{"id":28485,"date":"2025-04-03T09:56:23","date_gmt":"2025-04-03T07:56:23","guid":{"rendered":"https:\/\/fmd-insight.de\/?p=28485"},"modified":"2025-12-03T17:22:28","modified_gmt":"2025-12-03T16:22:28","slug":"fraunhofer-institut-fur-angewandte-und-integrierte-sicherheit-aisec","status":"publish","type":"post","link":"https:\/\/fmd-insight.de\/de\/expertise\/fmd-institute\/fraunhofer-institut-fur-angewandte-und-integrierte-sicherheit-aisec\/","title":{"rendered":"Fraunhofer-Institut f\u00fcr Angewandte und Integrierte Sicherheit <strong>AISEC<\/strong>"},"content":{"rendered":"\n    <div id=\"block_1b2b571c5d9f1dd9818ed31a0dc8977d\" class=\"lwn_block lwn_block_imgtext lwn_thewidth lwn_center\" style=\"\" test>\n        \n        <div class=\"lwn_flexparent\" >\n            <div class=\"lwn_flexchild lwn_block_imgtext_firstchild lwn_block_imgtext_media\"><div class=\"lwn_vcenter\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/Claudia-Eckert_Portrait_Copyright_Bernd_Mueller-1024x682.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/Claudia-Eckert_Portrait_Copyright_Bernd_Mueller.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/Claudia-Eckert_Portrait_Copyright_Bernd_Mueller-1024x682.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC | Bernd M\u00fcller<\/div><\/div>\n<\/div><\/div>\n            <div class=\"lwn_flexchild lwn_block_imgtext_secondchild lwn_block_imgtext_text\"><div class=\"lwn_halfwidth lwn_fullheight\"><div class=\"lwn_vcenter\"><p>\u00bbMission des Fraunhofer AISEC ist und bleibt, exzellente IT-Sicherheitsforschung in anwendungsorientierte L\u00f6sungen f\u00fcr mehr Verl\u00e4sslichkeit, Vertrauensw\u00fcrdigkeit und Manipulationssicherheit von IT-basierten Systemen und Produkten zu \u00fcberf\u00fchren.\u00ab<\/p>\n<p><strong>Prof. Dr. Claudia Eckert<\/strong> (Gesch\u00e4ftsf\u00fchrende Institutsleiterin), <strong>Prof. Dr. Georg Sigl<\/strong> (Institutsleiter)<\/p>\n<p>&nbsp;<\/p>\n<\/div><\/div><\/div>\n        <\/div>\n    <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Forschungsabteilungen<\/strong><\/h2>\n\n\n\n        <div id=\"block_88362f85bb9ee3c094b63f8f5f01e3bf\" class=\"lwn_block lwn_block_repeater lwn_thewidth lwn_center lwn_repeater_text\" style=\"\" test>\n            <div class=\"lwn_flexparent\">\n            \n                <div class=\"lwn_flexchild lwn_flex4 \">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/CST_Cognitive_Security_Technologies_Copyright_Fraunhofer_AISEC-400x250.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/CST_Cognitive_Security_Technologies_Copyright_Fraunhofer_AISEC-800x500.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/CST_Cognitive_Security_Technologies_Copyright_Fraunhofer_AISEC-400x250.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC<\/div><\/div><\/div><p><strong>Cognitive Security Technologies<\/strong><\/p>\n<ul>\n<li>Sicherheit und Privatheit f\u00fcr KI: Robuste und vertrauensw\u00fcrdige KI-Anwendungen<\/li>\n<li>Sicherheit mit KI: Anomalie-Erkennung und Predictive Maintenance<\/li>\n<li>Sicherheit durch KI: KI-gest\u00fctzte Schwachstellenanalysen und Compliance-Pr\u00fcfungen<\/li>\n<\/ul>\n<a href=\"https:\/\/www.aisec.fraunhofer.de\/de\/spotlights\/Deepfakes.html\" target=\"_blank\" class=\"lwn_button lwn_left icon-arrowright lwn_backdrop10 \" >Deepfakes<\/a><div class=\"clear\"><\/div>\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 \">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-hardware-400x250.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-hardware-800x500.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-hardware-400x250.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC<\/div><\/div><\/div><p><strong>Hardware Security<\/strong><\/p>\n<ul>\n<li>Sicherheit f\u00fcr integrierte Schaltungen, Chips und Baugruppen mehrerer Chips auf Platinen<\/li>\n<li>Hardware-Entwicklung (FPGAs und PUFs, RISC-V)<\/li>\n<li>Leitf\u00e4den, \u00dcberpr\u00fcfung von FPGA-Designs, Einrichtung von Laborumgebungen<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<a href=\"https:\/\/www.aisec.fraunhofer.de\/de\/spotlights\/vertrauenswuerdige-elektronik.html\" target=\"_blank\" class=\"lwn_button lwn_left icon-arrowright lwn_backdrop10 \" >Mehr Infos<\/a><div class=\"clear\"><\/div>\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 \">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/PIN_Product_Protection_and_Industrial_Security_Copyright_-400x250.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/PIN_Product_Protection_and_Industrial_Security_Copyright_-800x500.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/03\/PIN_Product_Protection_and_Industrial_Security_Copyright_-400x250.