are integrated into cars, medical devices, smart home applications, or critical infrastructure. These devices are an integral part of our daily lives, and the need for secure…
Software Requirements Classification using Large Language Models (LLMs) Insights

Software Requirements Classification using Large Language Models (LLMs)

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) The definition of software requirements, both functional and non-functional, is the first step of the Software Development Lifecycle (SDLC). The correct specification of these requirements is critical for the production of high-quality and dependable software…
Top 10 (+2) Things You Need to Know About the EUCC Implementing Act Insights

Top 10 (+2) Things You Need to Know About the EUCC Implementing Act

The European Common Criteria-based cybersecurity certification scheme (EUCC) By Roland Atoui and Ayman Khalil, Red Alert Labs   With the introduction of the European Common Criteria-based cybersecurity certification scheme (EUCC), the European Commission makes a significant advancement in a time when cybersecurity threats are more serious than ever. Supported by…
Using digital twins for improving the security of cyber-physical systems – the DOSS approach Insights

Using digital twins for improving the security of cyber-physical systems – the DOSS approach

By Levente Buttyán, CrySyS Lab, Budapest University of Technology and Economics  Digital twins are virtual copies of physical devices or entire systems that can be used to address various challenges in the design, testing, and operation of those devices and systems. During the design phase, a digital twin can, for…