Security concept: Lock on digital screen

Intentional or unintentional abuse of information technologies (IT) is considered one of the most serious threats to modern society. Within the context of the abuse of knowledge and information technologies, the requirements for system security are as important as a system’s function, price or maintainability. Due to the vast complexity of computer systems as well as increasing the importance of the tasks that computers are used for, the issue of correct and reliable operation of these systems, even in situations where they are not exposed to any attacks, is of utmost importance - and is in no way trivial. In addition, the importance of IT as a means to search for safety risks within society, with regard to attacks, criminal activity, or prevention of damage caused by nature disasters, is also increasing.

Within the research dealing mainly with embedded systems, we are focusing on secure and reliable architectures, networks and protocols. For example, in the field of software, we are studying automatic formal code verification, developing algorithms used for advanced biometric authentication and coming up with modern design systems for HW/SW co-design. With regards to hardware, we are examining the methods used for assuring resistance against failures, designing autonomous reconfiguration hardware and finding ways of accelerating key security algorithms.

  • Information systems, cybercrime elimination
  • Secure and reliable computer systems and networks

From our porfolio

 

19th PRACE Call for Proposals for Project Access
The 19th PRACE Call for Proposals for Project Access is open till 30 April 2019. […]
Press Release: Artificial intelligence research gets green
Artificial intelligence research gets green
Invitation to the course Data science with R and Python
(24-25/04/2019)
When: Wednesday 24 April 2019, 9.30am – Thursday 25 April 2019, 2.30pm Where: campus VŠB-TUO […]
The launch of DGX-2
The supercomputers of IT4Innovations will be extended with a specialized system for artificial intelligence calculations, […]
16th Open Access Grant Competition
Announced regularly three times a year for employees of research institutions, scientific and educational organizations. […]
All news