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC<\/div><\/div><\/div><p><strong>Product Protection and Industrial Security<\/strong><\/p>\n<ul>\n<li>Sicherheitsfragen in den Themenfeldern Automotive Security, Produktschutz, Industrial Security, Internet of Things und Smart Building<\/li>\n<li>Analysen und Systemevaluierungen f\u00fcr Fahrzeuge, Anlagen(-teile) und Geb\u00e4ude<\/li>\n<\/ul>\n\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 \">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Service-and-Application-Security-400x250.jpeg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Service-and-Application-Security-800x500.jpeg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Service-and-Application-Security-400x250.jpeg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Adobe Stock | okawa<\/div><\/div><\/div><p><strong>Service and Application Security<\/strong><\/p>\n<ul>\n<li>Sicherheit und Datenschutz f\u00fcr verteilte Anwendungen<\/li>\n<li>sichere Cloud- und Container-Infrastrukturen<\/li>\n<li>Automatisierte Bewertung der Sicherheit und Privacy<\/li>\n<li>Verschl\u00fcsselungsverfahren zur Sicherstellung der Privatheit<\/li>\n<\/ul>\n\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 lwn_flexrest4\">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/secure-operating-systems-400x250.jpeg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/secure-operating-systems-800x500.jpeg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/secure-operating-systems-400x250.jpeg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Adobe Stock | Miha Creative<\/div><\/div><\/div><p><strong>Secure Operating Systems<\/strong><\/p>\n<ul>\n<li>Sicherheit f\u00fcr Betriebssysteme und hardwarenahe Software<\/li>\n<li>Sicherheit und Sicherheitsfeatures Linux-basierter Systeme im Fokus<\/li>\n<li>HW\/SW-Codesign, Plattformsicherheit, Confidential Computing, Software Security und Software Hardening<\/li>\n<\/ul>\n\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 lwn_flexrest4\">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Header-Kompetenzzentrum-Post-Quanten-Kryptografie-2-400x250.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Header-Kompetenzzentrum-Post-Quanten-Kryptografie-2-800x456.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Header-Kompetenzzentrum-Post-Quanten-Kryptografie-2-400x250.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC<\/div><\/div><\/div><p><strong>Secure Systems Engineering<\/strong><\/p>\n<ul>\n<li>Entwicklung sicherer und nutzerfreundlicher digitaler Systeme<br \/>\nSicherheit, Interoperabilit\u00e4t, Datenschutz und Benutzbarkeit von digitalen Identit\u00e4ten<\/li>\n<li>Sicherheitsanalyse quantencomputerresistenter Verfahren, Migration zu Quantencomputer-resistenten Systemen<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n\n                <\/div>\n                <div class=\"lwn_flexchild lwn_flex4 lwn_flexrest4\">\n            <div style=\"height: 250px;\" class=\"lwn_img_heightbox\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Secure-Infrastructure-400x250.jpeg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Secure-Infrastructure-800x500.jpeg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/Secure-Infrastructure-400x250.jpeg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Adobe stock | sdecoret<\/div><\/div><\/div><p><strong>Secure Infrastructure<\/strong><\/p>\n<ul>\n<li>Sicherheit f\u00fcr zukunftsfeste Infrastrukturen<\/li>\n<li>angewandte Kryptographie und Auswirkungen von KI auf sichere Infrastrukturen<\/li>\n<li>Untersuchung und Gestaltung sicherer Netzprotokolle, Post-Quanten-Sicherheit f\u00fcr virtuelle private Netze<\/li>\n<\/ul>\n\n                <\/div>\n            <\/div>\n            <a href=\"https:\/\/www.aisec.fraunhofer.de\/de\/forschungsabteilungen.html\" target=\"_blank\" class=\"lwn_button lwn_left icon-arrowright lwn_backdrop10 \" >Mehr zu Forschungsabteilungen<\/a><div class=\"clear\"><\/div>\n        <\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Laborlandschaft: Zentrum f\u00fcr exzellente Cybersicherheitsforschung<\/strong><\/h2>\n\n\n\n    <div id=\"block_63f8151964734c647446c2c057a76dbe\" class=\"lwn_block lwn_block_imgtext lwn_thewidth lwn_center\" style=\"\" test>\n        \n        <div class=\"lwn_flexparent\" >\n            <div class=\"lwn_flexchild lwn_block_imgtext_firstchild lwn_block_imgtext_media\"><div class=\"lwn_vcenter\"><div class=\"lwn_cutclass \"><div class=\"lwn_copy_box\">\n            <div class=\"lwn_imgbox\">\n                <picture>\n                    <source srcset=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-technologie-1024x683.jpg 1x, https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-technologie-2048x1365.jpg 