Vulnerabilities Forecasting Tool
Coordinated by
UTC
The Vulnerabilities Forecasting Tool (VFT) provides historical vulnerability data and projections for time intervals of 1, 2, 3, 6, and 12 months for several major software components. Based on historical vulnerability data and future predictions, designers can make informed decisions regarding the selection of the system’s underlying components, optimizing for both functionality and security. The frequency of discovered vulnerabilities also serves as an indicator of the level of attention that should be paid to periodic updates and patches.
Description
Describe the innovation content of the result:
VFT uses advanced algorithms to predict the expected number of vulnerabilities that will be discovered within specific timeframes. It focuses on forecasting vulnerabilities across various software products, specifically targeting operating systems, database management servers, and web servers. It provides valuable information on potential security flaws that may occur in these categories of software. The tool’s accurate predictions help proactively manage risk, allowing organizations to allocate appropriate resources and prioritize their security efforts effectively.
Who will be the customer?
Software developers, IT security teams, system administrators, risk management professionals and security auditors/consultants
What benefit will it bring to the customers?
It enables proactive risk management, resource optimization, improved security measures, informed decision-making and improved compliance and audit processes.
When is the expected date of achievement in the project (Mth/yr)?
Month 30.
When is the time to market (Mth/yr)?
At the end of the project.
What are the costs to be incurred after the project and before exploitation?
Hosting costs and probably further developments and maintenance.
What is the approximate price range of this result/price of licences?
The usage of the product is free of charge.
What are the market size in Millions € for this result and relevant trend?
N/A
How will this result rank against competing products in terms of price/performance?
To our best knowledge, there is no similar product on the market.
Who are the competitors for this result?
No known competitors.
How fast and in what ways will the competition respond to this result?
Unknown at the moment.
Who are the partners involved in the result?
UTC
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
ICT GW, 7Bulls, IFEVS
Have you protected or will you protect this result? How? When?
VFT was presented at CISIS-ICEUTE 2022. The extended contribution was submitted to Logic Journal of the IGPL.
Other results
Security Testing Tool
GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).
Domain Specific Language
The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment
Fail-operation clock synchronization methodology
Synchronization loss can occur due to many reasons, either because of a device or link failure or due to a targeted attack on the reference node, which supplies the corrected time to the network’s nodes.
Time sensitive network simulation
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Remote updating- upgrading of vehicle firmware
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector.
Extension of the approach to the communications within the whole supply chain of the Microfactory
Once the secure communication with a vehicle has been demonstrated for remote FW update, it is straightforward to extend it to a general Service-Over-the-Air architecture and even further.