Why

IoT applications are often based on high-volume, low-cost, and resource-constrained hardware that is distributed throughout "the field", sometimes literally. This makes them easier to attack than a personal computer in an office, or a server in a data center.

Yet an IoT device may be able to open the door to a factory, to open flood gates in a river, or to deliver (or fake) vital signs measurements of a patient in a hospital. The potential for attacks is huge, and thus also the potential cost in terms of health, life, and money.

As engineers, we want to increase trust in the Internet of Things, by making it more secure – even on low-cost hardware.



How

We apply solid software engineering principles, and take the time to go the extra mile for best quality.

Designing modular software systems is one of our key skills. Modularity improves maintainability, portability, security, memory footprint, and longevity. Modules hide implementation complexity behind well-documented programming interfaces. Modules can also hide platform differences, thereby enabling software to work on a variety of microcontrollers with minimal adaptations. Modules limit the attack surface that a device exposes. Modules make dependencies manageable. We regard module interfaces as "contracts" in the sense of Bertrand Meyer's design-by-contract, one of the most effective approaches for building reliable software.



What

We have created innovative solutions, platforms, and software components in the industrial, medical and consumer IoT, see our references. Today, we focus on our crypto library.



Who

We are a spinoff of the Swiss Federal Institute of Technology (ETH Zürich). Our innovation history and experience, in what today is called the Internet of Things, goes back almost 30 years.



Where

We are located in Zürich – a hotbed of Internet of Things activities, from research at ETH, to corporate research & development centers (e.g., IBM, Google) to a number of startup companies.