System Security

Research Group (S2G)

System Security

The mission of the System Security research group (S2G) is to ensure that systems in our society are resilient against cyber-attacks and fulfil essential security and privacy requirements. The Systems that we focus our research on go beyond the classic ICT perspective and include societal, economical and human factors.

Research objectives

Develop models, methods, techniques and tools that can be used for:

  • building secure systems
  • evaluating and assessing the security level of systems
  • enhancing the security of systems
  • training and educating users and organizations to understand and apply security methods and adversarial thinking

The research activities of our group are both theoretical as well as application oriented, and are conducted in areas such as secure software development lifecycle, security assurance and maturity modeling, vulnerability, threat and risk analysis, DevOps security, modeling and verification of security protocols, model-driven security, and human aspects of security.

Logo

Contact us

Contact us

News

News

Partners

Partners

 

 

Infrastructure

Infrastructure

Laboratories and teaching areas used by our researchers and students.

Publications

Publications

We aim to disseminate our research results to the scientific community through scientific publications. We publish at the highest international level.

View all Security systems group publications

Projects

Projects

Our research activity is organised around the following research projects.

EU projects

  • EEA: Open Cyber Range (OCR) | contact Basel Katt
  • norDic-baltic cybeR summEr cAMp (DREAM) | contact Basel Katt

National projects

IE Faculty Focus Area

  • Cyber Security
  • Digital Enterprice
  • Internet of Things

Topics for MCs and BCs Theses

Topics for MCs and BCs Theses

The system security group offers and will continue to offer thesis topics in the following topics:

  • Security testing and security assurance
  • Socio-technical system analysis
  • Attack/defence simulation and modeling
  • DevOps and cloud services
  • Vulnerability analysis
  • Access control, authentication, and other security services