Milestone 1
Given the extension of the field of IT security, project BIECO will focus on three specific scenarios among those which are identified as relevant by ICT Security experts.
- Insertion of intended faults within software smart agents that are deployed at runtime. These intended faults can manifest into malicious behaviour in key situations.
- Exploitation of architecture vulnerabilities though physical attacks
- Exploitation of “morally degraded” technologies for attacks (attackers become smarter than the current technology in use).