CORDIS provides links to public deliverables and publications of HORIZON projects.
Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .
Deliverables
A handbook describing the project management, quality control and risk assessment procedures adopted in the project.
D1.3 Legal and Ethical issues and Guidelines (opens in new window)The Legal & Ethics Manual will be prepared to assure the ethical assurance, gender equality, and compliance with national and EU legislation.
D5.1 REWIRE Blockchain architecture, continuous authorisation, and on/off chain data management (opens in new window)Reports the progress of WP5 presenting the blockchain architecture and the specifications of the smart contracts, on/off chain data management and continuous authorisation based on verifiable credentials.
D7.1 Dissemination, Exploitation and Communication Plan (opens in new window)Report the project’s web site and on the planned dissemination, exploitation, and communication activities.
D2.1 REWIRE Operational landscape, requirements, and Reference Architecture - Initial version (opens in new window)Report on the complete documentation of REWIRE requirements of T2.1 and the REWIRE reference architecture of T2.2. It will also include the 1st report on the progress of T2.3-2.5 documenting the trust indicators, threat landscape, the modes of operation during design time, and runtime validation properties.
D3.2 REWIRE Design time secure operational framework - Initial Version (opens in new window)Report on the 1st unified REWIRE Design time architecture and framework including the Risk Assessment methodology.
D3.1 Architectural blueprint of formal verification tool chain, operation and interactions (opens in new window)Reports the progress of tasks T3.1-T3.3 on blueprinting the architecture of the tool chain to be used for the formal verification and theorem proofs.
D2.2 REWIRE Operational landscape, requirements, and Reference Architecture - Final version (opens in new window)Report on the complete developments of T2.3-2.5 and potential updates on the REWIRE reference architecture, as a result of the 1st evaluation of the integrated framework (M21).
D1.2 Data Management Plan (opens in new window)The DMP will provide an analysis of the data management policy that will be used by the applications regarding all the research datasets that will be generated by the project.
D4.2 REWIRE Runtime assurance framework - Initial Version (opens in new window)Report on the 1st unified REWIRE Runtime architecture including Runtime auditing and federated learning aspects.
Report the project's web site and on the planned dissemination, exploitation, and communication activities. (opens in new window)Report documenting the dissemination, communication, clustering, standardisation, and exploitation activities. Highlighting open-source contributions and workshop organization activities.
Report on the final unified REWIRE Runtime architecture and framework with complete integration.
D5.2 REWIRE continuous authorisation, trust management, monitoring mechanisms and trust evidence collection (opens in new window)Reports the progress of WP5 on unifying the all blockchain-based artifacts.
D3.3 REWIRE Design time secure operational framework - Final Version (opens in new window)Report on the final unified REWIRE Design time architecture and framework with complete integration.
D4.1 Conceptual architecture of REWIRE customizable TEE and attestation models specifications (opens in new window)Reports the progress on blueprinting the architecture of the REWIRE TEE and attestation models.
Publications
Author(s):
Felipe Lisboa Malaquias, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini, Isaac Admundson
Published in:
ACM SIGAda Ada Letters, Issue 43:1, 2023
Publisher:
ACM Digital Library
DOI:
10.1145/3631483.3631499
Author(s):
Evgenia-Niovi Sassalou, Stefanos Vasileiadis, Stylianos A. Kazazis, Georgia Protogerou, Nikos Varvitsiotis, Dimitrios S. Karas, Thanassis Giannetsos, Symeon Tsintzos
Published in:
2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Publisher:
IEEE
DOI:
10.1109/CSR64739.2025.11130114
Author(s):
Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang
Published in:
USENIX SECURITY 2024, Issue 2403.01155, 2024
Publisher:
arXiv
DOI:
10.48550/arXiv.2403.01155
Author(s):
Chen, H., Galteland, Y.J., Liang, K.
Published in:
Advances in Cryptology – ASIACRYPT 2023, 2023, ISBN 978-981-99-8732-0
Publisher:
Springer, Singapore
DOI:
10.1007/978-981-99-8733-7_12
Author(s):
Moos, Thorben, Sayandeep Saha, and François-Xavier Standaert
Published in:
Cryptology ePrint Archive, 2024
Publisher:
ePrint Archive
Author(s):
Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
Published in:
Smart Card Research and Advanced Applications Lecture Notes in Computer Science, Issue 13820, 2023, ISBN 978-3-031-25319-5
Publisher:
Springer International Publishing
DOI:
10.1007/978-3-031-25319-5_15
Author(s):
Constantin Cătălin Drăgan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg
Published in:
Computer Security – ESORICS 2023, Issue 14346, 2024, ISBN 978-3-031-51479-1
Publisher:
Springer, Cham
DOI:
10.1007/978-3-031-51479-1_24
Author(s):
Heini Bergsson Debes, Thanassis Giannetsos
Published in:
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023, ISBN 9798400707728
Publisher:
Association for Computing Machinery
DOI:
10.1145/3600160.3600191
Author(s):
B. Larsen, N. El Kassem, Th. Giannetsos, I. Krontiris, S. Vasileiadis, L. Chen
Published in:
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023
Publisher:
IEEE
DOI:
10.5281/ZENODO.8215222
Author(s):
Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin
Published in:
2023 Design, Automation & Test in Europe Conference & Exhibition, Issue 10137176, 2023, ISBN 979-8-3503-9624-9
Publisher:
IEEE
DOI:
10.23919/DATE56975.2023.10137176
Author(s):
Jodie Knapp, Elizabeth A. Quaglia
Published in:
Information Security (ISC 2023), 2023, ISBN 978-3-031-49186-3
Publisher:
Springer, Cham
DOI:
10.1007/978-3-031-49187-0_24
Author(s):
Gaëtan Cassiers, François-Xavier Standaert, Corentin Verhamme (UCLouvain)
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, 2024, ISSN 2569-2925
Publisher:
The International Association for Cryptologic Research
DOI:
10.46586/TCHES.V2024.I3.603-633
Author(s):
Annika Wilde, Tim Niklas Gruel, Claudio Soriente, Ghassan Karame
Published in:
Proceedings 2025 Network and Distributed System Security Symposium, 2025, ISBN 979-8-9894372-8-3
Publisher:
Internet Society
DOI:
10.14722/NDSS.2025.241934
Author(s):
Momin, C., Standaert, F.-X., & Verhamme, C.
