Ethical hacking and security audits
Research in ethical hacking starts from the premise that the researcher plays the role of a network team, that is, the role of an attacker on the network or in a system. From this perspective, this line of research pursues the following objectives:
- Investigation of new vulnerabilities (zero day) in software through manual inspection and fuzzing techniques.
- Investigation of network attack techniques, applied to emerging technologies and different scenarios: 5G, SDN, IoT, Blockchain, network support services (eg DNS, directories).
- Development of innovative fuzzing techniques to discover software vulnerabilities.Development of mechanisms and tools for the automation of security attacks.
- Research on exploit development techniques and their mitigation.