Skip to main content

Enhancing Critical Infrastructure Protection with innovative SECurity framework

Deliverables

Use-case evaluation and recommendations

This report will give an analysis of the field trial results assessing the performance and usability of our approach. The report will present recommendations on how the framework can be utilized for providing more reliable industrial related applications in several industrial domains. In addition, the techno-economic assessment will be presented.

Report on functionality building blocks

This deliverable will report on the pilot’s features, setting the foundations for the definition of the functionality basic blocks to be used to design the CIPSEC platform

CIPSEC annual report on project management (Year 3)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC services integration on the Unified Architecture

This deliverable will report on the services development and integration on the CIPSEC architecture for securing CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Report

This document will update D3.4 with the final outcome inferred from the inter-dependencies analysis.

Trial scenario definitions and evaluation methodology specification

This report will describe in detail the scenarios for the experiments and trials, as well as a methodology for the evaluation and validation of the results

Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will update D3.2 describing the efforts carried out to integrate the CIPSEC platform into Pilot II.

Complete Complexity Analysis

This deliverable will describe the set of policies to assess the complexity brought by general vs particular solutions in CI scenarios

CIPSEC Intra/Inter-dependencies Analysis Preliminary Report

This document will describe a preliminary analysis on intra/inter-dependencies analysis, highlighting the potential cascading effects

Pilot I Integration: Incident Discovery and Response for Railway use case

This document will update D3.1.1 describing the efforts carried out to integrate the CIPSEC platform into Pilot I.

CIPSEC annual report on exploitation, dissemination and standardization (Year 2)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 2nd year

Business model definition

The consortium will define an appropriate business model where several details, due to real-life experimentations results will be included. Such model will help to optimize the income streams for all the parties involved in this Innovation Action

Preliminary Pilot III Integration: Air quality Monitoring System use case.

This document will describe preliminary the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC annual report on exploitation, dissemination and standardization (Year 1)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 1st year

CIPSEC Evaluation Plan

This deliverable will propose the set of activities to create and evaluate the CIPSEC solution

CIPSEC annual report on project management (Year 1)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

System ready for validation activities

This report will present the specifications of the integrated products and services (the complete security framework) for the three applications operations that will be developed and deployed for the trial.

CIPSEC Unified Architecture – First Internal Release

This deliverable will report the preliminary draft of the system level functionalities for the proposed CIPSEC platform architecture

Project management strategy: project handbook

The aforementioned management plans are designed (Validation plan etc.). Moreover, CIPSEC will design the project handbook that incorporates all procedures relating to the technical and administrative management of the project, as well as the project rules and guidelines on management of foreground and IPR.

CIPSEC Framework Final version

This deliverable consists of two parts: i) it will compile in a single public report the set of efforts carried out in T2.1, T2.3 and T2.4, including assets roadmapping, CIPSEC prototype description and final evaluation settings, and; ii) it will deliver the final version of the CIPSEC platform (SW release-FINAL).

Report on taxonomy of the CI environments

This deliverable will describe a taxonomy of different CI environments according to the expected features and functionalities, in order to properly tailor the CIPSEC design to the set of target CIs.

Pilot III Integration: Air quality Monitoring System use case

This document will update D3.3 describing the efforts carried out to integrate the CIPSEC platform into Pilot III

CIPSEC System design

This deliverable will describe innovation road-mapping in existing assets to support specs and requirements, defined in WP1 and needed for the architectural design in T2.2.

Preliminary certification activities

This deliverable will describe CIPSEC activities related to the preliminary certification for the security framework. In this report CIPSEC will include a cost analysis for concluding the certification in every aspect as well.

Preliminary Pilot I Integration: Incident Discovery and Response for Railway use case

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot I.

Dissemination plan and market analysis

In this report CIPSEC presents the dissemination and standardization strategy plan, the web-site structure (including the description for each security product and service) as well as a complete study related to possible competitors and market maturity.

Preliminary Pilot II Integration: Hospital’s Operational Technology Management System use case.

This document will describe preliminary efforts carried out to integrate the CIPSEC platform into Pilot II.

Final Version of the CIPSEC Unified Architecture and Initial Version of the CIPSEC Framework Prototype.

This deliverable will describe the overall CIPSEC platform architecture as a public report, and the first confidential version of a CIPSEC prototype (internal SW release-I) leveraging existing market solutions and its further integration into the proposed pilots

CIPSEC annual report on project management (Year 2)

This deliverable contain an overview of the activities carried out during the reporting period, describe the progress in relation to the project objectives, the progress towards the milestones and deliverables set for the period, any problems encountered and corrective actions taken, etc. The deliverable also includes a detailed justification of the costs incurred and of the resources deployed by each contractor linking them to activities implemented and justifying their necessity, the financial statements from each contractor and a summary financial report consolidating the costs of the contractors, etc.

