Skip to main content

Cyber Security for Cross Domain Reliable Dependable Automated Systems

Deliverables

Single demonstrators working

Single demonstrators working

Demonstrators combined cooperating in to use cases

Demonstrators combined cooperating in to use cases

Final SECREDAS Events, including Press Conference, Open Workshop & Visit to Demonstrations (Lab + Pilot Sites)

Final SECREDAS Events including Press Conference Open Workshop Visit to Demonstrations Lab Pilot Sites Will be done at AVL Lab Thales Lab Helmond Pilot Site and CSIC Pilot Site FICO

Single demonstrators working

Single demonstrators working

Demonstrators combined cooperating in to use cases

Demonstrators combined cooperating in to use cases

Final demo I, II and III in controlled scenario

Final demo I II and III in controlled scenario

Guidelines for multi-concern analysis, assessment and qualification/certification (final)

Guidelines for multiconcern analysis assessment and qualificationcertification final

Security analysis report v2

Security analysis report v2

Initial set of scenarios and use cases

Initial set of scenarios and use cases to be used throughout the project.

Secure connections between wearables, laboratory systems and via a gateway to a research database

Secure connections between wearables, laboratory systems and via a gateway to a research database

Initial ITS station architecture with functional security features

Initial ITS station architecture with functional security features

Validation of Drone demonstrators in operational conditions

Demonstrators working in operational conditions

Final ITS station architecture with functional security features

Final ITS station architecture with functional security features

Final Demonstrators Description

Final description of demonstrators derived from second set of scenarios and use cases

State-of-the-art Analysis and Applicability of Standards

State-of-the-art Analysis and Applicability of Standards

Report on tailored education programs using SECREDAS results

Report on tailored education programs using SECREDAS results

2nd dissemination report (overview of press conferences, public workshops, public shows, conference attendance,…)

2nd dissemination report overview of press conferences public workshops public shows conference attendance

1st dissemination report (overview of press conferences, public workshops, public shows, conference attendance,…)

1st dissemination report (overview of press conferences, public workshops, public shows, conference attendance,…)

Security Testing Framework Overview v2

Security Testing Framework Overview v2

Validation of DEMO II – Scenario 2.2 in operational conditions

Validation of DEMO II in operational conditions

Second set of scenarios and use cases

Second set of use cases and scenarios to be used for development and demonstrators in Secredas

Design pattern descriptions v2

Design pattern descriptions v2

Final Report on involvement of partners in standardization and use of standards, future standardization plans

Final Report on involvement of partners in standardization and use of standards future standardization plans

Press Conference to launch SECREDAS

Press Conference to launch SECREDAS

Searching for OpenAIRE data...

Publications

Multi-purpose Low Latency Streaming Using Unmanned Aerial Vehicles

Author(s): Ricardo Sacoto-Martins, Joao Madeira, J. P. Matos-Carvalho, Fabio Azevedo, Luis M. Campos
Published in: 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2020, Page(s) 1-6
DOI: 10.1109/csndsp49049.2020.9249562

BEYOND SMART SYSTEMS – CREATING A SOCIETY OF THE FUTURE (5.0) RESOLVING DISRUPTIVE CHANGES AND SOCIAL CHALLENGES

Author(s): Schoitsch, Erwin
Published in: Proceedings of IDIMT 2019, Innovation and Transformation in a Digital World, Issue 48 Schriftenreihe Informatik, 2019, Page(s) 387-400
DOI: 10.5281/zenodo.3605686

Smart Systems Everywhere – Intelligence, Autonomy, Technology and Society

Author(s): Erwin, Schoitsch
Published in: IDIMT-2018 Strategic Modeling in Management, Economy and Society 26th Interdisciplinary Information Management Talks, Issue 47 Schriftenreihe Informatik, 2018, Page(s) 153-155
DOI: 10.5281/zenodo.2590949

UAV Cloud Platform for Precision Farming

Author(s): Miguel Pino, J. P. Matos-Carvalho, Dario Pedro, Luis M. Campos, Joao Costa Seco
Published in: 2020 12th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), 2020, Page(s) 1-6
DOI: 10.1109/csndsp49049.2020.9249551

Simultaneous Localization and Mapping in Millimeter Wave Networks with Angle Measurements

Author(s): Remun Koirala, Benoit Denis, Bernard Uguen, Davide Dardari, Henk Wymeersch
Published in: 2020 IEEE International Conference on Communications Workshops (ICC Workshops), 2020, Page(s) 1-6
DOI: 10.1109/iccworkshops49005.2020.9145046

