Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Revolutionised Enhanced Supply Chain Automation with Limited Threats Exposure

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

RESCALE Continuous Security Assurance Platform (first version) (opens in new window)

This deliverable will provide a description (support features, architectures, functionalities) of the first version (MVP) of the continuous security assurance platform.

Dissemination Report (first version) (opens in new window)

The deliverable will describe the dissemination plan and report on all relevant activities during the first half of the project.

TBOM Security and Trust Mechanism (first version) (opens in new window)

This deliverable will present the initial version of the RESCALE TBOM security and trust mechanism detailing the chosen blockchain infrastructure, entries and initial smart contracts features. It will present also potential issues and will provide a roadmap on the future development towards the final version of these trust mechanisms.

Solutions for Security Testing of Low-Level System Components (first version) (opens in new window)

This deliverable will present the initial version of the RESCALE solutions that target security testing of firmware, OS and microarchitectural components. Besides the description of the solutions’ features, functionalities and architecture, the report will present open issues and future features and functionalities that will be included in the final version of the solutions.

Technology Analysis and Requirements Specification (first version) (opens in new window)

This deliverable will provide a state-of-the-art analysis and the initial requirements specification.

Specification of the TBOM Structure (opens in new window)

This deliverable will provide the complete specification of the TBOM structure and its subcomponents.

Hardware Vulnerability and Leakage Detection (first version) (opens in new window)

This deliverable will present the initial version of the RESCALE solutions that target the detection of hardware vulnerabilities and information leakage. It will detail the coverage that this initial version achieves as well as potential issues and will provide a roadmap on the future development towards the final version of these components.

Trust Orchestrator (first version) (opens in new window)

The deliverable will provide the description of the first integrated version of the overall Trust Orchestrator framework.

Validation and Evaluation Report (first version) (opens in new window)

The deliverable will provide the validation and evaluation report of the first cycle of the project covering the MVP version of all components, initial integration results and pilot deployments.

Use Case Specification (first version) (opens in new window)

This deliverable will provide a detailed description and specification of the two pilot use cases of the project.

High Level Architecture (first version) (opens in new window)

This deliverable will present the initial version of the high level architecture of all RESCALE tools and components along with their interactions and interfaces.

Dynamic Testing Analysis Components (first version) (opens in new window)

This deliverable will provide a description (support features, architectures, functionalities) of the first version of the dynamic testing analysis modules. Additionally it will provide information on open issues with said modules and a roadmap towards their envisioned final version.

Static Code Analysers and Formal Verification Methods (first version) (opens in new window)

This deliverable will cover the development of the first version of the RESCALE static code analysers and formal verifications methods and describe their features, functionalities and open issues. The deliverable will also include a roadmap towards a final version of these components.

Project Website (opens in new window)

A website will be designed as the main communication portal of the project. After initial deployment, the website will be continuously updated to reflect current information about the project, important news and announcements, public deliverables, events etc. In addition, social media accounts will be created (Twitter, Youtube channel, Facebook page, LinkedIn page) to engage a wider audience, disseminate project activities, drive traffic towards the projects main website and establish easy and direct communication paths with the general academic and industrial community.

Pilot Deployment, Test and Demonstration (first version) (opens in new window)

The deliverable will present the results of the deployment and testing of the first version of the RESCALE solutions in the pilot use cases and provide demonstrators for the initial outcomes.

Publications

Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks (opens in new window)

Author(s): Sander Wiebing, Cristiano Giuffrida
Published in: 2025 IEEE Symposium on Security and Privacy (SP), 2025, ISBN 979-8-3315-2236-0
Publisher: IEEE
DOI: 10.1109/SP61157.2025.00253

VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP (opens in new window)

Author(s): Hannu Turtiainen, Andrei Costin
Published in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2024, ISSN 2768-0657
Publisher: IEEE
DOI: 10.1109/EUROSPW61312.2024.00075

Phantom Trails: Practical Pre-Silicon Discovery of Transient Data Leaks (opens in new window)

Author(s): Alvise de Faveri Tron, Raphael Isemann, Hany Ragab, Cristiano Giuffrida, Klaus von Gleissenthall, Herbert Bos
Published in: 2025, ISBN 9781939133526
Publisher: USENIX Association
DOI: 10.5281/ZENODO.17009888

Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation (opens in new window)

Author(s): Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISBN 979-8-3503-3130-1
Publisher: IEEE
DOI: 10.1109/SP54263.2024.00158

Safeguarding Blockchain and Dlts From Arbitrary and Malicious Content (opens in new window)

Author(s): Alan Barnett, Merry Globin, Tarek Zaarour, Sean Ahearne, Ahmed Khalid
Published in: 2024 IEEE 32nd International Conference on Network Protocols (ICNP), 2025, ISSN 2643-3303
Publisher: IEEE
DOI: 10.1109/ICNP61940.2024.10858544

Predictive Context-sensitive Fuzzing (opens in new window)

Author(s): Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida
Published in: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Publisher: Internet Society
DOI: 10.14722/NDSS.2024.24113

A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems (opens in new window)

Author(s): Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil, Narges Yousefnezhad
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_11

iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys (opens in new window)

Author(s): George Christou, Giorgos Vasiliadis, Apostolis Zarras, Sotiris Ioannidis
Published in: Lecture Notes in Computer Science, Embedded Computer Systems: Architectures, Modeling, and Simulation, 2024, ISBN 978-3-031-78380-7
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78380-7_13

Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags (opens in new window)

Author(s): Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISBN 979-8-3503-3130-1
Publisher: IEEE
DOI: 10.1109/SP54263.2024.00263

GhostRace: Exploiting and Mitigating Speculative Race Conditions (opens in new window)

Author(s): Hany Ragab, Andrea Mambretti, Anil Kurmus, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771348

Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_20

Half Spectre, Full Exploit: Hardening Rowhammer Attacks with Half-Spectre Gadgets (opens in new window)

Author(s): Andrea Di Dio, Mathé Hertogh, Cristiano Giuffrida
Published in: 2025 IEEE Symposium on Security and Privacy (SP), 2025, ISBN 979-8-3315-2236-0
Publisher: IEEE
DOI: 10.1109/SP61157.2025.00207

Reproducibility of Firmware Analysis: An Empirical Study (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_13

Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB) (opens in new window)

Author(s): Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil
Published in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2024, ISSN 2768-0657
Publisher: IEEE
DOI: 10.1109/EUROSPW61312.2024.00066

RangeSanitizer: Detecting Memory Errors with Efficient Range Checks (opens in new window)

Author(s): Floris Gorter, Cristiano Giuffrida
Published in: 2025, ISBN 9781939133526
Publisher: USENIX Association
DOI: 10.5281/ZENODO.17009907

SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching (opens in new window)

Author(s): Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771642

InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 (opens in new window)

Author(s): Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771606

Holistic IoT Security, Privacy and Safety: Integrated, Approaches Protecting A Highly Connected World (opens in new window)

Author(s): Konstantinos Loupos
Published in: 2025, ISBN 978-1-63828-507-6
Publisher: Now Publishers
DOI: 10.1561/9781638285076

Game on: a performance comparison of interpolation techniques applied to Shamir’s secret sharing (opens in new window)

Author(s): Anastassis Voudouris, Aristomenis Tressos, Apostolis Zarras, Christos Xenakis
Published in: The Computer Journal, Issue 68, 2024, ISSN 0010-4620
Publisher: Oxford University Press (OUP)
DOI: 10.1093/COMJNL/BXAE109

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0