Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

REWiring the ComposItional Security VeRification and AssurancE of Systems of Systems Lifecycle

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

D1.1 Project Handbook (opens in new window)

A handbook describing the project management, quality control and risk assessment procedures adopted in the project.

D5.1 REWIRE Blockchain architecture, continuous authorisation, and on/off chain data management (opens in new window)

Reports the progress of WP5 presenting the blockchain architecture and the specifications of the smart contracts, on/off chain data management and continuous authorisation based on verifiable credentials.

D7.1 Dissemination, Exploitation and Communication Plan (opens in new window)

Report the project’s web site and on the planned dissemination, exploitation, and communication activities.

D2.1 REWIRE Operational landscape, requirements, and Reference Architecture - Initial version (opens in new window)

Report on the complete documentation of REWIRE requirements of T2.1 and the REWIRE reference architecture of T2.2. It will also include the 1st report on the progress of T2.3-2.5 documenting the trust indicators, threat landscape, the modes of operation during design time, and runtime validation properties.

D3.2 REWIRE Design time secure operational framework - Initial Version (opens in new window)

Report on the 1st unified REWIRE Design time architecture and framework including the Risk Assessment methodology.

D3.1 Architectural blueprint of formal verification tool chain, operation and interactions (opens in new window)

Reports the progress of tasks T3.1-T3.3 on blueprinting the architecture of the tool chain to be used for the formal verification and theorem proofs.

D1.2 Data Management Plan (opens in new window)

The DMP will provide an analysis of the data management policy that will be used by the applications regarding all the research datasets that will be generated by the project.

D4.2 REWIRE Runtime assurance framework - Initial Version (opens in new window)

Report on the 1st unified REWIRE Runtime architecture including Runtime auditing and federated learning aspects.

Report the project's web site and on the planned dissemination, exploitation, and communication activities. (opens in new window)

Report documenting the dissemination, communication, clustering, standardisation, and exploitation activities. Highlighting open-source contributions and workshop organization activities.

D4.1 Conceptual architecture of REWIRE customizable TEE and attestation models specifications (opens in new window)

Reports the progress on blueprinting the architecture of the REWIRE TEE and attestation models.

Publications

Towards a Methodology to Design Provably Secure Cyber-physical Systems (opens in new window)

Author(s): Felipe Lisboa Malaquias, Georgios Giantamidis, Stylianos Basagiannis, Simone Fulvio Rollini, Isaac Admundson
Published in: ACM SIGAda Ada Letters, Issue 43:1, 2023
Publisher: ACM Digital Library
DOI: 10.1145/3631483.3631499

Query Recovery from Easy to Hard: Jigsaw Attack against SSE (opens in new window)

Author(s): Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, Kaitai Liang
Published in: USENIX SECURITY 2024, Issue 2403.01155, 2024
Publisher: arXiv
DOI: 10.48550/arXiv.2403.01155

Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists (opens in new window)

Author(s): Corentin Verhamme, Gaëtan Cassiers, François-Xavier Standaert
Published in: Smart Card Research and Advanced Applications Lecture Notes in Computer Science, Issue 13820, 2023, ISBN 978-3-031-25319-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-031-25319-5_15

Machine-Checked Proofs of Accountability: How to sElect Who is to Blame (opens in new window)

Author(s): Constantin Cătălin Drăgan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg
Published in: Computer Security – ESORICS 2023, Issue 14346, 2024, ISBN 978-3-031-51479-1
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-51479-1_24

Non-Profiled Side-Channel Assisted Fault Attack: A Case Study on DOMREP (opens in new window)

Author(s): Sayandeep Saha, Prasanna Ravi, Dirmanto Jap, Shivam Bhasin
Published in: 2023 Design, Automation & Test in Europe Conference & Exhibition, Issue 10137176, 2023, ISBN 979-8-3503-9624-9
Publisher: IEEE
DOI: 10.23919/DATE56975.2023.10137176

From the Standards to Silicon: Formally Proved Memory Controllers (opens in new window)

Author(s): Felipe Lisboa Malaquias, Mihail Asavoae & Florian Brandner
Published in: Lecture Notes in Computer Science, Issue 13903, 2023, ISBN 978-3-031-33170-1
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-33170-1_18

d-DSE: Distinct Dynamic Searchable Encryption Resisting Volume Leakage in Encrypted Databases (opens in new window)

Author(s): Dongli Liu and Wei Wang and Peng Xu and Laurence T. Yang and Bo Luo and Kaitai Liang
Published in: ArXiv & 33rd USENIX Security Symposium 2024, Issue abs/2403.01182, 2024
DOI: 10.48550/arXiv.2403.01182

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0