Deliverables Documents, reports (32) Use-case evaluation and recommendations This report will give an analysis of the field trial results assessing the performance and usability of our approach. The report will present recommendations on how the framework can be utilized for providing more reliable industrial related applications in several industrial domains. In addition, the techno-economic assessment will be presented. Report on functionality building blocks This deliverable will report on the pilot’s features, setting the foundations for the definition of the functionality basic blocks to be used to design the CIPSEC platform CIPSEC annual report on project management (Year 3) This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc. CIPSEC services integration on the Unified Architecture This deliverable will report on the services development and integration on the CIPSEC architecture for securing CI scenarios CIPSEC Intra/Inter-dependencies Analysis Report This document will update D3.4 with the final outcome inferred from the inter-dependencies analysis. Trial scenario definitions and evaluation methodology specification This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results Pilot II Integration: Hospital’s Operational Technology Management System use case. This document will update D3.2 describing the efforts carried out to integrate the CIPSEC platform into Pilot II. Complete Complexity Analysis This deliverable will describe the set of policies to assess the complexity brought by general vs particular solutions in CI scenarios CIPSEC Intra/Inter-dependencies Analysis Preliminary Report This document will describe a preliminary analysis on intra/inter-dependencies analysis, highlighting the potential cascading effects Pilot I Integration: Incident Discovery and Response for Railway use case This document will update D3.1.1 describing the efforts carried out to integrate the CIPSEC platform into Pilot I. CIPSEC annual report on exploitation, dissemination and standardization (Year 2) This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year Business model definition The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action Preliminary Pilot III Integration: Air quality Monitoring System use case. This document will describe preliminary the efforts carried out to integrate the CIPSEC platform into Pilot III CIPSEC annual report on exploitation, dissemination and standardization (Year 1) This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year CIPSEC Evaluation Plan This deliverable will propose the set of activities to create and evaluate the CIPSEC solution CIPSEC annual report on project management (Year 1) This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc. System ready for validation activities This report will present the specifications of the integrated products and services (the complete security framework) for the three applications operations that will be developed and deployed for the trial. CIPSEC Unified Architecture – First Internal Release This deliverable will report the preliminary draft of the system level functionalities for the proposed CIPSEC platform architecture Project management strategy: project handbook The aforementioned management plans are designed (Validation plan etc.). Moreover, CIPSEC will design the project handbook that incorporates all procedures relating to the technical and administrative management of the project, as well as the project rules and guidelines on management of foreground and IPR. CIPSEC Framework Final version This deliverable consists of two parts: i) it will compile in a single public report the set of efforts carried out in T2.1, T2.3 and T2.4, including assets roadmapping, CIPSEC prototype description and final evaluation settings, and; ii) it will deliver the final version of the CIPSEC platform (SW release-FINAL). Report on taxonomy of the CI environments This deliverable will describe a taxonomy of different CI environments according to the expected features and functionalities, in order to properly tailor the CIPSEC design to the set of target CIs. Pilot III Integration: Air quality Monitoring System use case This document will update D3.3 describing the efforts carried out to integrate the CIPSEC platform into Pilot III CIPSEC System design This deliverable will describe innovation road-mapping in existing assets to support specs and requirements, defined in WP1 and needed for the architectural design in T2.2. Preliminary certification activities This deliverable will describe CIPSEC activities related to the preliminary certification for the security framework. In this report CIPSEC will include a cost analysis for concluding the certification in every aspect as well. Preliminary Pilot I Integration: Incident Discovery and Response for Railway use case This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot