548,282 active members*
1,648 visitors online*
Register for free
Login Register

Perfection in Protection, Licensing, and Security

A Cybersecurity Roadmap for a Digitized Society

February 2019
A Cybersecurity Roadmap for a Digitized Society

Cybersecurity research is a “technological prerequisite” for addressing the numerous disruptive challenges brought on by the rapid progression of the digitalization of society. That sentiment is the basis for a comprehensive cybersecurity research project that has led to the development of the SecUnity-Roadmap, Cybersecurity Research: Challenges and Course of ActionSecUnity is a joint project organized by five institutions focused on IT security research. A total of six research institutes with seven groups participated in the SecUnity project.

The roadmap, which was officially released in Brussels on February 5th, was the creation of approximately 30 European researchers from academia and industry, who have collaborated on the project since early 2016. Over that period, the researchers exchanged their expert points of view on the pressing problems over the course of several workshops and integrated their consensus into the roadmap.

According to Joern Mueller-Quade, Spokesman of SecUnity and one of the co-authors of the roadmap, the researchers agreed “that effective security and privacy measures require a systematic and holistic approach which considers security and privacy from the ground up.” Professor Mueller-Quade, Director, FZI - Research Centre for Information Technology, & Professor, KIT Karlsruhe Institute for Theoretical Informatics (ITI), is also well known to Wibu-Systems as one of the collaborators on the Blurry Box cryptography project which produced the revolutionary encryption mechanism that has been incorporated into Wibu-Systems CodeMeter Protection Suite.

The traditional and new cybersecurity research fields and challenges examined by the group included securing cryptographic systems against emerging attacks, trustworthy platforms, secure lifecycle despite less trustworthy components, quantifying security, IT security and data protection for machine learning, and big data privacy. Each area underwent a thorough examination of potential and real-world scenarios. The roadmap also provides recommendations for courses of action to achieve short, mid-, and long-term goals in each area.

While Wibu-Systems is involved in many aspects of cybersecurity, one particular area of interest to us in the roadmap was the discussion around trustworthy platforms. The researchers noted that the long-standing concepts of perimeter-based security architectures with well-defined trust boundaries used in IT security up to now have been outgrown by the reality of today’s digital transformation. They pointed out that even on single devices, multiple (potentially untrusted) third-party applications are integrated and interact with each other. Such interactions occur inside smart phones as well as in virtualized cloud data centers and, in the future, will be found in smart factories and other critical infrastructures. They concluded that to address these rising challenges, it is necessary to reliably assess the identity and integrity of each involved entity and then to provide strong means for data secrecy and privacy using hardware-based trust anchors such as Trusted Platform Modules (TPMs) which would enable the design and integration of trustworthy applications and protocols.

To broaden our support for secure elements in connected devices, Wibu-Systems joined the Trusted Computing Group (TCG) in 2016, a not-for-profit organization, formed to develop, define, and promote open, vendor-neutral, global industry standards, supporting a hardware-based root of trust. In cooperation with the TCG and its member organizations, our CodeMeter hardware secure elements now support TCG specifications which will streamline software licensing to all TPM 2.0 users.

At the upcoming Embedded World 2019 meeting in Nuremburg, Feb. 26-27, we will participate with two other TCG member companies, OnBoard Security and Wind River, and demonstrate solutions for IoT and embedded security based on TCG specifications and technologies with a root of trust. One part of the demonstration will explain how to manage licenses with CodeMeter using TPMs as alternative safe repositories for encrypted code keys.

Blog Archiv

November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
October 2016
September 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016