
{"id":1316,"date":"2022-09-30T13:01:56","date_gmt":"2022-09-30T11:01:56","guid":{"rendered":"https:\/\/fordaysec.de\/secure-integration\/"},"modified":"2025-12-04T15:57:48","modified_gmt":"2025-12-04T14:57:48","slug":"secure-integration","status":"publish","type":"page","link":"https:\/\/fordaysec.de\/en\/secure-integration","title":{"rendered":"Secure Integration"},"content":{"rendered":"\n<div class=\"wp-block-cover alignfull is-light mb-2rem\" style=\"min-height:2rem;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-gray-background-color has-background-dim-100 has-background-dim\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/fordaysec.de\/en\">Home<\/a><\/span> | <span class=\"breadcrumb_last\" aria-current=\"page\">Secure Integration<\/span><\/span><\/div>\n\n\n<div class=\"wp-block-group pl-0 pr-0\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"wp-block-columns mb-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<h3 class=\"wp-block-heading\">SECURE INTEGRATION OF INSECURE IOT DEVICES<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns mb-0 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>The rapid proliferation of Internet of Things (IoT) devices and gadgets that ship with vulnerable software and hardware is particularly problematic today, as smart home devices, such as cameras, are often integrated into the home office environment. Although employers have no control over the patch level of IoT devices in the home office, employees must be provided a workstation with privileged access to the corporate network to continue work processes. These often interact with potentially vulnerable IoT devices in the home office, making them attractive targets for attackers as they can be exploited to penetrate the corporate network with employee privileges. <\/p>\n\n\n\n<p>To reduce the associated threats, the subproject is investigating software solutions that aim to harden and effectively protect IoT devices against attacks to known software and hardware vulnerabilities. Our focus is on developing software extensions that can either be enforced on the corporate network or installed on employee IoT devices without the need to modify or replace IoT hardware. Our approach is to leverage available hardware capabilities to redesign and harden traditional software building blocks used in the IoT, enabling end users to integrate desired IoT devices into secure enterprise structures &#8211; without specialized knowledge or additional effort.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-group teilprojekt-bild\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\"><\/div><\/div>\n\n\n\n<p style=\"font-size:28px\"><strong>Contact<\/strong><\/p>\n\n\n\n<p>Prof. Dr. Claudia Eckert<br>Technical University of Munich<br>Mail: <a href=\"mailto:&#099;l&#097;&#117;&#100;&#105;&#097;&#046;e&#099;&#107;er&#116;&#064;in.&#116;&#117;&#109;&#046;de\">&#099;&#108;&#097;&#117;&#100;&#105;&#097;.&#101;&#099;ke&#114;t&#064;i&#110;&#046;&#116;um.&#100;&#101;<\/a><br>Phone: +49 (0) 89 289-18578<\/p>\n\n\n\n<p>Marius Momeu, M. Sc.<br>Mail: <a href=\"mailto:m&#111;&#109;eu&#064;s&#101;&#099;.i&#110;&#046;tu&#109;.&#100;e\">&#109;&#111;m&#101;&#117;&#064;s&#101;&#099;&#046;in.tum&#046;d&#101;<\/a><\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The rapid proliferation of Internet of Things (IoT) devices and gadgets that ship with vulnerable software and hardware is particularly&hellip;<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":50,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1316","page","type-page","status-publish"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Secure Integration - fordaysec<\/title>\n<meta name=\"description\" content=\"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fordaysec.de\/en\/secure-integration\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Integration - fordaysec\" \/>\n<meta property=\"og:description\" content=\"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fordaysec.de\/en\/secure-integration\" \/>\n<meta property=\"og:site_name\" content=\"fordaysec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T14:57:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/secure-integration\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/secure-integration\",\"name\":\"Secure Integration - fordaysec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#website\"},\"datePublished\":\"2022-09-30T11:01:56+00:00\",\"dateModified\":\"2025-12-04T14:57:48+00:00\",\"description\":\"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/secure-integration#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fordaysec.de\\\/en\\\/secure-integration\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en\\\/secure-integration#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/fordaysec.de\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Integration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#website\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\",\"name\":\"fordaysec\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fordaysec.de\\\/en?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#organization\",\"name\":\"fordaysec\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/en\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/fordaysec.de\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ForDaySec-Logo.png\",\"contentUrl\":\"https:\\\/\\\/fordaysec.de\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/ForDaySec-Logo.png\",\"width\":1000,\"height\":410,\"caption\":\"fordaysec\"},\"image\":{\"@id\":\"https:\\\/\\\/fordaysec.de\\\/en#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure Integration - fordaysec","description":"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fordaysec.de\/en\/secure-integration","og_locale":"en_US","og_type":"article","og_title":"Secure Integration - fordaysec","og_description":"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.","og_url":"https:\/\/fordaysec.de\/en\/secure-integration","og_site_name":"fordaysec","article_modified_time":"2025-12-04T14:57:48+00:00","og_image":[{"width":1000,"height":410,"url":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fordaysec.de\/en\/secure-integration","url":"https:\/\/fordaysec.de\/en\/secure-integration","name":"Secure Integration - fordaysec","isPartOf":{"@id":"https:\/\/fordaysec.de\/en#website"},"datePublished":"2022-09-30T11:01:56+00:00","dateModified":"2025-12-04T14:57:48+00:00","description":"To reduce threats, the project is investigating software solutions aimed at protecting IoT devices against attacks.","breadcrumb":{"@id":"https:\/\/fordaysec.de\/en\/secure-integration#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fordaysec.de\/en\/secure-integration"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fordaysec.de\/en\/secure-integration#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fordaysec.de\/en"},{"@type":"ListItem","position":2,"name":"Secure Integration"}]},{"@type":"WebSite","@id":"https:\/\/fordaysec.de\/en#website","url":"https:\/\/fordaysec.de\/en","name":"fordaysec","description":"","publisher":{"@id":"https:\/\/fordaysec.de\/en#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fordaysec.de\/en?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/fordaysec.de\/en#organization","name":"fordaysec","url":"https:\/\/fordaysec.de\/en","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/fordaysec.de\/en#\/schema\/logo\/image\/","url":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","contentUrl":"https:\/\/fordaysec.de\/wp-content\/uploads\/2022\/09\/ForDaySec-Logo.png","width":1000,"height":410,"caption":"fordaysec"},"image":{"@id":"https:\/\/fordaysec.de\/en#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/comments?post=1316"}],"version-history":[{"count":4,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1316\/revisions"}],"predecessor-version":[{"id":2630,"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/pages\/1316\/revisions\/2630"}],"wp:attachment":[{"href":"https:\/\/fordaysec.de\/en\/wp-json\/wp\/v2\/media?parent=1316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}