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, 2025, ISSN 2569-2925
Publisher:
The International Association for Cryptologic Research
DOI:
10.46586/TCHES.V2025.I3.717-744
Author(s):
Felipe Lisboa Malaquias, Mihail Asavoae & Florian Brandner
Published in:
Lecture Notes in Computer Science, Issue 13903, 2023, ISBN 978-3-031-33170-1
Publisher:
Springer, Cham
DOI:
10.1007/978-3-031-33170-1_18
Author(s):
Callum London; Daniel Gardham; Constantin Cătălin Drăgan
Published in:
2025 IEEE 38th Computer Security Foundations Symposium (CSF), 2025, ISSN 2374-8303
Publisher:
IEEE
DOI:
10.1109/CSF64896.2025.00026
Author(s):
Vasileaidis, S., Giannetsos, T., Schunter, M., & Crispo, B.
Published in:
arXiv, Issue 2509.05150, 2025
Publisher:
arXiv
DOI:
10.48550/ARXIV.2509.05150
Author(s):
Dongli Liu and Wei Wang and Peng Xu and Laurence T. Yang and Bo Luo and Kaitai Liang
Published in:
ArXiv & 33rd USENIX Security Symposium 2024, Issue abs/2403.01182, 2024
DOI:
10.48550/arXiv.2403.01182
Author(s):
Heini Bergsson Debes, Edlira Dushku, Thanassis Giannetsos, Ali Marandi
Published in:
ASIA CCS '23: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023, ISBN 9798400700989
Publisher:
ACM Digital Library
DOI:
10.1145/3579856.3582833
Author(s):
Abapour, Navid; Kafshdar Goharshady, Amir; Dragan, Constantin Catalin; Mahdavi Oliaee, Mahdi
Published in:
IACR Cryptol. ePrint Arch, Issue 1725, 2025
Publisher:
IACR
Author(s):
Nikolaos Fotos, Stefanos Vasileiadis, Thanassis Giannetsos
Published in:
2025 IEEE International Conference on Cyber Security and Resilience (CSR), 2025
Publisher:
IEEE
DOI:
10.1109/CSR64739.2025.11130147
Author(s):
Nada El Kassem, Wouter Hellemans, Ioannis Siachos, Edlira Dushku, Stefanos Vasileiadis, Dimitrios Karas, Liqun Chen, Constantinos Patsakis, Thanassis Giannetsos
Published in:
Proceedings of the 22nd International Conference on Security and Cryptography, 2025, ISSN 2184-7711
Publisher:
SCITEPRESS - Science and Technology Publications
DOI:
10.5220/0013629000003979
Author(s):
Jakob Feldtkeller, Tim Güneysu, Thorben Moos, Jan Richter-Brockmann, Sayandeep Saha, Pascal Sasdrich, Francois-Xavier Standaert
Published in:
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023, ISBN 9798400700507
Publisher:
ACM Digital Library
DOI:
10.1145/3576915.3623129
Author(s):
Zhang, Manning; Shi, Zeshun; Chen, Huanhuan; Liang, Kaitai
Published in:
2024 IEEE 37th Computer Security Foundations Symposium (CSF), 2024, ISSN 2374-8303
Publisher:
IEEE
DOI:
10.1109/CSF61375.2024.00029
Author(s):
Thorben Moos; Sayandeep Saha; François-Xavier Standaert
Published in:
IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, 2024, ISSN 2569-2925
Publisher:
The International Association for Cryptologic Research
DOI:
10.46586/TCHES.V2024.I4.690-736
Author(s):
Anthony Feijoo-Añazco, Dan Garcia-Carrillo, Jesús Sanchez-Gomez, Rafael Marin-Perez
Published in:
Internet of Things, Issue 100899, ISSN 2542-6605
Publisher:
Elsevier B.V.
DOI:
10.1016/J.IOT.2023.100899
Searching for OpenAIRE data...
There was an error trying to search data from OpenAIRE
No results available