CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
This report explains how abstract high-level security requirements are handled in the trusted life cycle and how they are broken down into more concrete procedural requirements for the life cycle phases, and into low-level security requirements for the components.
Report about trusted life cycle design methodology for OSH (opens in new window)The deliverable provides the description of the methodology for composing open-source components. We envision a trusted life cycle of the device composed of several phases. The report will formalize these phases and identify the interaction and feedback of the design and production process up to the device decommissioning. The report provides the guidelines for the secure composition of building blocks. The guidelines help to achieve a secure result leveraging the security features of each component.
Project quality plan (opens in new window)The project quality plan (the project handbook) constitutes a set of project templates and explains the project management, review and internal quality control process, as well as other organizational topics such as meeting organization.
Publications
Published in:
2024, ISBN 978-3-031-54409-5
Publisher:
Springer, Cham
DOI:
10.1007/978-3-031-54409-5_2
Author(s):
Soumaya Boussaha, Victor Fresno-Gomez, Thomas Barber, Daniele Antonioli
Published in:
2025, ISBN 978-1-939133-49-6
Publisher:
USENIX
Author(s):
Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens
Published in:
2024 IEEE Symposium on Security and Privacy (SP), 2024
Publisher:
IEEE
DOI:
10.1109/SP54263.2024.00047
Published in:
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
DOI:
10.1145/3576915.3623066
Author(s):
Bognar, Marton; Winderix, Hans; Van Bulck, Jo; Piessens, Frank
Published in:
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
DOI:
10.1109/eurosp57164.2023.00045
Published in:
IEEE Euro S&P, 2025
Publisher:
IEEE Euro S&P
DOI:
10.48550/ARXIV.2412.02349
Author(s):
Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti and Massimo Merro
Published in:
2025
DOI:
10.48550/ARXIV.2505.22638
Author(s):
V. Zubkov, T. Sacchetti, D. Antonioli, M. Strohmeier
Published in:
2025, ISBN 978-1-939133-50-2
Publisher:
19th USENIX WOOT Conference on Offensive Technologies
Author(s):
Alberto Battistello, Guido Bertoni, Vittorio Zaccaria, Joan Bushi
Published in:
DATE 2025, 2025
Publisher:
DATE 2025
Author(s):
Carta, Daniele Antonio Emanuele; Zaccaria, Vittorio; Molteni, Maria Chiara; Quagliarella, Gabriele
Published in:
Constructive Side-Channel Analysis and Secure Design, 2023, ISBN 978-3-031-29497-6
Publisher:
Springer, Cham
DOI:
10.5281/zenodo.7820870
Author(s):
Pcy Sluys, Benedikt Gierlichs
Published in:
CASCADE 2025, 2025
Publisher:
CASCADE
Published in:
2025
Publisher:
Zenodo
DOI:
10.5281/ZENODO.17206208
Author(s):
Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens
Published in:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2025
Publisher:
ACM
DOI:
10.1145/3658644.3690319
Published in:
Usenix Security 2023, 2023
Publisher:
Usenix
DOI:
10.48550/ARXIV.2302.12108
Published in:
2025
DOI:
10.5281/ZENODO.16674672
Author(s):
S V Dilip Kumar; Josep Balasch; Benedikt Gierlichs; Ingrid Verbauwhede
Published in:
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023, ISSN 1558-1101
Publisher:
IEEE Explore
DOI:
10.23919/date56975.2023.10136920
Author(s):
Jesse De Meulemeester, Quinten Norga, Frank Piessens, Ingrid Verbauwhede, Marton Bognar
Published in:
2025
Publisher:
ACM
Published in:
2025
Publisher:
Usenix
DOI:
10.5555/3698900.3699021
Author(s):
Volodymyr Bezsmertnyi, Jean-Michel Cioranesco, Thomas Eisenbarth
Published in:
Lecture Notes in Computer Science, Computer Security – ESORICS 2024, 2024
Publisher:
Springer Nature Switzerland
DOI:
10.1007/978-3-031-70903-6_5
Author(s):
Gousselot, Théophile; Thomas, Olivier; Dutertre, Jean-Max; Potin, Olivier; Rigaud, Jean-Baptiste
Published in:
2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023
DOI:
10.1109/host55118.2023.10133316
Published in:
2025
DOI:
10.5281/ZENODO.16674390
Published in:
IEEE European Symposium on Security and Privacy, 2025
Publisher:
IEEE
DOI:
10.5281/ZENODO.15780183
Author(s):
Marco Casagrande; Riccardo Cestaro; Eleonora Losiouk; Mauro Conti; Daniele Antonioli
Published in:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
DOI:
10.5281/zenodo.8004604
Author(s):
Tommaso Sacchetti, Marton Bognar, Jesse De Meulemeester, Benedikt Gierlichs, Frank Piessens, Volodymyr Bezsmertnyi, Maria Chiara Molteni, Stefano Cristalli, Arianna Gringiani, Olivier Thomas, Daniele Antonioli
Published in:
ACM Transactions on Embedded Computing Systems, 2024, ISSN 1539-9087
Publisher:
Association for Computing Machinery (ACM)
DOI:
10.1145/3698396
Author(s):
P. Saraza-Canflanca; F. Fodor; J. Diaz-Fortuny; B. Gierlichs; R. Degraeve; B. Kaczer; I. Verbauwhede; E. Bury
Published in:
IEEE Electron Device Letters, 2024, ISSN 0741-3106
Publisher:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/led.2024.3369860
Author(s):
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2024, 2024, ISSN 2569-2925
Publisher:
Universitatsbibliothek der Ruhr-Universitat Bochum
DOI:
10.46586/tches.v2024.i3.249-272
Author(s):
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 2025, 2025, ISSN 2569-2925
Publisher:
Universitatsbibliothek der Ruhr-Universitat Bochum
DOI:
10.46586/TCHES.V2025.I2.235-267
Author(s):
S. V. Dilip Kumar, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Published in:
IEEE Transactions on Information Forensics and Security, Issue 20, 2025, ISSN 1556-6013
Publisher:
Institute of Electrical and Electronics Engineers (IEEE)
DOI:
10.1109/TIFS.2025.3541442
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available