Injecting Security Features into Constrained Embedded Firmware (ISaFe)
The majority of the IoT consists of devices that are highly specialized for their specific purpose. Due to their specialization and the resulting constraints, such as limited energy consumption and deterministic runtime (real-time requirements), many of these so-called embedded systems lack a sufficient number of security features that are common in standard operating systems. Therefore, our goal is to develop automated approaches for implanting security features into networked embedded systems to counteract the lack of security features in the backbone of the IoT and thereby make them more resistant to unauthorized access attempts.
Facts
Embedded & Cyber-Physical Systems
Department Electronic Engineering
FFG
from September 2019 to February 2023
FH-Prof. Dr. Wilfried Kubinger


FH-Prof. Dr. Wilfried Kubinger
Head of Department
Electronic Engineering & Entrepreneurship