SECONDS: Securing Connected Devices
Reference number | |
Coordinator | Lunds universitet - Institutionen för Elektro- och informationsteknik |
Funding from Vinnova | SEK 7 909 000 |
Project duration | May 2016 - November 2018 |
Status | Completed |
Venture | Challenge-driven innovation - Phase 2 Collaboration |
Call | Challenge-driven innovation - Stage 2 Collaboration 2016 (spring) |
Important results from the project
The project´s goal has been to implement, test and evaluate solutions to address vulnerabilities in third party software. Specifically, the project has had the goal of developing solutions to shorten the time from the detection of vulnerability until decisions for actions can be taken. Enhanced processes have been proposed by developing a maturity model specifically targeting vulnerability management. A service in the form of a proof-of-concept implementation for managing and tracking vulnerabilities has also been implemented and evaluated.
Expected long term effects
The results of the project include the maturity model and the implemented service, but also a number of other results developed during the project. Parts of the results, the implemented service and few other results linked to machine learning and automation have also been commercialized. We expect that in the future this will lead to better and more efficient products to address vulnerabilities in connected devices.
Approach and implementation
The maturity model has been developed in collaboration with the project participants, partly based on interviews, partly on aggregation of relevant activities described in other maturity models, and on identified recommendations and requirements for security in IoT products. For the implemented service, all project partners have been involved in the evaluation. It has also been tested in specific environments where e.g., user data has been used to deliver information and also where the service´s database has provided information to a third party service.