I. Dissemination plan and market analysis In this report CIPSEC presents the dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity. Preliminary Pilot II Integration: Hospital’s Operational Technology Management System use case. This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot II. Final Version of the CIPSEC Unified Architecture and Initial Version of the CIPSEC Framework Prototype. This deliverable will describe the overall CIPSEC platform architecture as a public report, and the first confidential version of a CIPSEC prototype (internal SW release-I) leveraging existing market solutions and its further integration into the proposed pilots CIPSEC annual report on project management (Year 2) This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc. CIPSEC products integration on the Unified Architecture This deliverable will describe strategies for a successful CIPSEC market. CI base security characteristics and market analysis report This deliverable includes a survey analysis of security issues for CIs, mainly focusing on the pilots’ needs as well as a thorough analysis of market solutions, both mandatory to design the CIPSEC platform. CIPSEC annual report on exploitation, dissemination and standardization (Year 3) This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year. Demonstrators, pilots, prototypes (1) Prototype Demonstration: Field trial results This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems Publications Conference proceedings (28) Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol Author(s): Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos Published in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Page(s) 1193-1200, ISBN 978-1-5386-1629-1 Publisher: IEEE DOI: 10.1109/ISCC.2017.8024687 An SDN-based Architecture for Security Provisioning in Fog-to-Cloud (F2C) Computing System Author(s): Sarang Kahvazadeh, Vitor Barbosa, Xavi Masip, Eva Marín Tordera, Jordi García Almiñana, Rodrígo Díaz Published in: Proceedings of the Future Technologies Conference (FTC), 2017 Publisher: EEE , FTC (2017) Future Technologies Conference 2017 Securing combined Fog-to-Cloud system Through SDN Approach Author(s): Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, Rodrigo Diaz Published in: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17, 2017, Page(s) 1-6, ISBN 9781-450349345 Publisher: ACM Press DOI: 10.1145/3069383.3069385 Hardware Security for Critical Infrastructures - The CIPSEC Project Approach Author(s): Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou Published in: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2017, Page(s) 356-361, ISBN 978-1-5090-6762-6 Publisher: IEEE DOI: 10.1109/ISVLSI.2017.69 No Sugar but all the Taste! Memory Encryption without Architectural Support Author(s): Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, Sotiris Ioannidis Published in: 2017, Page(s) 362-380 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-66399-9_20 Resiliente Architekturen in der Eisenbahn-Signaltechnik Author(s): TUD Published in: 2016 Publisher: CYSIS workgroup Improve SIEM capabilities within CIPSEC Project Author(s): Joaquin Rodriguez Rodriguez Published in: 2017 Publisher: Jornadas Nacionales de Investigación en Ciberseguridad (JNIC 2017), A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures Author(s): Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas Koufopavlou Published in: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Page(s) 221-228, ISBN 978-1-5386-2146-2 Publisher: IEEE DOI: 10.1109/DSD.2017.82 A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems Author(s): Hatem Ismail, Stefanie Roos, Neeraj Suri Published in: "2018 IEEE 19th International Symposium on ""A World of Wireless, Mobile and Multimedia Networks"" (WoWMoM)", 2018, Page(s) 1-9, ISBN 978-1-5386-4725-7 Publisher: IEEE DOI: 10.1109/wowmom.2018.8449812 A flexible leakage trace collection setup for arbitrary cryptographic IP cores Author(s): Athanassios Moschos, Apostolos P. Fournaris, Odysseas Koufopavlou Published in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 138-142, ISBN 978-1-5386-4731-8 Publisher: IEEE DOI: 10.1109/hst.2018.8383902 Trusted hardware sensors for anomaly detection in critical infrastructure systems Author(s): Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou Published in: 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018, Page(s) 1-4, ISBN 978-1-5386-4788-2 Publisher: IEEE DOI: 10.1109/mocast.2018.8376629 Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services Author(s): Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri Published in: 2018 Publisher: ARES International Conference on Availability, Reliability and Security (accepted for publication). Whetstone: Reliable Monitoring of Cloud Services Author(s): Heng Zhang, Jesus Luna, Ruben Trapero, Neeraj Suri Published