Inhaltstyp
Kategorien
-
Capacity Building & Training
- /en/research-topics/cyber-security/capacity-building-training
targets on customer specific IT-systems and architectures focuses on today’s threats & today’s ICT systems anticipates tomorrow´s threats and next generation ICT systems provides insights into how novel [...] critical digital IT systems. It provides a secure and realistic environment for analyzing and testing incidents in different, scalable scenarios without the use of the genuine production systems of stakeholders [...] security incident response supports the safe and secure design and operation of industrial control systems (ICS) Cyber Security Training The AIT Cyber Range supports effective IT security training by learning
-
Penetration Testing & Red Teaming
- /en/research-topics/cyber-security/penetration-testing-red-teaming
Information Systems Control (CRISC) Certified Information Privacy Manager (CIPM) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Certified Information Systems Security [...] vulnerabilities found increases with time invested and the level of information available about the systems to be tested. The result of the penetration test is a report which lists the vulnerabilities, mi [...] many years of project experience, with a black-box approach (i.e. without detailed knowledge of the system to be tested; e.g. via fuzzing and reverse engineering), and a white-box setting (i.e. complete
-
Cyber Security Consulting & Risk Management
- /en/research-topics/cyber-security/cyber-security-consulting-risk-management
incident. Besides risk analysis, the approach can also be used as part of a situational awareness system. With our approach, operators are not only able to model the interdependencies among physical and
-
Team
- /en/research-topics/cyber-security/team
Key Management System (KMS) Stephan Krenn Privacy, cryptographic protocols https://www.linkedin.com/in/stephan-krenn-83a92aa2/ Stephan Laschet Software development, Key Management System (KMS) Thomas Lorünser [...] Transport Systems, Border Control https://www.linkedin.com/in/arndt-bonitz-770637175/ Martin Latzenhofer Risk Management, Security Management, Process Integration & Audit, Automotive Systems https://www [...] testbed design and development Viktor Beck Master Student David-Mark Allison Industrial control systems, digital twins https://www.linkedin.com/in/david-allison-infosec/ Wolfgang Hotwagner Algorithm testbed
-
Cryptography Consulting and Standardization
- /en/research-topics/cyber-security/solutions-services/crypto-consulting-alt
privacy enhancing technologies and online privacy, post-quantum cryptography as well as distributed systems. Particularly, we work on cryptographic building blocks such as attribute-based encryption (ABE) [...] solutions. Consulting our experts early in your design process can lead to great benefits for your system developers in the form of a sound security architecture and less weakness in your new products. [...] asymmetric cryptography, the rapid progress significantly increases the risk. Therefore, protocols and systems involving asymmetric cryptography should transition to so-called post-quantum secure (or quantum-safe)
-
Security Advisories
- /en/research-topics/cyber-security/pentesting/security-advisories
period of time to resolve the problem and to roll out the corresponding patches on their client systems before details of the vulnerability are published. The following is an excerpt of relevant zero-day
-
AIT-SA-20190930-01
- /en/research-topics/cyber-security/pentesting/security-advisories/ait-sa-20190930-01
configuration. Vulnerability Description GitLab Omnibus sets the ownership of the log directory to the system-user "git", which might let local users obtain root access because of unsafe interaction with logrotate
-
AIT-SA-20191129-01
- /en/research-topics/cyber-security/pentesting/security-advisories/ait-sa-20191129-01
(AIT Austrian Institute of Technology) Summary OkayCMS is a simple and functional content managment system for an online store. Vulnerability Description An unauthenticated attacker can upload a webshell
-
hub.connect
- /en/research-topics/transport-optimization-logistics/projects/hubconnect
Research Engineer / Integrated Energy Systems +43 50550-6649 +43 50550-6439 martin.reinthaler(at)ait.ac.at Project partners IESTA - Institute for Advanced Energy Systems & Transport Applications Automobil [...] organizational) aspects. It thereby explicitly considers interoperability and connectivity with legacy systems with lower automation levels. The analysis will be characterized by a close conjunction of technological
-
Neurological Signal Processing
- /en/solutions/neurological-signal-processing
vision: make EEG diagnostics more efficient and treat patients even better. Integrated in the EEG-systems of all major manufacturers our solutions will significantly improve patient safety, EEG diagnostics
-
AECID
- /en/research-topics/cyber-security/our-offer/aecid
behavior in complex computer networks. In contrast to conventional systems, the algorithm does not need specific knowledge about the IT systems to be monitored. Rather, a pure pattern recognition after appropriate [...] continuously adapts to new situations and does not require any elaborate specification of the technical system and no complex "configuration management" by the operator. By constantly gathering and analyzing [...] independently and continuously enhances and refines its own knowledge base for new insights into the system in which it is used. AECID's features and operation principle × Kontakt Formular Pflichtfelder sind
