Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Cross-platform Open Security Stack for Connected Devices

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Use Cases Definition Final Version (opens in new window)

Extended description of use cases and scenarios including technical diagrams and specification of all scenarios’ components, security services, settings (T1.1).

Validation Criteria Initial Version (opens in new window)

Presents the identified validation criteria for the CROSSCON IoT stack (T1.3).

CROSSCON Open Security Stack Documentation - Draft (opens in new window)

A report on first research and development results of the CROSSCON stack components across tasks T3.1 to T3.5.

Requirements Elicitation Final Technical Specification (opens in new window)

Second and final specification of CROSSCON IoT stack requirement elicitation based on technical and end users’ feedback (T1.2).

Use Cases Definition Initial Version (opens in new window)

First version of use cases and scenarios definition including architecture, infrastructure, security services, and stakeholders’ relation (T1.1).

Requirements Elicitation Initial Technical Specification (opens in new window)

First version of requirement elicitation for the CROSSCON IoT security stack (T1.2).

Dissemination and Communication Plan (opens in new window)

A detailed plan for dissemination and communication of project results including stakeholders’ engagement plan and online channels development (T6.1).

Project Website (opens in new window)

A report on the Website created, its layout, structure, and content management (T6.1).

CROSSCON Extensions to Domain Specific Hardware Architectures Documentation - Draft (opens in new window)

A report of the first research and development results of the CROSSCON hardware/software extension primitives, algorithms and APIs for domain specific hardware architectures (T4.1, T4.2, T4.3).

Dissemination, Communication and Community Building First Report (opens in new window)

A report on the dissemination and communication, stakeholders’ engagement, advisory board, and training activities for the first half of the project (T6.1, T6.3, T6.4).

Data Management Plan (opens in new window)

A report describing the project’s data management plan, ethics and gender policy (T7.4).

CROSSCON Open Specification - Draft (opens in new window)

A document with code and diagrams describing the initial version of the developed Open Specification and HW/SW co-design (T2.1,T2.3).

CROSSCON Open Security Stack - Initial Version (opens in new window)

Software, technical diagrams and algorithms of experimental proof of concept of the CROSSCON stack components developed across tasks T3.1 to T3.5. TRL 3.

CROSSCON Extension Primitives to Domain Specific Hardware Architectures - Initial Version (opens in new window)

Development board FPGA implementation of hardware/software extension primitives complemented with technical diagrams of the initial versions, experimental proof of concept, of the CROSSCON extension primitives and mechanisms developed across tasks T4.1, T4.2, and T4.3. TRL 3.

CROSSCON Formal Framework - Draft (opens in new window)

A document with code, diagrams, repositories describing the initial formal framework and the developed/adapted tools (T2.2).

Publications

Securing Embedded and IoT Systems with SPMP-based Virtualization

Author(s): Sandro Pinto, José Martins, Manuel Rodriguez, Tilen Nedanovski, Ziga Putrle, Matjaz Breskvar
Published in: RISC-V Summit Europe 2024, 2024
Publisher: RISC-V Summit Europe 2024

WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors

Author(s): Pallavi Borkar, Chen Chen, Mohamadreza Rostami, Nikhilesh Singh, Rahul Kande, Ahmad-Reza Sadeghi, Chester Rebeiro, Jeyavijayan Rajendran
Published in: USENIX, 2024
Publisher: USENIX

μIPS: Software-Based Intrusion Prevention for Bare-Metal Embedded Systems (opens in new window)

Author(s): Luca Degani , Majid Salehi , Fabio Martinelli, Bruno Crispo
Published in: ESORICS 2023, 2023
Publisher: Springer-Verlag
DOI: 10.1007/978-3-031-51482-1_16

BUSted!!! Microarchitectural Side-Channel Attacks on the MCU Bus Interconnect (opens in new window)

Author(s): Cristiano Rodrigues, Daniel Oliveira, Sandro Pinto
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISSN 2375-1207
Publisher: IEEE Computer Society
DOI: 10.1109/SP54263.2024.00062

