HATCH: Handling Vulnerabilities in the Value Chain
IoT systems are often developed with open source components since this provides high quality and development to a feasible cost. However, for open source components there are publicly available lists of vulnerabilities that it is important to be able to identify and evaluate in product development. This is not only important for product developing companies but also to system integrating organizations that integrate systems from components. The goal of the project is to offer support for this type of analysis for all types of companies.
|Effective start/end date||2018/11/30 → 2021/11/30|
- Lund University (lead)
- debricked AB
- Axis communications AB
- Securitas Sverige AB
Related research output
Olsson, T., Martin Hell
, Martin Höst
, Franke, U. & Borg, M., 2019 Nov 21
, Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE Xplore
, p. 284-291 8 p.
Research output: Chapter in Book/Report/Conference proceeding › Paper in conference proceeding
View all (2)
Select an option