-
IMOTHEP
- /en/research-topics/hybrid-electric-aircraft-technologies/projects/imothep
on emerging all-solid-state battery technology suitable for future aircraft propulsion and power systems while AIT Center for Energy is in charge of power electronics topologies and pre-design. The ultimate [...] OGO MOTOROSTROENIYA IMENI PI BARANOVA, http://www.ciam.ru/ STATE RESEARCH INSTITUTE OF AVIATION SYSTEMS, www.gosniias.ru NATIONAL RESEARCH CENTER INSTITUTE STATE EDUCATIONAL INSTITUTION OF HIGHER PROFESSIONAL
-
GPEC 2020
- /en/about-the-ait/center/center-for-digital-safety-security/fairs-events/gpec-2020
currencies to combat organized crime are also focal points at AIT. Touchless 4-Finger ID We develop systems for personal identification and access control using state-of-the-art technologies such as a mobile
-
AFarCloud 2
- /en/research-topics/dependable-systems-engineering/projects/afarcloud-2
not only new robotics platforms but also incorporating to the aforementioned framework the legacy systems already deployed in the farms. Farming is facing many economic challenges in terms of productivity [...] e.g., digitally controlled farm implements and even unmanned aerial vehicles. However, current systems still have significant drawbacks, in terms of flexibility, efficiency, robustness, sustainability [...] More specifically, the project demonstrated how new IoT technologies and in general mechatronic systems can cooperate in real-world farm scenarios to provide a common framework for the development of related
-
AQUAS2
- /en/research-topics/dependable-systems-engineering/projects/aquas2
cybersecurity , safety and additional dependability attributes for highly automated networked systems and systems of systems. Hence, AQUAS2 focused on these aspects as listed above. Facts Project duration: May [...] and increasing system quality and maintaining compliance with more and more exacting standards. Improved tool features and capabilities. There is an ever-increasing complexity of the systems we engineer in [...] AQUAS2 For safety-critical systems in domains such as transportation, aerospace, or industrial control, this project focused on: Safety/Security/Performance to be considered together, during the overall
-
AUTODRIVE
- /en/research-topics/dependable-systems-engineering/projects/autodrive
generation Electronic Components and Systems architectures. This will sustain and grow the market position of all AUTODRIVE partners. 1 Electronic Control Systems Facts Project duration: May 2017 – Oct [...] ect AUTODRIVE was to advance fail-aware, fail-safe, and fail-operational electronic components, systems, and architectures for highly and fully automated driving. AUTODRIVE results contributed significantly [...] sind mit einem * markiert. Name * E-Mail * Betreff * Nachricht * Send DI Rupert Schlick Dependable Systems Engineering +43 50550 4124 +43 50550 4150 rupert.schlick(at)ait.ac.at Links https://autodrive-project
-
BESTE-AB
- /en/research-topics/dependable-systems-engineering/projects/beste-ab
it develops a management system for Rail Operation as a Service (ROaaS) and the support of Development and use of these systems through a meta model for automated rail systems. The focus of these developments [...] traffic on branch lines. Supported by this meta model, a secure digital interlocking system with ROaaS management system is being developed. The 5G mobile technology for the exact position determination of
-
Productive4.0
- /en/research-topics/dependable-systems-engineering/projects/productive40
handling, but causes further challenges such as Integration and dealing with legacy systems, Different product cycle times at system, module and component level, Standardization of exchange processes, protocols [...] and across domains Today, manufacturers face - besides increasing complexity of their products and systems, as well as highly volatile markets – a rising demand for customization and individual product c
-
SECREDAS
- /en/research-topics/dependable-systems-engineering/projects/secredas
Domain Reliable Dependable Automated Systems” (SECREDAS) made a first important step into the direction of developing “trust”-building components and (sub-)systems for the European industries of tomorrow [...] validated multi-domain architecting methodologies, reference architectures and components for autonomous systems, combining high security and privacy protection while preserving functional-safety and operational
-
TRUSTED2
- /en/research-topics/dependable-systems-engineering/projects/trusted2
particular are integral part of building trustworthy ICT systems. The TRUSTED project took an attack-driven approach to black-box testing of automotive systems as well as embedded devices and developed novel solutions [...] in the system development lifecycle. With this approach, existing knowledge of attacks is modelled and simulated with guided-random search to explore potential weaknesses of an automotive system-under-test [...] sind mit einem * markiert. Name * E-Mail * Betreff * Nachricht * Send Dr. Dejan Nickovic Dependable Systems Engineering +43 50550 4021 +43 50550 4150 dejan.nickovic(at)ait.ac.at LINKS TRUSTED2