Intentional or unintentional abuse of information technologies (IT) is considered one of the most serious threats to modern society. Within the context of the abuse of knowledge and information technologies, the requirements for system security are as important as a system’s function, price or maintainability. Due to the vast complexity of computer systems as well as increasing the importance of the tasks that computers are used for, the issue of correct and reliable operation of these systems, even in situations where they are not exposed to any attacks, is of utmost importance - and is in no way trivial. In addition, the importance of IT as a means to search for safety risks within society, with regard to attacks, criminal activity, or prevention of damage caused by nature disasters, is also increasing.
Within the research dealing mainly with embedded systems, we are focusing on secure and reliable architectures, networks and protocols. For example, in the field of software, we are studying automatic formal code verification, developing algorithms used for advanced biometric authentication and coming up with modern design systems for HW/SW co-design. With regards to hardware, we are examining the methods used for assuring resistance against failures, designing autonomous reconfiguration hardware and finding ways of accelerating key security algorithms.
- Information systems, cybercrime elimination
- Secure and reliable computer systems and networks