EC07 - Secure Autonomous Systems

A focused exploration of attacks, defences, and trust in autonomous systems.

Empty space, drag to resize

Start Date

... September 2026

  Credits

7.5 ECTS

  Semester

2 semester

  Delivery

Distance Learning

  Duration

13 Weeks

  Language

English

About This Course

This is a second-semester course in the MBA in Cybersecurity and Cyber Insurance Business Management
Secure Autonomous Systems explores the security challenges of autonomous vehicles and cyber-physical systems, where software decisions have real-world consequences. The course examines system architectures, sensing and communication technologies, real-world attacks, and defensive strategies, equipping students to analyse vulnerabilities and design security-aware autonomous systems.
Write your awesome label here.

What You Will Learn


Foundations of Autonomous System Security

  • Security challenges in modern autonomous and connected vehicle systems
  • Vulnerabilities in sensing, perception, and control pipelines
  • The relationship between safety, reliability, and cybersecurity in autonomous systems


Sensor, Communication & Infrastructure Security

  • Security considerations for camera and LiDAR perception pipelines
  • Threats affecting sensor fusion and collaborative perception environments
  • Vulnerabilities in in-vehicle networks and autonomous system communication infrastructures


Defensive Architectures for Autonomous Systems

  • Reactive and preventative security mechanisms for autonomous vehicles

  • Security risks in wired and wireless vehicle communication systems

  • Emerging research challenges and future security architectures for autonomous mobility

Skills You Will Gain

Autonomous System Threat Analysis

  • Analysing attacks against camera- and LiDAR-based perception systems
  • Evaluating safety implications of cyber-physical attacks on autonomous vehicles
  • Identifying vulnerabilities across sensing, processing, and control layers

Secure Architecture & Vulnerability Mitigation

  • Decomposing autonomous system architectures to assess security posture
  • Modelling threats to sensor pipelines using frameworks such as EVITA
  • Investigating vulnerabilities in in-vehicle networks such as CAN, LIN, and Automotive Ethernet

Strategic Security Leadership in Autonomous Mobility

  • Coordinating multidisciplinary teams to design secure autonomous systems
  • Monitoring emerging research trends and regulatory developments
  • Promoting security-by-design practices within automotive development lifecycles
Empty space, drag to resize

Your 13-Week Journey

Here’s how your learning unfolds

Week 1 – Fundamentals on Autonomous Systems

This lecture welcomes the students, outlines the courses organization and deadlines, and introduces the students to fundamental systematization of autonomous systems.

Week 2 – Threat Modelling

As basis for further discussion, this lecture introduces relevant threat modeling techniques for autonomous systems.

Week 3 –Camera Sensor Processing Pipeline

In this first sensor-specific lecture, typical camera sensor processing pipelines are introduced and the corresponding security implications highlighted.

Week 4 – Lidar sensor processing pipeline

In this second sensor-specific lecture, typical Lidar sensor processing pipelines are introduced and the corresponding security implications highlighted.

Week 5 – Sensor Fusion

This lecture introduces the students to current approaches and security considerations of autonomous systems relying on single- and multi-modality sensor fusion algorithms.

Week 6 – Collaborative Perception

In this lecture, students are introduced to collaborative perception algorithms and their inherent security implications when utilized in autonomous systems.

Week 7 – Intelligent Assets supporting autonomous systems in Smart Cities

This lecture analyzes and discusses the typically employed infrastructure enabling autonomous system operation in smart cities, with special focus on the underlying security considerations.

Week 8 – Wired communication infrastructure security

This lecture introduces the students to classical in-vehicle wired communication infrastructure and analyzes the typical security state of modern vehicles.

Week 9 – Wireless communication infrastructure security 

This lecture introduces students to often utilized wireless communication methods in the supporting infrastructure of autonomous vehicles and analyzes the resulting security considerations.

Week 10 – Reactive and Preventative Security

In the scope of this lecture, students are introduced to defensive methodologies protecting autonomous systems and their systematization.

Week 11 – Real-World defensive countermeasures for autonomous vehicles 

This lecture continues the defensive discussion by highlighting real-world defensive methodologies, as well as previously observed misbehavior of autonomous systems prevented by such defensive solutions.

Week 12 – Real-Time System Security

This lecture introduces the students to typical real-time system constraints and their security implications for autonomous systems.

Week 13 – Recap and Research Outlook 

In this final lecture, students recap the acquired knowledge and skills with all lecturers in a Q&A session.


Week 1 — Systems in Transition

See the world in systems.
Learn to rethink linear vs circular economies and explore planetary boundaries.

Week 2 — The Digital–Circular Nexus

Discover how tech enables sustainability.
Explore how AI, IoT, and data power circular innovation.

Week 3 — Policy as Infrastructure

Understand Europe’s circular blueprint.
Dive into the EU Green Deal, CEAP, and Digital Europe frameworks.

Week 4 — Designing for Re-entry

Design for durability, reuse, and remanufacturing.
Learn how digital twins and simulation tools extend product lifecycles.

Week 5 — Tracking Resources Through Data

Follow materials in motion.
Understand how IoT and data infrastructures create transparency in supply chains.

Week 6 — Blockchain for Accountability

Trust through transparency.
Explore blockchain’s potential for tracking, verification, and ethical assurance.

Week 7 — Learning Loops with AI

Let data drive regeneration.
See how AI and machine learning enable adaptive circular decision-making.

Week 8 — Cognitive Factories

Meet the new industrial symbiosis.
Examine how robotics and smart manufacturing create circular production systems.

Week 9 — Reverse Intelligence

Close the loop through recovery.
Explore reverse logistics, digital disassembly, and resource recovery networks.

Week 10 — Measuring Circularity

Turn data into progress.
Use metrics, KPIs, and dashboards to track circular performance.

Week 11 — Financing the Regenerative Future

Empower innovation.
Discover how deep-tech, investment, and valuation models support circular ventures.

Week 12 — Ethics and Mindsets

Lead with responsibility.
Reflect on ethics, human–machine collaboration, and the competences for circular leadership.

Week 13 — 2040 and Beyond

Imagine the future you want to build.
Learn to rethink linear vs circular economies and explore planetary boundaries.

Learn With Us

This course is co-created with academic and industry partners supporting circular innovation.
Giorgos Demetriou
Associate Dean of Research and Innovation
Giorgos Demetriou
Associate Dean of Research and Innovation
Giorgos Demetriou
Associate Dean of Research and Innovation
Giorgos Demetriou
Associate Dean of Research and Innovation
Giorgos Demetriou
Associate Dean of Research and Innovation

Co-Created for Change

Continue Your Journey