CIPSEC products integration on the Unified Architecture

This deliverable will describe strategies for a successful CIPSEC market.

CI base security characteristics and market analysis report

This deliverable includes a survey analysis of security issues for CIs, mainly focusing on the pilots’ needs as well as a thorough analysis of market solutions, both mandatory to design the CIPSEC platform.

CIPSEC annual report on exploitation, dissemination and standardization (Year 3)

This deliverable will contain all exploitation, dissemination and standardization activities performed during the 3rd year.

Prototype Demonstration: Field trial results

This report will describe in detail the execution of the different trials in the selected pilots and uses cases and their respective sub-systems

Searching for OpenAIRE data...

Publications

Lightweight & secure industrial IoT communications via the MQ telemetry transport protocol

Author(s): Sotirios Katsikeas, Konstantinos Fysarakis, Andreas Miaoudakis, Amaury Van Bemten, Ioannis Askoxylakis, Ioannis Papaefstathiou, Anargyros Plemenos
Published in: 2017 IEEE Symposium on Computers and Communications (ISCC), 2017, Page(s) 1193-1200
DOI: 10.1109/ISCC.2017.8024687

An SDN-based Architecture for Security Provisioning in Fog-to-Cloud (F2C) Computing System

Author(s): Sarang Kahvazadeh, Vitor Barbosa, Xavi Masip, Eva Marín Tordera, Jordi García Almiñana, Rodrígo Díaz
Published in: Proceedings of the Future Technologies Conference (FTC), 2017

Securing combined Fog-to-Cloud system Through SDN Approach

Author(s): Sarang Kahvazadeh, Vitor B. Souza, Xavi Masip-Bruin, Eva Marn-Tordera, Jordi Garcia, Rodrigo Diaz
Published in: Proceedings of the 4th Workshop on CrossCloud Infrastructures & Platforms - Crosscloud'17, 2017, Page(s) 1-6
DOI: 10.1145/3069383.3069385

Hardware Security for Critical Infrastructures - The CIPSEC Project Approach

Author(s): Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Published in: 2017 IEEE Computer Society Annual Symposium on VLSI (ISVLSI), 2017, Page(s) 356-361
DOI: 10.1109/ISVLSI.2017.69

No Sugar but all the Taste! Memory Encryption without Architectural Support

Author(s): Panagiotis Papadopoulos, Giorgos Vasiliadis, Giorgos Christou, Evangelos Markatos, Sotiris Ioannidis
Published in: 2017, Page(s) 362-380
DOI: 10.1007/978-3-319-66399-9_20

Resiliente Architekturen in der Eisenbahn-Signaltechnik

Author(s): TUD
Published in: 2016

Improve SIEM capabilities within CIPSEC Project

Author(s): Joaquin Rodriguez Rodriguez
Published in: 2017

A Design Strategy for Digit Serial Multiplier Based Binary Edwards Curve Scalar Multiplier Architectures

Author(s): Apostolos P. Fournaris, Charalambos Dimopoulos, Odysseas Koufopavlou
Published in: 2017 Euromicro Conference on Digital System Design (DSD), 2017, Page(s) 221-228
DOI: 10.1109/DSD.2017.82

A Detection Mechanism for Internal Attacks on Pull-Based P2P Streaming Systems

Author(s): Hatem Ismail, Stefanie Roos, Neeraj Suri
Published in: "2018 IEEE 19th International Symposium on ""A World of Wireless, Mobile and Multimedia Networks"" (WoWMoM)", 2018, Page(s) 1-9
DOI: 10.1109/wowmom.2018.8449812

A flexible leakage trace collection setup for arbitrary cryptographic IP cores

Author(s): Athanassios Moschos, Apostolos P. Fournaris, Odysseas Koufopavlou
Published in: 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2018, Page(s) 138-142
DOI: 10.1109/hst.2018.8383902

Trusted hardware sensors for anomaly detection in critical infrastructure systems

Author(s): Apostolos P. Fournaris, Konstantinos Lampropoulos, Odysseas Koufopavlou
Published in: 2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST), 2018, Page(s) 1-4
DOI: 10.1109/mocast.2018.8376629

Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services

Author(s): Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Published in: 2018

Whetstone: Reliable Monitoring of Cloud Services

Author(s): Heng Zhang, Jesus Luna, Ruben Trapero, Neeraj Suri
Published in: 2018 IEEE International Conference on Smart Computing (SMARTCOMP), 2018, Page(s) 115-122
DOI: 10.1109/smartcomp.2018.00081

A genetic algorithm for obtaining memory constrained near-perfect hashing

Author(s): Dan Domnita, Ciprian Oprisa
Published in: 2018 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR), 2018, Page(s) 1-6
DOI: 10.1109/aqtr.2018.8402794

