Better protection against cyber-attacks
We have a growing number of devices around us in our everyday life that contain small embedded computer systems. Many of these devices are able to access the Internet. They can be found in modern cars, in the medical health system, or in our “smart” homes.
Using voice-control systems like Alexa to change settings of smart light-bulbs or other electric devices is getting popular. It is meanwhile possible to buy smart light-bulbs for 15 euros that have an embedded computer system and that are able to access the Internet via the wireless home network in order to be managed by voice-control systems like Alexa.
While this technology enables entirely new ways of interaction with our environment, there are several important security issues that need to be taken care of. A light-bulb accessing a home network, for example, will store credentials (e.g. a password) that are needed to access the home network.
Is this data stored in such a way that it remains protected even when the light-bulb is decommissioned or sold over eBay? Or is this information perhaps even communicated to online cloud services the user may not be aware of? With whom is the light-bulb allowed to communicate in general? Is the software on the light-bulb static or does it enable updates to fix security flaws? If it supports software updates, how does the light bulb make sure that the new software is from a trusted source?
A general underlying question is how can we ensure that the software running on embedded devices is the software that is expected to run on these devices (and not modified by third parties to index, for example, the photo collection accessible on your home network). Finding answers to these questions is a goal of the research undertaken at Jacobs University as part of the CONCORDIA project.
Further questions can be addressed to:
Jürgen Schönwälder | Professor of Computer Science
email@example.com | Tel.: +49 421 200-3587
All news from this category: Information Technology
Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.
This area covers topics such as IT services, IT architectures, IT management and telecommunications.
Acute itching in eczema patients linked to environmental allergens
Newly identified pathway explains why antihistamine drugs often don’t work to control severe itch. In addition to a skin rash, many eczema sufferers also experience chronic itching, but sometimes that…
Simulating evolution to understand a hidden switch
Computer simulations of cells evolving over tens of thousands of generations reveal why some organisms retain a disused switch mechanism that turns on under severe stress, changing some of their…