Finding vulnerabilities
Our lives become increasingly digitized. We use ever more interconnected devices to interact with our environment, yet the security requirements are high. The consequences of insecure IoT devices were impressively demonstrated by the Mirai botnet, which launched the largest observed DDoS attack to date. A different threat is posed in the embedded sector, as various parts of critical infrastructure is managed by such devices.