Projects
LoRaKey
Secret Key Generation for Long Range Communication Networks - LoRaKey aims at energy efficient secret key generation for lightweight LPWAN applications.
KIF – Cryptography for Wireless Communication
A highly secure and durable cryptography for wireless communication integrating radio data. – High frequency data transmission may allow for the traffic of the future.
Secure Development Lifecycle for CPPS
Qualification measure regarding the implementation of a Secure Development Lifecycle for Cyber-Physical Production Systems (CPPS)
PriSAd - Privacy and Security in Online Advertisement
Integral analysis of privacy and security of online advertising networks
Substation Security
The project aims at improving security within the automation network of power distribution systems by developing anomaly detection algorithms for the communication networks of substations.
upribox 2 - Usable Privacy Box 2
The usable privacy box (upribox) is a network tool that filters ads on all connected devices such as smartphones or laptops and ultimately protects the user’s privacy. The upribox 2.0 is even easier...
CPS-Security
Investigating threats to cyber-physical systems (CPS) and developing countermeasures
ITsec.at
Project ITsec.at aims at identifying and counteracting cyber-attacks. Strategies, security tests and a comprehensive decision support system are developped.
upribox - Usable Privacy Box
The project "usable privacy box" (upribox) developes a software and creates a device that protects internet privacy and ensures data security.
SmartMeterIDS
This project aims at improving the operational security of advanced metering infrastructures by the development of an innovative intrusion detection system tailored to the specific characteristics.
Model Based System Integration of CPS
Developing prototypes for an automated control programme in PLCopen from state machines and a learning-capable Part Average Analysis for a real production environment.
LIVEFOR
The project LIVEFOR aims at enabling corporations their own research activities in the field of live-forensic and analysis of volatile data of a running computer system.