Fraunhofer AISEC researchers regularly publish studies on current topics in the area of IT security.

Also see Fraunhofer Publica and our bibliography for an overview for articles, conference papers, research reports, studies, theses, patents, etc. by researchers of the Fraunhofer-Gesellschaft.

Find more interesting articles and papers on our German website.


Annual reports


Annual report 2022

Find out how Fraunhofer AISEC 2022 has worked towards enhancing IT security for enterprises and the public sector and staying one step ahead of attackers in the annual report »Innovating with Security«.


Annual report 2018/2019

(in German)



Trusted Electronics

In a study for the European Commission, Fraunhofer AISEC examines the challenges and motivations for secure and reliable electronics, with a focus on secure designs, supply chains and analysis methods.


Evidence Review Report

Strategic Crisis Management in the EU

As a member of the SAPEA Working Group, Prof. Claudia Eckert co-authored the Evidence Review Report »Strategic Crisis Management in the EU«, which served as the basis for a set of recommendations to the European Commission.


Impulse paper


In the acatech (National Academy of Science and Engineering) impulse paper, Prof. Eckert and Prof. Sigl discuss the potential of an open standard for chip development.



Security of AI-Systems: Fundamentals. Adversarial Deep Learning.

The study by Fraunhofer AISEC, Fraunhofer IAIS, TÜViT and Neurocat provides an overview of machine learning-specific vulnerabilities. It discusses the resilience of AI models to attacks and shows best practices for protecting Deep Learning-based AI applications. It was commissioned by the German Federal Office for Information Security (BSI).


Reference paper

Trustworthy Electronics

As part of the Velektronik research project, Fraunhofer AISEC discusses threats to trustworthiness throughout the value chain of electronics in Part 1 of their reference paper »Trustworthy Electronics«.



Encrypted Traffic Analysis

NISA report on opportunities and limitations in the analysis of encrypted network traffic



Threat Analysis of Container-as-a-Service for Network Function Virtualization

Whitepaper describing a Container-as-a-Service platform, analyzing security threats and outline possible mitigations