Towards An Efficient Key Management and Authentication Strategy for Combined Fog-to-Cloud Continuum Systems

Author(s): Sarang Kahvazadeh, Xavi Masip-Bruin, Rodrigo Diaz, Eva Marin-Tordera, Alejandro Jurnet, Jordi Garcia
Published in: 2018 3rd Cloudification of the Internet of Things (CIoT), 2018, Page(s) 1-7
DOI: 10.1109/ciot.2018.8627111

Prediction of abnormal temporal behavior in real-time systems

Author(s): Mohammad Hamad, Zain A. H. Hammadeh, Selma Saidi, Vassilis Prevelakis, Rolf Ernst
Published in: Proceedings of the 33rd Annual ACM Symposium on Applied Computing - SAC '18, 2018, Page(s) 359-367
DOI: 10.1145/3167132.3167172

A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems

Author(s): Hatem Ismail, Stefanie Roos, Neeraj Suri
Published in: 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), 2018, Page(s) 456-464
DOI: 10.1109/trustcom/bigdatase.2018.00072

Security Analysis of the RaSTA Safety Protocol

Author(s): Markus Heinrich, Jannik Vieten, Tolga Arul, Stefan Katzenbeisser
Published in: 2018 IEEE International Conference on Intelligence and Security Informatics (ISI), 2018, Page(s) 199-204
DOI: 10.1109/isi.2018.8587371

InfoLeak: Scheduling-Based Information Leakage

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang, Neeraj Suri
Published in: 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC), 2018, Page(s) 44-53
DOI: 10.1109/prdc.2018.00015

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach,

Author(s): Ana Rodríguez-Hoyos, Jose Antonio Estrada-Jimenez, David Rebollo-Monedero, Jordi Forné, Ruben Trapero, Antonio Alvarez, Rodrigo Diaz
Published in: 2019

Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System

Author(s): Mohammad Hamad, Marinos Tsantekidis, Vassilis Prevelakis
Published in: Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019, Page(s) 148-158
DOI: 10.5220/0007715201480158

SeReCP: A Secure and Reliable Communication Platform for the Smart Grid

Author(s): Kubilay Demir, Neeraj Suri
Published in: 2017 IEEE 22nd Pacific Rim International Symposium on Dependable Computing (PRDC), 2017, Page(s) 175-184
DOI: 10.1109/PRDC.2017.31

A Security Architecture for Railway Signalling

Author(s): Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Published in: Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017, Issue Yearly, 2017, Page(s) 320-328
DOI: 10.1007/978-3-319-66266-4_21

A Framework for Ranking Cloud Security Services

Author(s): Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri
Published in: 2017 IEEE International Conference on Services Computing (SCC), Issue Yearly, 2017, Page(s) 322-329
DOI: 10.1109/SCC.2017.48

deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services

Author(s): Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri
Published in: 2017 IEEE International Conference on Services Computing (SCC), Issue Yearly, 2017, Page(s) 27-34
DOI: 10.1109/SCC.2017.13

C'mon - Monitoring the Compliance of Cloud Services to Contracted Properties

Author(s): Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Issue Yearly, 2017, Page(s) 1-6
DOI: 10.1145/3098954.3098967

Towards DDoS Attack Resilient Wide Area Monitoring Systems

Author(s): Kubilay Demir, Neeraj Suri
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, Issue Yearly, 2017, Page(s) 1-7
DOI: 10.1145/3098954.3103164

Challenges and Approaches in Securing Safety-Relevant Railway Signalling

Author(s): Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, Neeraj Suri
Published in: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Issue Yearly, 2017, Page(s) 139-145
DOI: 10.1109/EuroSPW.2017.63

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural Attacks

Author(s): Apostolos Fournaris, Lidia Pocero Fraile, Odysseas Koufopavlou
Published in: Electronics, Issue 6/3, 2017, Page(s) 52, ISSN 2079-9292
DOI: 10.3390/electronics6030052

"Does <inline-formula> <tex-math notation=""LaTeX"">$k$ </tex-math> </inline-formula>-Anonymous Microaggregation Affect Machine-Learned Macrotrends?"

