Embedded Security

The fast reduction of structure sizes in semiconductor technology allows the fabrication of increasingly powerful, energy-saving, and low-price microprocessors. Small micro-controllers can nowadays be found in more and more devices of daily life, like cars or mobile phones. These so-called embedded systems perform various sophisticated and sometimes safety-critical tasks. Failures of these systems have an immediate impact on our real live. These systems impose high requirements on safety and reliability.

Especially the increasing connectivity among embedded systems (Internet of things) demands security functions to ensure a reliable and safe operation of embedded systems. Because of the stringent resource constraints of embedded systems (computational power, energy), these security functions have to be combined with the actual functionality of the embedded system. Integrated security functions are therefore a necessity for a safe and reliable operation of embedded systems.


For our costumers, Fraunhofer AISEC develops hardened embedded systems, in which software security functions are complemented with matching hardware security functions. We offer an integrated hardware and software engineering process, as well as the necessary migration of functionality into hardware. Fraunhofer AISEC provides concepts, and develops and evaluates solutions for embedded systems according to different criteria, like energy consumption, computational power, and communication cost. These customized solutions range from the correct integration of hardware security elements to the development of tailored security solutions in hardware and software, according to the dedicated needs of our costumers.

Skills and services at a glance

  • side-channel analysis and attacks on embedded systems, together with the development of effective countermeasures
  • scalable techniques for the identification and authentication of components
  • efficient techniques for fault-detection and fault-tolerance in digital circuits
  • advanced virtualization concepts for embedded components
  • trusted operating system kernels for embedded systems
  • specific security modules for embedded systems based on field programmable gate arrays (FPGAs)


  • S. Wessel, M. Huber and C. Eckert. "Improving Mobile Device Security with Operating System-Level Virtualization". Computers & Security Journal (COSE) 2015.
  • M. Weiß and B. Weggemann. "On Cache Timing Attacks Considering Multi-Core Aspects in Virtualized Embedded Systems". 6th International Conference on Trustwrothy Systems (InTrust China) 2014.
  • S. Wessel, F. Stumpf, I. Herdt and C. Eckert. "Improving Mobile Device Security with Operating System-Level Virtualization". IFIP Advances in Information and Communication Technology Volume 405, 2013 -> Abstract