Open the enrollment in
The specialized Lab for the qualification of hardware and software components of critical systems, with a special focus on security systems and in particular about IP video surveillance.
Kyber Lab is the specialized Lab for the qualification of hardware and software components of critical systems, with a special focus on security systems and in particular about IP video surveillance.
When will the lab take place?
From December 2017 to March 2018, workshop duration of 4 hours and in classes of up to 10 people..
Why this name?
Cyber or "Kyber" is the abbreviation of cybernetics from the Greek word κυβερνητικὴ (τέχνη) (art) to hold the helm of a ship.
The ancient Greek word kybernetes (κυβερνήτης) refers to the pilot of a ship. The root “Kyber” stands for "helm" and finds a parallel in the Latin guber, which we find in the gubernator, helmsman. Kyber and Guber make a clear reference to a common Indo-European progenitor who meant Helm. In both languages, the term also extends to a metaphorical meaning indicating the one who guides or governs a city or state: already in the Greek of Plato  it is attested, in this has a wider meaning of the Art of governing.
How Kyber Lab is born?
Link Campus University and Bosch have begun the process of setting up a specialized lab for the qualification of critical hardware and software components, with a special focus on security systems and in particular on IP surveillance.
The lab is located at Link Campus University in both seats of Rome and Naples and will also be open to the contribution of other universities.
Secure system conﬁguration, device hardening and ﬁrewall management
Cyber security and risk monitoring for networks and applications
Hardening of video surveillance systems
Malware typical of video surveillance systems
The main activities of the Laboratory are listed below:
- Chipset integrity
- Cryptographic implementations
- Analysis of hardware design information and data that can be derived from it:
- device bootloaders
- device firmware (operating system and app)
- device factory software
- factory tools such as flashing tools and test station software
- analisi factory tools for access to backend database, permission systems, web services, circuits of debugging.
- schemes, data sheet and other information hardware
- device unlock (bootloader lock e subsidy lock)
- Threat intelligence
- Data leakage through attacks side channel.
- HDL code review
- Sistems Anti-cloning
- Physically unclonable
- Protections boot code
- CRC checks
The lab will collaborate with prominent names in Italian cyber security and university researchers and students to train them for immediate insertion in business and institutions