CROSSCON: Interoperable IoT Security Stack - The RISC-V Opportunity

Author(s): Sandro Pinto, Matjaz Breskvar, Tiago Gomes, Hristo Koshutanski, Aljosa Pasic, Piotr Król, Emna Amri, David Purón, Zoltan Hornak, Marco Roveri, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Bruno Crispo
Published in: RISC-V Europe Summit 2023, 2023
Publisher: RISC-V Europe Summit

Lost and Found in Speculation: Hybrid Speculative Vulnerability Detection

Author(s): Mohamadreza Rostami,Shaza Zeitouni,Rahul Kande, Chen Chen, Pouya Mahmoody, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
Published in: Design Automation Conference, 2024, 2024
Publisher: Design Automation Conference

Misbehavior Detection and Mitigation on 5G Core Services in Kubernetes

Author(s): H. Koshutanski, S. Kahvazadeh, J. Villalobos, A. Garcia Bedoya, and J. Mangues-Bafalluy
Published in: NDSS, 2026
Publisher: n.a.

One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices (opens in new window)

Author(s): Marco Chilese,Richard Mitev,Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISSN 2375-1207
Publisher: IEEE Computer Society
DOI: 10.1109/SP54263.2024.00182

AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions (opens in new window)

Author(s): Maqsood Ahmad, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello
Published in: IEEE Symposium on Computers and Communications (ISCC), 2023, ISSN 2642-7389
Publisher: IEEE
DOI: 10.1109/ISCC58397.2023.10217861

The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse (opens in new window)

Author(s): Matteo Golinelli; Francesco Bonomi; Bruno Crispo
Published in: Computer Security. ESORICS 2023 International Workshops, 2023, ISBN 978-3-031-54129-2
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-54129-2_27

Beyond random inputs: A novel ML-based hardware fuzzing

Author(s): Mohamadreza Rostami, Marco Chilese, Shaza Zeitouni, Rahul Kande, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
Published in: IEEE Design, Automation and Test in Europe Conference (DATE), 2024
Publisher: IEEE Design, Automation and Test in Europe

Open-source SPMP-based CVA6 Virtualization

Author(s): Manuel Rodríguez, José Martins, Bruno Sá and Sandro Pinto
Published in: RISC-V Summit EU, 2025
Publisher: N.A.

CVA6 MMU-less Virtualization – From Hardware to Software, and Vice Versa!

Author(s): Sandro Pinto
Published in: Embedded World, 2025
Publisher: N.A.

A Novel Trusted Execution Environment for Next-Generation RISC-V MCUs

Author(s): Sandro Pinto, Matjaz Breskvar
Published in: Embedded World, 2024
Publisher: n.a.

LightShed: Defeating Perturbation-based Image Copyright Protections

Author(s): Hanna Foerster, Sasha Behrouzi, Phillip Rieger, Murtuza Jadliwala, Ahmad-Reza Sadeghi
Published in: Usenix Security Symposium, 2025
Publisher: N.A.

Cyber-physical metropolitan area digital substations test bench for evaluating intrusion detection systems (opens in new window)

Author(s): Santiago Sanchez-Acevedo, Tesfaye Amare Zerihun, Hristo Koshutanski, Alejandro Garcia-Bedoya
Published in: IEEE GPECOM 2024, 2024
Publisher: IEEE GPECOM 2024
DOI: 10.36227/techrxiv.171778519.94792591/v1

An open-source Trusted Execution Environment for Resource-Constrained RISC-V MCUs

Author(s): Luís Cunha∗ , Daniel Oliveira, João Sousa, Tiago Gomes, Sandro Pinto
Published in: RISC-V Summit EU, 2025
Publisher: N.A.

Efficient and Safe I/O Operations for Intermittent Systems (opens in new window)

Author(s): Eren Yıldız, Saad Ahmed, Bashima Islam, Josiah Hester, Kasım Sinan Yıldırım
Published in: EuroSys: European Conference on Computer Systems, 2023, ISBN 9781450394871
Publisher: Association for Computing Machinery
DOI: 10.1145/3552326.3587435

GenHuzz: An Efficient Generative Hardware Fuzzer

Author(s): Lichao Wu, Mohamadreza Rostami, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
Published in: Usenix Security Symposium, 2025
Publisher: N.A

AuthentiSafe: Lightweight and Future-Proof Device-to-Device Authentication for IoT

Author(s): T. Krauß, L. Petzi, G. Tsudik, and A. Dmitrienko.
Published in: ACM ASIA Conference on Computer and Communications Security, 2025
Publisher: N.A.

