Timely Detection, Mitigation, and Reconfiguration
Sound methodological,
technological and organizational approach towards IoT security lifecycle management
Certification & security evaluation
Automating the process and verifying the compliance of security properties
Enhanced Open Hardware Security
Bootstrapping with attestation tokens providing device
model, ID, behavioural profiles, associated threats, secure configuration
Secure integration of IoT devices
Enhanced automatic IoT
identification and configuration providing increased domain security
Behavioural profiles
Extension of Manufacturer Usage
Description (MUD) standard to express configuration policies to configure the device in an intended secure way
Security monitoring & detection
ML based mechanisms
to analyse protocols, vulnerabilities, the effectiveness of IoT security
Information sharing and upgrading
Holistic and automated approach for dynamic patching, software updates, and policy management
Timely Detection, Mitigation, and Reconfiguration
Sound methodological,
technological and organizational approach towards IoT security lifecycle management
Timely Detection, Mitigation, and Reconfiguration
Sound methodological,
technological and organizational approach towards IoT security lifecycle management
Latest News
Read about CERTIFY in Blogs, Press and Events
“IoT without security = Internet of Threats.”
Project Partners
CERTIFY consortium includes 6 SMEs, 4 industrial partners, 2 universities and 1 research institute from 8 different countries in Europe.