in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Page(s) 115-122, ISBN 978-1-5386-4705-9 Publisher: IEEE DOI: 10.1109/smartcomp.2018.00081 A genetic algorithm for obtaining memory constrained near-perfect hashing Author(s): Dan Domnita, Ciprian Oprisa Published in: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Page(s) 1-6, ISBN 978-1-5386-2205-6 Publisher: IEEE DOI: 10.1109/aqtr.2018.8402794 Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems Author(s): Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marin-Tordera, Alejandro Jurnet, Jordi Garcia Published in: 2018 3rd Cloudification of the Internet of Things (CIoT), 2018, Page(s) 1-7, ISBN 978-1-5386-4629-8 Publisher: IEEE DOI: 10.1109/ciot.2018.8627111 Prediction of abnormal temporal behavior in real-time systems Author(s): Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst Published in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Page(s) 359-367, ISBN 9781-450351911 Publisher: ACM Press DOI: 10.1145/3167132.3167172 A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems Author(s): Hatem Ismail, Stefanie Roos, Neeraj Suri Published in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 456-464, ISBN 978-1-5386-4388-4 Publisher: IEEE DOI: 10.1109/trustcom/bigdatase.2018.00072 Security Analysis of the RaSTA Safety Protocol Author(s): Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser Published in: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018, Page(s) 199-204, ISBN 978-1-5386-7848-0 Publisher: IEEE DOI: 10.1109/isi.2018.8587371 InfoLeak: Scheduling-Based Information Leakage Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri Published in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Page(s) 44-53, ISBN 978-1-5386-5700-3 Publisher: IEEE DOI: 10.1109/prdc.2018.00015 Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach, Author(s): Ana Rodríguez-Hoyos, Jose Antonio Estrada-Jimenez, David Rebollo-Monedero, Jordi Forné, Ruben Trapero, Antonio Alvarez, Rodrigo Diaz Published in: 2019 Publisher: WiPe Paper – Privacy Risk Management in Critical Infrastructures Proceedings of the 16th ISCRAM Conference Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System Author(s): Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis Published in: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019, Page(s) 148-158, ISBN 978-989-758-374-2 Publisher: SCITEPRESS - Science and Technology Publications DOI: 10.5220/0007715201480158 SeReCP: A Secure and Reliable Communication Platform for the Smart Grid Author(s): Kubilay Demir, Neeraj Suri Published in: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, Page(s) 175-184, ISBN 978-1-5090-5652-1 Publisher: IEEE DOI: 10.1109/PRDC.2017.31 A Security Architecture for Railway Signalling Author(s): Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri Published in: Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017, Issue Yearly, 2017, Page(s) 320-328 Publisher: Springer International Publishing DOI: 10.1007/978-3-319-66266-4_21 A Framework for Ranking Cloud Security Services Author(s): Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri Published in: 2017 IEEE International Conference on Services Computing (SCC), Issue Yearly, 2017, Page(s) 322-329, ISBN 978-1-5386-2005-2 Publisher: IEEE DOI: 10.1109/SCC.2017.48 deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services Author(s): Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri Published in: 2017 IEEE International Conference on Services Computing (SCC), Issue Yearly, 2017, Page(s) 27-34, ISBN 978-1-5386-2005-2 Publisher: IEEE DOI: 10.1109/SCC.2017.13 C'mon - Monitoring the Compliance of Cloud Services to Contracted Properties Author(s): Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Issue Yearly, 2017, Page(s) 1-6, ISBN 9781-450352574 Publisher: ACM Press DOI: 10.1145/3098954.3098967 Towards DDoS Attack Resilient Wide Area Monitoring Systems Author(s): Kubilay Demir, Neeraj Suri Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Issue Yearly, 2017, Page(s) 1-7, ISBN 9781-450352574 Publisher: ACM Press DOI: 10.1145/3098954.3103164 Challenges and Approaches in Securing Safety-Relevant Railway Signalling Author(s): Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri Published in: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Issue Yearly, 2017, Page(s) 139-145, ISBN 978-1-5386-2244-5 Publisher: IEEE DOI: 10.1109/EuroSPW.2017.63 Non-peer reviewed articles (5) Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks Author(s): Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou Published in: Electronics, Issue 6/3, 2017, Page(s) 52, ISSN 2079-9292 Publisher: MDPI DOI: 10.3390/electronics6030052 "Does <inline-formula> <tex-math notation=""LaTeX"">$k$ </tex-math> </inline-formula>-Anonymous Microaggregation Affect Machine-Learned Macrotrends?" Author(s): Ana Rodriguez-Hoyos, Jose