RLFuzz: Accelerating Hardware Fuzzing with Deep Reinforcement Learning (opens in new window)

Author(s): Raphael Götz, Christoph Sendner, Nico Ruck, Mohamadreza Rostami, Alexandra Dmitrienko, Ahmad-Reza Sadeghi
Published in: 2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2025
Publisher: IEEE
DOI: 10.1109/HOST64725.2025.11050051

Mind the CORS (opens in new window)

Author(s): Golinelli, Matteo; Arshad, Elham; Kashchuk, Dmytro; Crispo, Bruno
Published in: IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA), 2023
Publisher: N.A.
DOI: 10.1109/TPS-ISA58951.2023.00035

Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi

Author(s): Kavita Kumari, Sasha Behrouzi, Alessandro Pegoraro, Ahmad-Reza Sadeghi
Published in: NDSS, 2026
Publisher: n.a.

PUF-based Authentication in IoT against Strong Physical Adversary using Zero-Knowledge Proofs

Author(s): Lukas Petzi, Alexandra Dmitrienko, Ivan Visconti
Published in: SafeThings 2024, 2024
Publisher: SafeThings

Device Behavioral Profiling for Autonomous Protection Using Deep Neural Networks (opens in new window)

Author(s): Sandeep Gupta, Bruno Crispo
Published in: 2023 IEEE Symposium on Computers and Communications (ISCC), 2023
Publisher: IEEE Computer Society
DOI: 10.1109/ISCC58397.2023.10218275

Shedding Light on Static Partitioning Hypervisors for Arm-based Mixed-Criticality Systems (opens in new window)

Author(s): Martins, José; Pinto, Sandro
Published in: 2023 IEEE 29th Real-Time and Embedded Technology and Applications Symposium (RTAS), 2023, ISSN 2642-7346
Publisher: IEEE Computer Society
DOI: 10.1109/rtas58335.2023.00011

Towards a formal verification of the Bao Hypervisor

Author(s): Alberto Tacchella, Jurij Mihelič, David Cerdeira, José Martins, Sandro Pinto, Bruno Crispo, Marco Roveri
Published in: FPS, 2025
Publisher: n.a.

GoldenFuzz: Generative Golden Reference Hardware Fuzzing

Author(s): Lichao Wu, Mohamadreza Rostami, Huimin Li, Nikhilesh Singh, Ahmad-Reza Sadeghi
Published in: NDSS, 2026
Publisher: n.a.

Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer

Author(s): Johannes Lenzen, Mohamadreza Rostami, Lichao Wu, Ahmad-Reza Sadeghi
Published in: NDSS, 2026
Publisher: n.a.

HFL: Hardware Fuzzing Loop with Reinforcement Learning (opens in new window)

Author(s): Lichao Wu, Mohamadreza Rostami, Huimin Li, Ahmad-Reza Sadeghi
Published in: 2025 Design, Automation & Test in Europe Conference (DATE), 2025
Publisher: IEEE
DOI: 10.23919/DATE64628.2025.10993080

VoiceRadar: Voice Deepfake Detection using Micro-Frequency and Compositional Analysis

Author(s): Kavita Kumari , Maryam Abbasihafshejani , Alessandro Pegoraro, Phillip Rieger, Kamyar Arshi, Murtuza Jadliwala and Ahmad-Reza Sadeghi
Published in: Network and Distributed System Security (NDSS), 2025
Publisher: N.A.

