Motivation and issue
Hardly a day passes without reports of a newly discovered security vulnerability or a successful cyberattack on a software system. These days, this is by no means restricted to IT systems in the office, at home or on the smartphone. Increasingly it is also affecting intelligent technical systems like modern automobiles or control systems for industrial machinery. More and more of the innovative functions in these systems are software-driven and connected to the Internet. Unfortunately, external connections frequently make these systems the target of cyberattacks. Around 90% of the attacks focus on software vulnerabilities produced by substandard engineering. Often these security vulnerabilities are not detected and rectified until after the fact, which requires a significant amount of manual rework.