CORDIS fornisce collegamenti ai risultati finali pubblici e alle pubblicazioni dei progetti ORIZZONTE.
I link ai risultati e alle pubblicazioni dei progetti del 7° PQ, così come i link ad alcuni tipi di risultati specifici come dataset e software, sono recuperati dinamicamente da .OpenAIRE .
Risultati finali
This report explains how abstract high-level security requirements are handled in the trusted life cycle and how they are broken down into more concrete procedural requirements for the life cycle phases, and into low-level security requirements for the components.
Models for formal verification (si apre in una nuova finestra)This deliverable is a report describing how to verify the security of software running on the RISC-V processor from D3.1 and describing models for formal verification of open-source cryptographic hardware accelerators against physical attacks as used in D3.2. There will be an interim version provided for the review in M18.
Report about essential and beyond-essential s&p guarantees for intra-device communication in restricted environments (si apre in una nuova finestra)This report is the output of T5.3 and T5.4 and shows how to design and implement protocols to provide essential and beyond-essential security and privacy guarantees for intra-device communication taking advantage of open-source hardware. There will be an interim version provided for the review in M18.
Report about trusted life cycle design methodology for OSH (si apre in una nuova finestra)The deliverable provides the description of the methodology for composing open-source components. We envision a trusted life cycle of the device composed of several phases. The report will formalize these phases and identify the interaction and feedback of the design and production process up to the device decommissioning. The report provides the guidelines for the secure composition of building blocks. The guidelines help to achieve a secure result leveraging the security features of each component.
Report on security audit and testing (si apre in una nuova finestra)This report will describe the design of hardware/firmware hybrid security testing mechanism and the advanced security testing of mixed source firmware programs. There will be an interim version provided for the review in M18.
Project quality plan (si apre in una nuova finestra)The project quality plan (the project handbook) constitutes a set of project templates and explains the project management, review and internal quality control process, as well as other organizational topics such as meeting organization.
Report about essential and beyond-essential s&p guarantees for inter-device communication in restricted environments (si apre in una nuova finestra)This report is the output of T5.1 and T5.2 and describes how to design and implement protocols to provide essential and beyond-essential security and privacy guarantees for device to device communication taking advantage of open-source hardware. There will be an interim version provided for the review in M18.
This deliverable will consist into a research prototype of the hardware firmware hybrid security testing mechanism that is compatible with mixed open-source/closed-source firmware programs.
WP3, WP4, WP5 Demonstrator platform (si apre in una nuova finestra)Final project delivery, report and user guide how to reuse the delivery artefacts, reproduce the results for executable examples, final evaluation of project and suggestions for future work will be part of the report. The deliverable will be accompanied by a confidential appendix including sensitive information.
RISC-V processor with countermeasures against microarchitectural attacks (si apre in una nuova finestra)This deliverable is an open-source implementation of a RISC-V processor with countermeasures against microarchitectural attacks.
Hardware implementations of cryptographic building blocks with formally verifiable protection against physical attacks (si apre in una nuova finestra)This deliverable are open-source hardware implementations of cryptographic building blocks with formally verifiable protection against physical attacks.
Intra-device and inter-device secure communication prototypes (si apre in una nuova finestra)This deliverable provides prototypes (i.e., implementations) of secure intra-device and inter-device communication protocols. The prototypes will be used in WP6’s demonstrators.
Pubblicazioni
Pubblicato in:
2024, ISBN 978-3-031-54409-5
Editore:
Springer, Cham
DOI:
10.1007/978-3-031-54409-5_2
Autori:
Soumaya Boussaha, Victor Fresno-Gomez, Thomas Barber, Daniele Antonioli
Pubblicato in:
2025, ISBN 978-1-939133-49-6