Threat Modeling in the Railway Domain

Author(s): Christoph Schmittner, Peter Tummeltshammer, David Hofbauer, Abdelkader Magdy Shaaban, Michael Meidlinger, Markus Tauber, Arndt Bonitz, Reinhard Hametner, Manuela Brandstetter
Published in: Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification - Third International Conference, RSSRail 2019, Lille, France, June 4–6, 2019, Proceedings, Issue 11495, 2019, Page(s) 261-271
DOI: 10.1007/978-3-030-18744-6_17

Towards Runtime Monitoring for Malicious Behaviors Detection in Smart Ecosystems

Author(s): Emilia Cioroaica, Felicita Di Giandomenico, Thomas Kuhn, Francesca Lonetti, Eda Marchetti, Jasmin Jahic, Frank Schnicke
Published in: 2019 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2019, Page(s) 200-203
DOI: 10.1109/ISSREW.2019.00072

Direction Aided Multipath Channel Estimation for Millimeter Wave Systems

Author(s): Remun Koirala, Bernard Uguen, Davide Dardari, Henk Wymeersch, Benoit Denis
Published in: 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), 2021, Page(s) 1-6
DOI: 10.1109/vtc2021-spring51267.2021.9448770

A Context-Aware, Confidence-Disclosing and Fail-Operational Dynamic Risk Assessment Architecture

Author(s): Patrik Feth, Rasmus Adler, Daniel Schneider
Published in: 2018 14th European Dependable Computing Conference (EDCC), 2018, Page(s) 190-194
DOI: 10.1109/edcc.2018.00041

Towards a Resilient Society – Technology 5.0, Risks and Ethics

Author(s): Schoitsch Erwin
Published in: IDIMT 2020, Proceedings, Issue 49 Schriftenreihe Informatik, 2020, Page(s) pp. 403 - 412
DOI: 10.5281/zenodo.4000985

Localization and communication resource budgeting for multi-user mm-Wave MIMO

Author(s): Remun Koirala, Benoit Denis, Bernard Uguen, Davide Dardari, Henk Wymeersch
Published in: 2019 16th Workshop on Positioning, Navigation and Communications (WPNC), 2019, Page(s) 1-5
DOI: 10.1109/wpnc47567.2019.8970185

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based

Author(s): David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks
Published in: Proceedings 2019 Network and Distributed System Security Symposium, 2019
DOI: 10.14722/ndss.2019.23066

PHY Layer Security within V2X Communication

Author(s): Politechnika Gdańska\ Gdańsk University of Technology
Published in: 2020

Reachability Estimation in Dynamic Driving Scenes for Autonomous Vehicles

Author(s): Juan Felipe Medina-Lee, Antonio Artuñedo, Jorge Godoy, Jorge Villagra
Published in: 2020 IEEE Intelligent Vehicles Symposium, 2020

Interaction-aware risk assessment: focus on the lateral intention

Author(s): Jorge Villagra, Antonio Artunedo, Vinicius Trentin, Jorge Godoy
Published in: 2020 IEEE 3rd Connected and Automated Vehicles Symposium (CAVS), 2020

DAAIN: Detection of Anomalous and Adversarial Input using Normalizing Flows

Author(s): Samuel von Baußnern, Johannes Otterbach, Adrian Loy, Mathieu Salzmann, Thomas Wollmann
Published in: 2021, Page(s) 14

Framework for motion prediction of vehicles in a simulation environment

Author(s): Juan Felipe Medina Lee, Vinicius Trentin, Jorge Villagra
Published in: XL Jornadas de Automática: libro de actas (Ferrol, 4-6 de septiembre de 2019), 2020, Page(s) 520-527
DOI: 10.17979/spudc.9788497497169.520

A Process to Facilitate Automated Automotive Cybersecurity Testing

Author(s): Stefan Marksteiner, Nadja Marko, Andre Smulders, Stelios Karagiannis, Florian Stahl, Hayk Hamazaryan, Rupert Schlick, Stefan Kraxberger, Alexandr Vasenev
Published in: 2021

Short-Lived Forward-Secure Delegation for TLS

Author(s): Lukas Alber, Stefan More, Sebastian Ramacher
Published in: Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2020, Page(s) 119-132
DOI: 10.1145/3411495.3421362

FFAU—Framework for Fully Autonomous UAVs

Author(s): Dário Pedro, João P. Matos-Carvalho, Fábio Azevedo, Ricardo Sacoto-Martins, Luís Bernardo, Luís Campos, José M. Fonseca, André Mora
Published in: Remote Sensing, Issue 12/21, 2020, Page(s) 3533, ISSN 2072-4292
DOI: 10.3390/rs12213533

