We are always interested in talented students looking to write their master thesis and offers several interesting proposals in the areas of embedded systems and embedded system security.
We are also interested in hardware design, development processes and other process related areas.
Today, network based cryptosystems have to be configured manually in order for different devices to communicate with each other. This can either be done physically on each device or by using remote administration. However, there are situations where none of these methods are sufficient and where it would preferable if the devices could be plugged in their respective physical locations and automatically create P2P connections to communicate.
Even in security-critical systems, the use of third-party software components is common. Integrating open source components can save time/money and in some cases increase quality of the software. On the other hand it introduces a risk as it is possible for anyone to find security flaws and one has very little control of how the software is developed.
There are several different software-based network devices which handles sensitive information. Their purpose can e.g. be to encrypt network traffic or filter payloads. During normal operation, it is possible to show that the information is handled in a correct and secure manner. But what happens if the device fails, is the claim still valid when encountering an error and/or an unrecoverable error state?
Network segmentation provides methods of controlling access, movement, and network problems. This is commonly viewed as an improved security measurement in networking and as such, the demand for user-friendly visualizations are rising. There are several different methods for displaying and visualizing network topologies. Their purpose can be to display various information e.g. about nodes, subnetworks or network load and bandwidth issues.
Visual programming (VP) enables non-programmers to develop simple, easy to understand executable code. The programming visualization lets users manipulate graphical objects rather than textually (TP). This is supposed to help the user to develop independent of programming language and future knowledge. Using boxes and arrows is a common way to visualize, another way is to represent the flow of code in a flow-chart manner.
Advenica provides expertise and world-class high assurance cybersecurity solutions for critical data in motion up to Top Secret classification. We enable countries, authorities and companies to raise information security and digitalise responsibly. Founded in 1993, we are EU approved to the highest level of security. Our unique products are designed, developed and manufactured in Sweden.
Advenica has offices in Malmö, Stockholm, Helsinki and Vienna, and is a publicly traded company listed on Nasdaq First North Premier. Read more at advenica.com
Career site by Teamtailor