Bridging the Interoperability Gaps Among Trusted Architectures in MCUs (opens in new window)

Author(s): Sandro Pinto, Luís Cunha, Daniel Oliveira, Michele Grisafi, Emanuele Beozzo, Bruno Crispo
Published in: Lecture Notes in Computer Science, Information and Communications Security, 2025
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-95-3543-9_15

SafeSplit: A Novel Defense Against Client-Side Backdoor Attacks in Split Learning

Author(s): Phillip Rieger, Alessandro Pegoraro, Kavita Kumari, Tigist Abera, Jonathan Knauer Ahmad-Reza Sadeghi
Published in: Network and Distributed System Security (NDSS), 2025
Publisher: N.A.

Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning

Author(s): Torsten Krauß, Jan König, Alexandra Dmitrienko, Christian Kanzow
Published in: NDSS, 2024
Publisher: N.A.

Valkyrie: A Response Framework to Augment Runtime Detection of Time-Progressive Attacks (opens in new window)

Author(s): Nikhilesh Singh, Chester Rebeiro
Published in: 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2025
Publisher: IEEE
DOI: 10.1109/DSN64029.2025.00053

CROSSCON: Interoperable IoT Security Stack for Embedded Connected Devices

Author(s): Sandro Pinto, Matjaz Breskvar, Tiago Gomes, Hristo Koshutanski, Aljosa Pasic, Piotr Król, Emna Amri, David Purón, Zoltan Hornak, Marco Roveri, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Bruno Crispo
Published in: Embbeded World 2024, 2024
Publisher: Embbeded World Exhibition&Conference

Certified Secure Updates for IoT Devices (opens in new window)

Author(s): Tacchella, A., Beozzo, E., Crispo, B., Roveri, M.
Published in: ICT Systems Security and Privacy Protection, 2025
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-92882-6_11

Virtualization today, Virtualization tomorrow

Author(s): Sandro Pinto
Published in: Embedded World, 2023
Publisher: N.A.

FreqFed: A Frequency Analysis-Based Approach for Mitigating Poisoning Attacks in Federated Learning (opens in new window)

Author(s): Fereidooni, Hossein; Pegoraro, Alessandro; Rieger, Phillip; Dmitrienko, Alexandra; Sadeghi, Ahmad-Reza
Published in: Network and Distributed System Security (NDSS) Symposium, 2024
Publisher: Network and Distributed System Security (NDSS) Symposium
DOI: 10.48550/arxiv.2312.04432

Revisiting Formal Verification in VeriSolid: An Analysis and Enhancements

Author(s): Chahoki, A. Z.; Roveri, M.; Amyot, D.; Mylopoulos, J.
Published in: CEUR-WS, 2023
Publisher: N.A.

Software and Systems Modeling (opens in new window)

Author(s): Aidin Rasti; Amal Ahmed Anda; Sofana Alfuhaid; Alireza Parvizimosaed; Daniel Amyot; Marco Roveri; Luigi Logrippo; John Mylopoulos
Published in: Software and Systems Modeling, 2024, ISSN 1619-1366
Publisher: Springer-Verlag
DOI: 10.5281/ZENODO.7897782

FLAShadow: A Flash-based Shadow Stack for Low-end Embedded Systems (opens in new window)

Author(s): Michele Grisafi, Mahmoud Ammar, Marco Roveri, Bruno Crispo
Published in: ACM Transactions on Internet of Things, Issue 5, 2025, ISSN 2691-1914
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3670413

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing (opens in new window)

Author(s): Rostami, Mohamadreza; Chilese, Marco; Zeitouni, Shaza; Kande, Rahul; Rajendran, Jeyavijayan; Sadeghi, Ahmad-Reza
Published in: DATE, 2024, ISSN 0000-0000
Publisher: IEEE
DOI: 10.23919/DATE58400.2024.10546625

Phantom: Untargeted Poisoning Attacks on Semi-Supervised Learning (Full Version) (opens in new window)

Author(s): Knauer, Jonathan; Rieger, Phillip; Fereidooni, Hossein; Sadeghi, Ahmad-Reza
Published in: ACM SIGSAC, 2024, ISSN 0000-0000
Publisher: Association for Computing Machinery
DOI: 10.1145/3658644.3690369

Marionette: Manipulate Your Touchscreen via A Charging Cable (opens in new window)

