VESSEDIA naturally builds on results from other EU and national projects in which VESSEDIA partners were actively involved. The project is engaged in various cooperation activities with those projects and also VESSEDIA project results might be useful for them in a later stage. A more detailed overview of these projects is given below:

Related Projects

Expand all | Collapse all
 

expandCOSSIM (H2020-ICT-01-2014; 02/2015 - 01/2018)
      One of the main problems the CPS designers face is “the lack of simulation tools and models for system design and analysis”. This is mainly because the majority of the existing simulation tools for complex CPS handle efficiently only parts of a system (e.g. only the processing nodes or only the network) while they mainly focus on the performance. Moreover, they require extreme amounts of processing resources and computation time to accurately simulate the CPS nodes’ processing. Faster approaches are available, however as they function at high levels of abstraction, they cannot provide the accuracy required to model the exact behavior of the system under design so as to guarantee that it meets the requirements in terms of performance and/or energy consumption.

[Homepage]

expandEURO-MILS (FP7-ICT-2011-8; 10/2012 - 03/2016)
      The mission of the EURO-MILS project is to develop a solution for virtualisation of heterogeneous resources and provide strong guarantees for isolation of resources by means of Common Criteria certification with usage of formal methods.

[Homepage]

expandLabOSSec
    LabOSSec aims at studying the usage of static tools for software security and elaborating a standard to certify static tools and their configuration throughout their responses on flaws or vulnerabilities test cases.
expandnShield (ARTEMIS-JU Call 2010269317; 2011 - 2014)
      nSHIELD is a project co-funded by the ARTEMIS JOINT UNDERTAKING (Sub-programme SP6) focused on the research of SPD (Security, Privacy, Dependability) in the context of Embedded Systems.The nSHIELD project is, at the same time, a complement and significant technology breakthrough of pSHIELD, a pilot project funded in ARTEMIS Call 2009 as the first investigation towards the realization of the SHIELD Architectural Framework for Security, Privacy and Dependability (SPD). The roadmap, already started in the pilot project, will bring to address SPD in the context of Embedded Systems (ESs) as “built in” rather than as “add-on” functionalities, proposing and perceiving with this strategy the first step toward SPD certification for future ES.

[Homepage]

expandOpenTC (FP6; 2005 - 2009)
      The goal of OpenTC is to reduce system-related threats, errors and malfunctions. The lack of platform security in today's computers has given rise to waves of successful attacks, resulting in severe damages to enterprises and potential failure of critical infrastructures.

[Homepage]

expandSAFURE (H2020-ICT-2014-1; 02/2015 - 01/2018)
      The project SAFURE targets the design of cyber-physical systems by implementing a methodology that ensures safety and security "by construction". This methodology is enabled by a framework developed to extend system capabilities so as to control the concurrent effects of security threats on the system behaviour.

[Homepage]

expandSecFutur (FP7-ICT-256668; 2010 - 2013)
      The aim of SecFutur is to develop and establish a security engineering process for embedded systems, providing a set of implemented resource-efficient security building blocks, each addressing a specific complex non-functional requirement. The project will also provide a security engineering framework that supports the developers in integrating these building blocks into the overall engineering process.

[Homepage]

expandSTANCE (FP7-ICT-2011-8; 10/2012 - 09/2015)
      STANCE proposed to build on existing assets: formal methods, state-of-the-art static and dynamic program analysis tools, security evaluation expertise, and industry-specific knowledge will be used and significantly extended.

[Homepage]

expandU3CAT (2008 ARPEGE program)
      The main aim of the project is to provide embedded software developers with adequate tools allowing them to precisely state the properties that their application must meet and to statically verify that their implementation really respect them.

[Homepage]

expandCHARIOT (H2020-IOT-2017; 01/2018-12/2020)

CHARIOT will advance state of the art by providing a design method and cognitive computing platform supporting a unified approach towards Privacy, Security and Safety (PSS) of IoT Systems, that places devices and hardware at the root of trust, in turn contributing to high security and integrity of industrial IoT. More specifically, for each of the PSS ‘imperatives’, a highly innovative approach is proposed as follows:

  • A Privacy and Security Protection method building on concepts from state-of-the-art Public Key Infrastructure (PKI) technologies, to enable the coupling of a pre-programmed private key deployed to IoT devices with a corresponding private key on Blockchain system for the purposes of affirming and approving valid transactions.

  • A Blockchain ledger in which categories of IoT physical, operational and functional changes are both recorded and affirmed/approved through a combination of coupling a cognitive engine and private key hashing between the cognitive engine and IoT devices to authorise change and, likewise, invalidating any and all other changes whether malicious or otherwise. Such a ledger provides a compelling journal and audit log from which, through machine learning, past patterns can be used as a basis to highlight present anomalies and inconsistencies and, in turn, halting execution in situations where transactions and workflows deviate from established patterns of behaviour.

  • A fog-based decentralised infrastructure for Firmware and Operational Security integrity checking that leverages a Blockchain ledger to enhance physical, operational and functional security of IoT systems, such as actuation, deactivation, transactions of all types including business process workflows and their associated business logic.

  • An accompanying IoT Safety Supervision Engine providing a novel solution to the challenges of securing IoT data, devices and functionality for new and existing industry-specific safety critical systems.

  • A Cognitive System and Method with accompanying supervision, analytics and prediction models that encapsulates these latter capabilities, with the end goal of high fidelity security and integrity of Industrial IoT.

  • New methods and tools for static code analysis of IoT devices, resulting in more efficient secure and safer IoT software development and V&V..

[Homepage]

expandDECODER (H2020-ICT-2018-2; 01/2019-12/2021)
      DECODER builds an Integrated Development Environment (IDE) that combines information from different sources through formal and semi-formal models to deliver software project intelligence to shorten the learning curve of software programmers and maintainers and increase their productivity. Developers will deliver high quality code that are more secure and better aligned with requirements and maintainers will immediately know what has been done, how and with what tools.

[Homepage]

expandTRUSSEC (H2020-DS-LEIT-2016; 01/2017-12/2018)
      The current complexity of ICT products and services makes it difficult to appraise their trustworthiness. Thus, certification becomes a must to restore transparency and trust. TRUESSEC.EU aims at exploring the situation, the barriers, and the benefits of security and privacy labels; engaging stakeholders in the discussions, and issuing recommendations that may foster the adoption and acceptance of labels.

[Homepage]