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange

Author(s): David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks
Published in: Journal of Cryptology, Issue 34/2, 2021, ISSN 0933-2790
DOI: 10.1007/s00145-021-09374-3

Real-Time Motion Planning Approach for Automated Driving in Urban Environments

Author(s): Antonio Artunedo, Jorge Villagra, Jorge Godoy
Published in: IEEE Access, Issue 7, 2019, Page(s) 180039-180053, ISSN 2169-3536
DOI: 10.1109/ACCESS.2019.2959432

A Grid-Based Framework for Collective Perception in Autonomous Vehicles

Author(s): Jorge Godoy, Víctor Jiménez, Antonio Artuñedo, Jorge Villagra
Published in: Sensors, Issue 21/3, 2021, Page(s) 744, ISSN 1424-8220
DOI: 10.3390/s21030744

Fully invisible protean signatures schemes

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: IET Information Security, Issue 14/3, 2020, Page(s) 266-285, ISSN 1751-8717
DOI: 10.1049/iet-ifs.2019.0141

An Optical Interference Suppression Scheme for TCSPC Flash LiDAR Imagers

Author(s): Lucio Carrara, Adrian Fiergolski
Published in: Applied Sciences, Issue 9/11, 2019, Page(s) 2206, ISSN 2076-3417
DOI: 10.3390/app9112206

Driver Behaviour Modeling With Vehicle Driving Simulator

Author(s): D. Michalik, O. Mihalik, M. Jirgl, P. Fiedler
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 180-185, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.753

Spectral Super-resolution and Band-limited Extrapolation Using Slepian Series

Author(s): O. Mihálik, D. Michalík, P. Jura, P. Fiedler
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 388-393, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.691

Using Matlab-based Driving Simulator for Human Factor Assessment

Author(s): M. Jirgl, P. Fiedler, Z. Bradac
Published in: IFAC-PapersOnLine, Issue 52/27, 2019, Page(s) 27-32, ISSN 2405-8963
DOI: 10.1016/j.ifacol.2019.12.727

Motion Planning Approach Considering Localization Uncertainty

Author(s): Antonio Artunedo, Jorge Villagra, Jorge Godoy, Maria Dolores del Castillo
Published in: IEEE Transactions on Vehicular Technology, Issue 69/6, 2020, Page(s) 5983-5994, ISSN 0018-9545
DOI: 10.1109/tvt.2020.2985546

Autonomous Environment Generator for UAV-Based Simulation

Author(s): Justin Nakama, Ricky Parada, João P. Matos-Carvalho, Fábio Azevedo, Dário Pedro, Luís Campos
Published in: Applied Sciences, Issue 11/5, 2021, Page(s) 2185, ISSN 2076-3417
DOI: 10.3390/app11052185

Machine Ethics

Author(s): Schoitsch Erwin
Published in: ERCIM News 122, Issue 122, July 2020, 2020, Page(s) 4-5, ISSN 0926-4981
DOI: 10.5281/zenodo.4000289

Updatable Signatures and Message Authentication Codes

Author(s): Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi
Published in: Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part I, Issue 12710, 2021, Page(s) 691-723
DOI: 10.1007/978-3-030-75245-3_25

Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment

Author(s): Dorottya Papp, Thorsten Tarrach, Levente Buttyán
Published in: Software Engineering and Formal Methods - 17th International Conference, SEFM 2019, Oslo, Norway, September 18–20, 2019, Proceedings, Issue 11724, 2019, Page(s) 491-509
DOI: 10.1007/978-3-030-30446-1_26

IFTTT Privacy Checker

Author(s): Federica Paci, Davide Bianchin, Elisa Quintarelli, Nicola Zannone
Published in: Emerging Technologies for Authorization and Authentication - Third International Workshop, ETAA 2020, Guildford, UK, September 18, 2020, Proceedings, Issue 12515, 2020, Page(s) 90-107
DOI: 10.1007/978-3-030-64455-0_6

Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach

Author(s): Nadja Marko, Alexandr Vasenev, Christoph Striecks
Published in: Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings, Issue 12235, 2020, Page(s) 36-53
DOI: 10.1007/978-3-030-55583-2_3

Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions

Author(s): David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig
Published in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, Issue 12238, 2020, Page(s) 427-447
DOI: 10.1007/978-3-030-57990-6_21

