Data exchanged by Internet of Things (IoT) applications is vulnerable to attack. We implement appropriate measures to ensure that data is effectively protected at all times. Blockchain-based concepts are also employed where appropriate.
Research focus areas
IT security is a highly relevant topic in today’s environment, even though it does not always generate direct economic value. Threats arising from cyber warfare, organised crime such as ransomware gangs, and the increasing risks to critical infrastructures are pervasive and can affect anyone — whether targeted or at random. The ability to understand regulatory requirements and translate them into meaningful, straightforward, and maintainable technical solutions is rare and highly valuable in today’s landscape.
Absolute security cannot be achieved today — nor is it required. The objective is to design the security of an application or product in such a way that the cost of an attack exceeds the expected benefit for the attacker. To achieve this, appropriate measures must be implemented based on a well-defined risk profile.
Our expertise includes state-of-the-art network security with micro-segmentation to contain lateral movement and a shift-left approach: through fuzzing — the most successful bug detection technique of the past decade — we identify vulnerabilities before release.
To enhance transparency and tamper resistance, we leverage blockchain technologies. Decentralised applications based on blockchain no longer require a central trusted authority — every change is traceable and protected against unauthorised manipulation. This provides clear security advantages, particularly in areas such as finance, supply chains, and property rights.
Infrastructure
The domain provides the opportunity not only to train traditional technologies such as the configuration and diagnosis of routers and switches, but also to experience and address more recent concepts — including Software Defined Networks (SDN), virtualised systems, and distributed services — in realistic laboratory settings.
The workstations are permanently equipped with four computer systems, which can be configured and utilised according to the specific task and methodology. In addition, supplementary hardware is available and can be adapted as required, including the network infrastructure.
Infrastructure
- Each workstation includes a base unit and three shuttle units, consolidated via a KVM switch. The operating system can be adapted to specific requirements with just a few keystrokes.
- In addition, each workstation features two isolated networks and connectivity options to existing infrastructures, depending on the required level of isolation.
- Beyond its security mechanisms, the domain also provides an extensive virtual infrastructure to support various laboratory tasks, as well as its own autonomous internet environment with all standard functionalities.
Degree programmes offerings
Continuing education offerings
Contact us
For further information about the FHNW School of Computer Science or to discuss potential collaboration opportunities, please contact us:


Dr. Martin Gwerder
- Phone
- +41 56 202 76 81 (Direct)
- martin.gwerder@fhnw.ch
Our School