Editore:
USENIX
Autori:
Hans Winderix, Marton Bognar, Job Noorman, Lesly-Ann Daniel, Frank Piessens
Pubblicato in:
2024 IEEE Symposium on Security and Privacy (SP), 2024
Editore:
IEEE
DOI:
10.1109/SP54263.2024.00047
Pubblicato in:
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
DOI:
10.1145/3576915.3623066
Autori:
Bognar, Marton; Winderix, Hans; Van Bulck, Jo; Piessens, Frank
Pubblicato in:
2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P), 2023
DOI:
10.1109/eurosp57164.2023.00045
Pubblicato in:
IEEE Euro S&P, 2025
Editore:
IEEE Euro S&P
DOI:
10.48550/ARXIV.2412.02349
Autori:
Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti and Massimo Merro
Pubblicato in:
2025
DOI:
10.48550/ARXIV.2505.22638
Autori:
V. Zubkov, T. Sacchetti, D. Antonioli, M. Strohmeier
Pubblicato in:
2025, ISBN 978-1-939133-50-2
Editore:
19th USENIX WOOT Conference on Offensive Technologies
Autori:
Alberto Battistello, Guido Bertoni, Vittorio Zaccaria, Joan Bushi
Pubblicato in:
DATE 2025, 2025
Editore:
DATE 2025
Autori:
Carta, Daniele Antonio Emanuele; Zaccaria, Vittorio; Molteni, Maria Chiara; Quagliarella, Gabriele
Pubblicato in:
Constructive Side-Channel Analysis and Secure Design, 2023, ISBN 978-3-031-29497-6
Editore:
Springer, Cham
DOI:
10.5281/zenodo.7820870
Autori:
Pcy Sluys, Benedikt Gierlichs
Pubblicato in:
CASCADE 2025, 2025
Editore:
CASCADE
Pubblicato in:
2025
Editore:
Zenodo
DOI:
10.5281/ZENODO.17206208
Autori:
Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens
Pubblicato in:
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2025
Editore:
ACM
DOI:
10.1145/3658644.3690319
Pubblicato in:
Usenix Security 2023, 2023
Editore:
Usenix
DOI:
10.48550/ARXIV.2302.12108
Pubblicato in:
2025
DOI:
10.5281/ZENODO.16674672
Autori:
S V Dilip Kumar; Josep Balasch; Benedikt Gierlichs; Ingrid Verbauwhede
Pubblicato in:
2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2023, ISSN 1558-1101
Editore:
IEEE Explore
DOI:
10.23919/date56975.2023.10136920
Autori:
Jesse De Meulemeester, Quinten Norga, Frank Piessens, Ingrid Verbauwhede, Marton Bognar
Pubblicato in:
2025
Editore:
ACM
Pubblicato in:
2025
Editore:
Usenix
DOI:
10.5555/3698900.3699021
Autori:
Volodymyr Bezsmertnyi, Jean-Michel Cioranesco, Thomas Eisenbarth
Pubblicato in:
Lecture Notes in Computer Science, Computer Security – ESORICS 2024, 2024
Editore:
Springer Nature Switzerland
DOI:
10.1007/978-3-031-70903-6_5
Autori:
Gousselot, Théophile; Thomas, Olivier; Dutertre, Jean-Max; Potin, Olivier; Rigaud, Jean-Baptiste
Pubblicato in:
2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023
DOI:
10.1109/host55118.2023.10133316
Pubblicato in:
2025
DOI:
10.5281/ZENODO.16674390
Pubblicato in:
IEEE European Symposium on Security and Privacy, 2025
Editore:
IEEE
DOI:
10.5281/ZENODO.15780183
Autori:
Marco Casagrande; Riccardo Cestaro; Eleonora Losiouk; Mauro Conti; Daniele Antonioli
Pubblicato in:
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023
DOI:
10.5281/zenodo.8004604
Autori:
Tommaso Sacchetti, Marton Bognar, Jesse De Meulemeester, Benedikt Gierlichs, Frank Piessens, Volodymyr Bezsmertnyi, Maria Chiara Molteni, Stefano Cristalli, Arianna Gringiani, Olivier Thomas, Daniele Antonioli
Pubblicato in:
ACM Transactions on Embedded Computing Systems, 2024, ISSN 1539-9087
Editore:
Association for Computing Machinery (ACM)
DOI:
10.1145/3698396
Autori:
P. Saraza-Canflanca; F. Fodor; J. Diaz-Fortuny; B. Gierlichs; R. Degraeve; B. Kaczer; I. Verbauwhede; E. Bury
Pubblicato in:
IEEE Electron Device Letters, 2024, ISSN 0741-3106
Editore:
Institute of Electrical and Electronics Engineers
DOI:
10.1109/led.2024.3369860
Autori:
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2024, 2024, ISSN 2569-2925
Editore:
Universitatsbibliothek der Ruhr-Universitat Bochum
DOI:
10.46586/tches.v2024.i3.249-272
Autori:
Dilip Kumar S. V., Siemen Dhooghe, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Pubblicato in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Numero 2025, 2025, ISSN 2569-2925
Editore:
Universitatsbibliothek der Ruhr-Universitat Bochum
DOI:
10.46586/TCHES.V2025.I2.235-267
Autori:
S. V. Dilip Kumar, Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwhede
Pubblicato in:
IEEE Transactions on Information Forensics and Security, Numero 20, 2025, ISSN 1556-6013
Editore:
Institute of Electrical and Electronics Engineers (IEEE)
DOI:
10.1109/TIFS.2025.3541442
Diritti di proprietà intellettuale
Numero candidatura/pubblicazione:
24
220603
Data:
2024-12-17
Candidato/i:
NXP SEMICONDUCTORS GERMANY GMBH
È in corso la ricerca di dati su OpenAIRE...
Si è verificato un errore durante la ricerca dei dati su OpenAIRE
Nessun risultato disponibile