Author(s): Ana Rodriguez-Hoyos, Jose Estrada-Jimenez, David Rebollo-Monedero, Javier Parra-Arnau, Jordi Forne
Published in: IEEE Access, Issue 6, 2018, Page(s) 28258-28277, ISSN 2169-3536
DOI: 10.1109/access.2018.2834858

Practical Evaluation of Protected ResidueNumber System Scalar Multiplication

Author(s): Louiza Papachristodoulou, Apostolos P. Fournaris, Kostas Papagiannopoulos, Lejla Batina
Published in: IACR Transactions on Cryptographic Hardware and Embedded Systems, 2018, Page(s) Vol. 2019, No. 1, pp. 259–282, ISSN 2569-2925
DOI: 10.13154/tches.v2019.i1.259-282

MPTCP-H: A DDoS attack resilient transport protocol to secure wide area measurement systems

Author(s): Kubilay Demir, Ferdaus Nayyer, Neeraj Suri
Published in: International Journal of Critical Infrastructure Protection, Issue 25, 2019, Page(s) 84-101, ISSN 1874-5482
DOI: 10.1016/j.ijcip.2019.02.003

Securing the cloud-assisted smart grid

Author(s): Kubilay Demir, Hatem Ismail, Tsvetoslava Vateva-Gurova, Neeraj Suri
Published in: International Journal of Critical Infrastructure Protection, Issue 23, 2018, Page(s) 100-111, ISSN 1874-5482
DOI: 10.1016/j.ijcip.2018.08.004

Infrastrutture critiche più sicure, grazie al progetto CIPSEC

Author(s): Michaela Garbarino
Published in: 2016

Innovation: At the forefront of IoT security

Author(s): WOS
Published in: 2016

Press release entitled “Innovation The CIPSEC project: UNIFIED SECURITY”.

Author(s): WOS
Published in: 2016

“Secocard-Plattform zentrales Element in EU-Sicherheitsprojekt”

Author(s): EMPELOR
Published in: PresseBox, 2016

Launch of CIPSEC Project aiming to enhance Critical Infrastructure Protection

Author(s): ATOS
Published in: 2016

The Expertise Making Our Infrastructure Safe

Author(s): Dr Paschalis Papagrigoriou
Published in: 2016

ATOS coordina el desarrollo de los proyectos europeos ARIES y CIPSEC

Author(s): ATOS
Published in: SIC magazine, n.122, 2016

CIPSEC: A Commitment for the future of Critical Infrastructures

Author(s): Antonio Álvarez and Joaquín Rodríguez
Published in: 2018

Exploiting Hardware Vulnerabilities to Attack Embedded System Devices: a Survey of Potent Microarchitectural

Author(s): Apostolos P. Fournaris, Lidia Pocero Fraile and Odysseas Koufopavlou
Published in: Electronics, Volume 6, Issue 3, Issue Electronics Open Access Journal no. 3: 52, 2017

Network Topology Effects on the Detectability of Crossfire Attacks

Author(s): Christos Liaskos, Sotiris Ioannidis
Published in: IEEE Transactions on Information Forensics and Security, Issue 13/7, 2018, Page(s) 1682-1695, ISSN 1556-6013
DOI: 10.1109/tifs.2018.2799425

Design and leakage assessment of side channel attack resistant binary edwards Elliptic Curve digital signature algorithm architectures

Author(s): Apostolos P. Fournaris, Charalambos Dimopoulos, Athanassios Moschos, Odysseas Koufopavlou
Published in: Microprocessors and Microsystems, Issue 64, 2019, Page(s) 73-87, ISSN 0141-9331
DOI: 10.1016/j.micpro.2018.07.003

A Secure and Efficient File System Access Control Mechanism (FlexFS)

Author(s): Jihane Najar and Vassilis Prevelakis
Published in: “International workshop on Information & Operational Technology (IT & OT) security systems IOSEC 2018,”, 2019

Protecting Cloud-Based CIs: Covert Channel Vulnerabilities at the Resource Level

Author(s): Tsvetoslava Vateva-Gurova, Salman Manzoor, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 27-38
DOI: 10.1007/978-3-030-12085-6_3

Automated Measurements of Cross-Device Tracking

Author(s): Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis and Nicolas Kourtellis,
Published in: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 73-80

Threat Modeling the Cloud: An Ontology Based Approach

Author(s): Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero, Neeraj Suri
Published in: Information and Operational Technology Security Systems - First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers, Issue 11398, 2019, Page(s) 61-72
DOI: 10.1007/978-3-030-12085-6_6

Full Content Search in Malware Collections

Author(s): Andrei Mihalca and Ciprian Oprisa
Published in: International Workshop on Information and Operational Technology Security Systems, 2018, Page(s) pp 134-145

Challenges in Cybersecurity and Privacy - the European Research Landscape

Author(s): Jorge Bernal Bernabe, University of Murcia, Spain Antonio Skarmeta, University of Murcia, Spain
Published in: Challenges in Cybersecurity and Privacy - the European Research Landscape, 2019

Incremental k -Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling

Author(s): David Rebollo-Monedero ; César Hernández-Baigorri ; Jordi Forné ; Miguel Soriano
Published in: Issue 18495393, 2018, Page(s) 60016 - 60044
DOI: 10.1109/access.2018.2875949