Estrada-Jimenez, David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne Published in: IEEE Access, Issue 6, 2018, Page(s) 28258-28277, ISSN 2169-3536 Publisher: Institute of Electrical and Electronics Engineers Inc. DOI: 10.1109/access.2018.2834858 Practical Evaluation of Protected ResidueNumber System Scalar Multiplication Author(s): Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, Page(s) Vol. 2019, No. 1, pp. 259–282, ISSN 2569-2925 Publisher: IACR Transactions on Cryptographic Hardware and Embedded Systems. DOI: 10.13154/tches.v2019.i1.259-282 MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems Author(s): Kubilay Demir, Ferdaus Nayyer, Neeraj Suri Published in: International Journal of Critical Infrastructure Protection, Issue 25, 2019, Page(s) 84-101, ISSN 1874-5482 Publisher: Elsevier BV DOI: 10.1016/j.ijcip.2019.02.003 Securing the cloud-assisted smart grid Author(s): Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri Published in: International Journal of Critical Infrastructure Protection, Issue 23, 2018, Page(s) 100-111, ISSN 1874-5482 Publisher: Elsevier BV DOI: 10.1016/j.ijcip.2018.08.004 Other (8) Infrastrutture critiche più sicure, grazie al progetto CIPSEC Author(s): Michaela Garbarino Published in: 2016 Publisher: CSI Innovation: At the forefront of IoT security Author(s): WOS Published in: 2016 Publisher: WOS Press release entitled “Innovation The CIPSEC project: UNIFIED SECURITY”. Author(s): WOS Published in: 2016 Publisher: WOS “Secocard-Plattform zentrales Element in EU-Sicherheitsprojekt” Author(s): EMPELOR Published in: PresseBox, 2016 Publisher: EMPELOR Launch of CIPSEC Project aiming to enhance Critical Infrastructure Protection Author(s): ATOS Published in: 2016 Publisher: ATOS The Expertise Making Our Infrastructure Safe Author(s): Dr Paschalis Papagrigoriou Published in: 2016 Publisher: EMPELOR ATOS coordina el desarrollo de los proyectos europeos ARIES y CIPSEC Author(s): ATOS Published in: SIC magazine, n.122, 2016 Publisher: ATOS CIPSEC: A Commitment for the future of Critical Infrastructures Author(s): Antonio Álvarez and Joaquín Rodríguez Published in: 2018 Publisher: ERCIM News 115 Monographic books (1) Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Author(s): Apostolos P. Fournaris, Lidia Pocero Fraile and Odysseas Koufopavlou Published in: Electronics, Volume 6, Issue 3, Issue Electronics Open Access Journal no. 3: 52, 2017 Publisher: MDPI Peer reviewed articles (2) Network Topology Effects on the Detectability of Crossfire Attacks Author(s): Christos Liaskos, Sotiris Ioannidis Published in: IEEE Transactions on Information Forensics and Security, Issue 13/7, 2018, Page(s) 1682-1695, ISSN 1556-6013 Publisher: Institute of Electrical and Electronics Engineers DOI: 10.1109/tifs.2018.2799425 Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures Author(s): Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas Koufopavlou Published in: Microprocessors and Microsystems, Issue 64, 2019, Page(s) 73-87, ISSN 0141-9331 Publisher: Elsevier BV DOI: 10.1016/j.micpro.2018.07.003 Book chapters (7) A Secure and Efficient File System Access Control Mechanism (FlexFS) Author(s): Jihane Najar and Vassilis Prevelakis Published in: “International workshop on Information & Operational Technology (IT & OT) security systems IOSEC 2018,”, 2019 Publisher: Springer Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 27-38, ISBN 978-3-030-12084-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-12085-6_3 Automated Measurements of Cross-Device Tracking Author(s): Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis and Nicolas Kourtellis, Published in: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 73-80 Publisher: 3rd CIPSEC workshop (IOSec 2018). Crete, Greece Threat Modeling the Cloud: An Ontology Based Approach Author(s): Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 61-72, ISBN 978-3-030-12084-9 Publisher: Springer International Publishing DOI: 10.1007/978-3-030-12085-6_6 Full Content Search in Malware Collections Author(s): Andrei Mihalca and Ciprian Oprisa Published in: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 134-145 Publisher: Springer Challenges in Cybersecurity and Privacy - the European Research Landscape Author(s): Jorge Bernal Bernabe, University of Murcia, Spain Antonio Skarmeta, University of Murcia, Spain Published in: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019, ISBN 9788-770220880 Publisher: River Publishers Series in Security and Digital Forensics Incremental k -Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling Author(s): David Rebollo-Monedero ; César Hernández-Baigorri ; Jordi Forné ; Miguel Soriano Published in: Issue 18495393, 2018, Page(s) 60016 - 60044 Publisher: IEEE DOI: 10.1109/access.2018.2875949 Searching for OpenAIRE data... There was an error trying to search data from OpenAIRE No results available