Structure-Preserving Signatures on Equivalence Classes from Standard Assumptions

Author(s): Mojtaba Khalili, Daniel Slamanig, Mohammad Dakhilalian
Published in: Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III, Issue 11923, 2019, Page(s) 63-93
DOI: 10.1007/978-3-030-34618-8_3

Efficient FPGA Implementations of LowMC and Picnic

Author(s): Daniel Kales, Sebastian Ramacher, Christian Rechberger, Roman Walch, Mario Werner
Published in: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Issue 12006, 2020, Page(s) 417-441
DOI: 10.1007/978-3-030-40186-3_18

Protean Signature Schemes

Author(s): Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
Published in: Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings, Issue 11124, 2018, Page(s) 256-276
DOI: 10.1007/978-3-030-00434-7_13

Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes

Author(s): David Derler, Kai Samelin, Daniel Slamanig
Published in: Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4–7, 2020, Proceedings, Part I, Issue 12110, 2020, Page(s) 462-492
DOI: 10.1007/978-3-030-45374-9_16

CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors

Author(s): Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, Issue 12491, 2020, Page(s) 159-190
DOI: 10.1007/978-3-030-64837-4_6

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing

Author(s): Behzad Abdolmaleki, Hamidreza Khoshakhlagh, Daniel Slamanig
Published in: Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Oxford, UK, December 16–18, 2019, Proceedings, Issue 11929, 2019, Page(s) 1-21
DOI: 10.1007/978-3-030-35199-1_1

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)

Author(s): Peter Chvojka, Tibor Jager, Daniel Slamanig, Christoph Striecks
Published in: Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II, Issue 12973, 2021, Page(s) 64-85
DOI: 10.1007/978-3-030-88428-4_4

Policy-Based Sanitizable Signatures

Author(s): Kai Samelin, Daniel Slamanig
Published in: Topics in Cryptology – CT-RSA 2020 - The Cryptographers’ Track at the RSA Conference 2020, San Francisco, CA, USA, February 24–28, 2020, Proceedings, Issue 12006, 2020, Page(s) 538-563
DOI: 10.1007/978-3-030-40186-3_23

Ongoing Cybersecurity and Safety Standardization Activities related to Highly Automated/Autonomous Vehicles

Author(s): Schoitsch Erwin; Schmittner Christoph
Published in: Advanced Microsystems for Automotive Applications (AMAA) 2020, Issue Intelligent System Solutions for Auto Mobility and Beyond, 2020, Page(s) 72 - 86
DOI: 10.5281/zenodo.4116058

ColANet: A UAV Collision Avoidance Dataset

Author(s): Dário Pedro, André Mora, João Carvalho, Fábio Azevedo, José Fonseca
Published in: Technological Innovation for Life Improvement - 11th IFIP WG 5.5/SOCOLNET Advanced Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2020, Costa de Caparica, Portugal, July 1–3, 2020, Proceedings, Issue 577, 2020, Page(s) 53-62
DOI: 10.1007/978-3-030-45124-0_5

Intelligent Technologies for Internet of Vehicles

Author(s): Reiner John, Patrick Pype, Gerardo Daalderop, Meghashyam Ashwathnarayan, Roy Bahr, Tore Karlsen, Hans-Erik Sand
Published in: Internet of Vehicles – System of Systems Distributed Intelligence for Mobility Applications, 2021
DOI: 10.1007/978-3-030-76493-7

Localization and Throughput Trade-Off in a Multi-User Multi-Carrier mm-Wave System

Author(s): Remun Koirala, Benoit Denis, Bernard Uguen, Davide Dardari, Henk Wymeersch
Published in: IEEE Access, Issue 7, 2019, Page(s) 167099-167112, ISSN 2169-3536
DOI: 10.1109/access.2019.2953777

On the Physical Layer Security Characteristics for MIMO-SVD Techniques for SC-FDE Schemes

Author(s): João Madeira, João Guerreiro, Rui Dinis, Paulo Montezuma, Luís Miguel Campos
Published in: Sensors, Issue 19/21, 2019, Page(s) 4757, ISSN 1424-8220
DOI: 10.3390/s19214757

A 145GHz FMCW-Radar Transceiver in 28nm CMOS

Author(s): Akshay Visweswaran, Kristof Vaesen, Siddhartha Sinha, Ilja Ocket, Miguel Glassee, Claude Desset, Andre Bourdoux, Piet Wambacq
Published in: International Solid-State Circuits Conference (ISSCC), 2019

Medizinische Sensorik – Innovative Anwendung in Automobilen

Author(s): Michael Wiehl, Jana Viehbeck
Published in: meditronic journal, Issue 3/2018, 2018, Page(s) 14-16