Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Revolutionised Enhanced Supply Chain Automation with Limited Threats Exposure

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Project Website (opens in new window)

A website will be designed as the main communication portal of the project. After initial deployment, the website will be continuously updated to reflect current information about the project, important news and announcements, public deliverables, events etc. In addition, social media accounts will be created (Twitter, Youtube channel, Facebook page, LinkedIn page) to engage a wider audience, disseminate project activities, drive traffic towards the projects main website and establish easy and direct communication paths with the general academic and industrial community.

Publications

VulnBERTa: On Automating CWE Weakness Assignment and Improving the Quality of Cybersecurity CVE Vulnerabilities Through ML/NLP (opens in new window)

Author(s): Hannu Turtiainen, Andrei Costin
Published in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2024, ISSN 2768-0657
Publisher: IEEE
DOI: 10.1109/EUROSPW61312.2024.00075

Leaky Address Masking: Exploiting Unmasked Spectre Gadgets with Noncanonical Address Translation (opens in new window)

Author(s): Mathé Hertogh, Sander Wiebing, Cristiano Giuffrida
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISBN 979-8-3503-3130-1
Publisher: IEEE
DOI: 10.1109/SP54263.2024.00158

Safeguarding Blockchain and Dlts From Arbitrary and Malicious Content (opens in new window)

Author(s): Alan Barnett, Merry Globin, Tarek Zaarour, Sean Ahearne, Ahmed Khalid
Published in: 2024 IEEE 32nd International Conference on Network Protocols (ICNP), 2025, ISSN 2643-3303
Publisher: IEEE
DOI: 10.1109/ICNP61940.2024.10858544

Predictive Context-sensitive Fuzzing (opens in new window)

Author(s): Pietro Borrello, Andrea Fioraldi, Daniele Cono D'Elia, Davide Balzarotti, Leonardo Querzoni, Cristiano Giuffrida
Published in: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Publisher: Internet Society
DOI: 10.14722/NDSS.2024.24113

A Review on Privacy and Monetization Aspects Within BCI and XR-BCI Ecosystems (opens in new window)

Author(s): Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil, Narges Yousefnezhad
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_11

iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys (opens in new window)

Author(s): George Christou, Giorgos Vasiliadis, Apostolis Zarras, Sotiris Ioannidis
Published in: Lecture Notes in Computer Science, Embedded Computer Systems: Architectures, Modeling, and Simulation, 2024, ISBN 978-3-031-78380-7
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-78380-7_13

Sticky Tags: Efficient and Deterministic Spatial Memory Error Mitigation using Persistent Memory Tags (opens in new window)

Author(s): Floris Gorter, Taddeus Kroes, Herbert Bos, Cristiano Giuffrida
Published in: 2024 IEEE Symposium on Security and Privacy (SP), 2024, ISBN 979-8-3503-3130-1
Publisher: IEEE
DOI: 10.1109/SP54263.2024.00263

GhostRace: Exploiting and Mitigating Speculative Race Conditions (opens in new window)

Author(s): Hany Ragab, Andrea Mambretti, Anil Kurmus, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771348

Understanding SBOMs in Real-World Systems – A Practical DevOps/SecOps Perspective (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_20

Reproducibility of Firmware Analysis: An Empirical Study (opens in new window)

Author(s): Narges Yousefnezhad, Andrei Costin
Published in: Lecture Notes in Business Information Processing, Business Modeling and Software Design, 2024, ISBN 978-3-031-64073-5
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64073-5_13

Position: On Potential Malware & New Attack Vectors for Internet-of-Brains (IoB) (opens in new window)

Author(s): Tuomo Lahtinen, Andrei Costin, Guillermo Suarez-Tangil
Published in: 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2024, ISSN 2768-0657
Publisher: IEEE
DOI: 10.1109/EUROSPW61312.2024.00066

SafeFetch: Practical Double-Fetch Protection with Kernel-Fetch Caching (opens in new window)

Author(s): Victor Duta, Mitchel Josephus Aloserij, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771642

InSpectre Gadget: Inspecting the Residual Attack Surface of Cross-privilege Spectre v2 (opens in new window)

Author(s): Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, Cristiano Giuffrida
Published in: 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association
DOI: 10.5281/ZENODO.13771606

Game on: a performance comparison of interpolation techniques applied to Shamir’s secret sharing (opens in new window)

Author(s): Anastassis Voudouris, Aristomenis Tressos, Apostolis Zarras, Christos Xenakis
Published in: The Computer Journal, Issue 68, 2024, ISSN 0010-4620
Publisher: Oxford University Press (OUP)
DOI: 10.1093/COMJNL/BXAE109

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0