More Security for Automotive IT
Increasing connectivity in automotive IT poses new vulnerabilities. Fraunhofer SIT has developed a software platform where secure control units can be developed based on a TPM 2.0.
Errors and vulnerabilities in software cause damage running into billions, can ruin a company's reputation and, in the worst case, endanger the safety of people. That's why the Fraunhofer SIT developed VUSC – the code scanner. VUSC (for VUlnerability SCanner) helps companies and developers to detect vulnerabilities in code within minutes.
More about VUSC
Encryption for everyone
End-to-end encryption ensures that only sender and recipient are able to read messages in plain text. Fraunhofer SIT’s Volksverschlüsselung simplifies the distribution of cryptographic codes in such a way that even a layman is able to manage it easily.
App security testing tool
Most apps, be they for internet shopping, gaming or social networking, are aimed at private users. But there are hidden risks for businesses. A new test framework will help to uncover gaps in app security and detect malware.
Open Doors with your Smartphone
Keys in your Smartphone
Key2Share is a smartphone solution for NFC-enabled locks. It turns smartphones into door openers for cars, hotel rooms and offices. Access rights can be flexibly managed with a smartphone app. A special security architecture on the smartphone protects cryptographic keys from malware.
The Fraunhofer SIT has discovered serious flaws in the TwitterKit for iOS 3.4.2 that can result in account abuse and data loss. The TwitterKit is an end-of-life software library that is no longer updated but is still used in apps. The Fraunhofer researchers urge app developers to stop using the TwitterKit for iOS app developments and to replace it in existing apps.
JAB-Code, the color barcode of the Fraunhofer SIT, is on the way to becoming an international ISO standard. JAB-Code – Just Another Barcode – is to be brought to a full ISO standard by 2022. It uses color as a third dimension and can therefore store more information in the same space. The color code does not have to use database references and links, it simply stores the information itself.
Hackers can access sensitive data and services also via telephone devices: Most companies use VoIP telephones that are integrated into the company network. Security researchers at the Fraunhofer Institute for Secure Information Technology have found a total of 40 partly serious vulnerabilities in these VoIP telephones.
Nanyang Technological University, Singapore (NTU Singapore) and FraunhoferGesellschaft (Fraunhofer), a renowned German institution for applied research, are launching a research institute to develop digital technologies to help companies move into the digital era and remain competitive.
Cryptography must become more flexible in order to be able to react quickly to technical changes. If this does not happen soon, the cyber world could experience a security meltdown. This is an experts' opinion on how businesses and society can be protected from new forms of attacks on cryptography with quantum computers.
For devices in the Internet of Things, identities and their integrity are of central importance: Industrie 4.0, Smart Home or Smart Traffic only work if each machine, each piece of hardware, each device has its own non-clonable identity, which also includes the integrity of the running firmware. To meet these challenges, Fraunhofer SIT uses the principle of Trusted Computing.