Author(s): Yan Jiang, Xiaoyu Ji,Kai Wang,Chen Yan, Richard Mitev, Ahmad-Reza Sadeghi, Wenyuan Xu
Published in: IEEE Transactions on Dependable and Secure Computing, 2023, ISSN 1941-0018
Publisher: IEEE Computer Society
DOI: 10.1109/TDSC.2023.3326181

AnyTEE: An Open and Interoperable Software Defined TEE Framework (opens in new window)

Author(s): David Cerdeira, José Martins, Nuno Santos, Sandro Pinto
Published in: IEEE Access, Issue 13, 2025, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/ACCESS.2025.3581487

CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware (opens in new window)

Author(s): Atefeh Zareh Chahoki; Hamid Reza Shahriari; Marco Roveri
Published in: IEEE Transactions on Information Forensics and Security, 2024, ISSN 1556-6021
Publisher: IEEE Transactions on Information Forensics and Security
DOI: 10.21227/kwh4-0g27

Automatic Adversarial Adaption for Stealthy Poisoning Attacks in Federated Learning (opens in new window)

Author(s): Torsten Krauß; Jan König; Alexandra Dmitrienko; Christian Kanzow
Published in: Network and Distributed System Security Symposium, 2024, ISSN 0000-0000
Publisher: N.A.
DOI: 10.14722/NDSS.2024.241366

Fuzzerfly Effect: Hardware Fuzzing for Memory Safety (opens in new window)

Author(s): Mohamadreza Rostami, Chen Chen, Rahul Kande, Huimin Li, Jeyavijayan Rajendran, Ahmad-Reza Sadeghi
Published in: IEEE Security & Privacy, Issue 22, 2024, ISSN 1540-7993
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
DOI: 10.1109/MSEC.2024.3365070

BiRtIO: VirtIO for Real-Time Network Interface Sharing on the Bao Hypervisor (opens in new window)

Author(s): João Peixoto; José Martins; David Cerdeira; Sandro Pinto
Published in: IEEE Access, 2024, ISSN 0000-0000
Publisher: N.A.
DOI: 10.1109/ACCESS.2024.3512777

Firmware Secure Updates meet Formal Verification (opens in new window)

Author(s): Alberto Tacchella, Emanuele Beozzo, Bruno Crispo, Marco Roveri
Published in: ACM Transactions on Cyber-Physical Systems, 2025, ISSN 2378-962X
Publisher: Association for Computing Machinery (ACM)
DOI: 10.1145/3754455

HSP-V: Hypervisor-less Static Partitioning for RISC-V COTS Platforms (opens in new window)

Author(s): João Sousa; José Martins; Tiago Gomes; Sandro Pinto
Published in: IEEE Access, 2024, ISSN 2169-3536
Publisher: IEEE Access
DOI: 10.1109/ACCESS.2024.3399601

Gain insights into the latest empirical Cyber Security trends and results from Horizon Europe Funded Projects

Author(s): AI4CYBER, CERTIFY, CROSSCON, ENCRYPT, KINAITICS, REWIRE, TRUMPET and TRUSTEE
Published in: CROSSCON Website, 2025
Publisher: N.A.

NeuroStrike: Neuron-Level Attacks on Aligned LLMs

Author(s): Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi
Published in: NDSS, 2026
Publisher: N.A.

Automated Generation of Smart Contract Code from Legal Contract Specifications with Symboleo2SC (opens in new window)

Author(s): Aidin Rasti; Amal Ahmed Anda; Sofana Alfuhaid; Alireza Parvizimosaed; Daniel Amyot; Marco Roveri; Luigi Logrippo; John Mylopoulos
Published in: Zenodo Platform, 2023
Publisher: N.A.
DOI: 10.5281/ZENODO.7897782

CROSSCON: Cross-platform Open Security Stack for Connected Devices

Author(s): Bruno Crispo, Marco Roveri; Sandro Pinto, Tiago Gomes; Aljosa Pasic; Akos Milankovich; David Purón, Ainara Garcia; Ziga Putrle; Peter Ten; Malvina Catalano
Published in: 2024
Publisher: CROSSCON Project

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0