2x\"\/>\n                    <img decoding=\"async\" src=\"https:\/\/fmd-insight.de\/wp-content\/uploads\/2025\/02\/aisec-technologie-1024x683.jpg\" alt=\"\" class=\"\">\n                <\/picture><\/div><\/div><\/div><div class=\"lwn_caption lwn_backdrop10 no_caption\"><div class=\"lwn_copy lwn_backdrop10\"><span>&copy;<\/span>Fraunhofer AISEC<\/div><\/div>\n<\/div><\/div>\n            <div class=\"lwn_flexchild lwn_block_imgtext_secondchild lwn_block_imgtext_text\"><div class=\"lwn_halfwidth lwn_fullheight\"><div class=\"lwn_vcenter\"><ul>\n<li>Industrial Security Lab<\/li>\n<li>Automotive Security Lab<\/li>\n<li>Hardware Security Lab<\/li>\n<li>Smart Sensor Lab<\/li>\n<li>Cloud Security Lab<\/li>\n<li>System Security Lab<\/li>\n<li>Secure Data Ecosystems Lab<\/li>\n<li>Software Security Lab<\/li>\n<li>IOT Security Lab<\/li>\n<li>Lab f\u00fcr Isolationsmechanismen<\/li>\n<\/ul>\n<\/div><\/div><\/div>\n        <\/div>\n    <\/div>\n\n\n\n        <div id=\"block_712ca65abbe8d4d3892c2eb9ebb940f3\" class=\"lwn_block lwn_block_repeater lwn_thewidth lwn_center lwn_repeater_text\" style=\"\" test>\n            <div class=\"lwn_flexparent\">\n            \n                    <div class=\"lwn_flexchild lwn_flex1 \"><p>Die Laborlandschaft des Fraunhofer AISEC umfasst diverse Sicherheits-Testlabore, die mit modernsten Ger\u00e4ten ausgestattet sind. In den Laboren bewerten und analysieren die Sicherheitsexpert:innen die Sicherheit von Produkten, Hardware-Komponenten, Software-Produkten und Anwendungen. Dazu stehen ihnen eine Reihe von Verfahren zur Verf\u00fcgung, z. B. Funktions-, Interoperations-, Konformit\u00e4ts- und Compliance-Tests. Speziell abgesicherte Bereiche erm\u00f6glichen au\u00dferdem die Arbeit an sicherheitskritischen Projekten.<\/p>\n<a href=\"https:\/\/www.aisec.fraunhofer.de\/de\/das-institut\/laborraeume.html\" target=\"_blank\" class=\"lwn_button lwn_left icon-arrowright lwn_backdrop10 \" >Mehr zum Cybersicherheitszentrum<\/a><div class=\"clear\"><\/div>\n                    <\/div>\n            <\/div>\n            \n        <\/div>\n\n\n<h3 class=\"wp-block-heading\"><strong>Lernlabor Cybersicherheit<\/strong><\/h3>\n\n\n\n        <div id=\"block_41230f8e75907ff334c2f08aec728c62\" class=\"lwn_block lwn_block_repeater lwn_thewidth lwn_center lwn_repeater_text\" style=\"\" test>\n            <div class=\"lwn_flexparent\">\n            \n                    <div class=\"lwn_flexchild lwn_flex1 \"><p>Die fortschreitende Digitalisierung verst\u00e4rkt das Bedrohungspotenzial von Cyberattacken. In Sachen IT-Sicherheit auf dem neusten Stand zu bleiben, ist f\u00fcr IT-Sicherheitsfachkr\u00e4fte, Entwicklungsteams, Testende, Anwendende und F\u00fchrungskr\u00e4fte eine stetige Herausforderung. Das Lernlabor Cybersicherheit bietet in Online-Seminaren, Pr\u00e4senz-Kursen oder hybriden Formaten tiefergehendes Verst\u00e4ndnis und praktisches Know-how, um Cyberrisiken zu minimieren und im Falle eines Angriffs schnell und sicher agieren zu k\u00f6nnen. Am Lernlabor Cybersicherheit sind sechs Fraunhofer-Institute und acht Fachhochschulen beteiligt.<\/p>\n<a href=\"https:\/\/www.aisec.fraunhofer.de\/de\/lernlabor.html\" target=\"_blank\" class=\"lwn_button lwn_left icon-arrowright lwn_backdrop10 \" >Mehr Informationen<\/a><div class=\"clear\"><\/div>\n                    <\/div>\n            <\/div>\n            \n        <\/div>","protected":false},"excerpt":{"rendered":"<p>Forschungsabteilungen Laborlandschaft: Zentrum f\u00fcr exzellente Cybersicherheitsforschung Lernlabor Cybersicherheit<\/p>\n","protected":false},"author":127,"featured_media":29281,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[107],"tags":[],"class_list":["post-28485","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fmd-institute"],"acf":[],"_links":{"self":[{"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/posts\/28485","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/users\/127"}],"replies":[{"embeddable":true,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/comments?post=28485"}],"version-history":[{"count":9,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/posts\/28485\/revisions"}],"predecessor-version":[{"id":32644,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/posts\/28485\/revisions\/32644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/media\/29281"}],"wp:attachment":[{"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/media?parent=28485"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/categories?post=28485"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fmd-insight.de\/de\/wp-json\/wp\/v2\/tags?post=28485"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}