Milestone 1

Given the extension of the field of IT security, project BIECO will focus on three specific scenarios among those which are identified as relevant by ICT Security experts.

  1. Insertion of intended faults within software smart agents that are deployed at runtime. These intended faults can manifest into malicious behaviour in key situations.
  2. Exploitation of architecture vulnerabilities though physical attacks
  3. Exploitation of “morally degraded” technologies for attacks (attackers become smarter than the current technology in use).