According to experts, one third of all IT vulnerabilities today
are due to inadequate software verification. Internal program
processes are not sufficiently secured against manipulation
by attackers, especially if access has been gained. There is a
lack of internal control instances that can monitor and
control program flows. Especially when a software
vulnerability becomes known, quick action is required,
whereby the consequences for an individual application are
often not foreseeable.
With our approach (B)LOCKBOX, software building blocks
act as verified entities within a transaction-based blockchain
network. Source Code, binaries and application execution
become supervised. Unwanted interference and manipulation
are prevented by the integrity of the distributed system.
«According to experts, one third of all IT vulnerabilities today
are due to inadequate software verification. Internal program
processes are not sufficiently secured against manipulation
by attackers, especially if access has been gained. There is a
lack of internal control instances that can monitor and
control program flows. Especially when a software
vulnerability becomes known, quick action is required,
whereby the consequences for an individual application are
often not fores...
»