WP3 – Vulnerabilities Management

 Coordinated by
GRAD (M01-M30)

Objective

This work package has the following objectives:

  1. Analyze the state of the art to incorporate the latest advances in detection, forecasting and propagation of vulnerabilities
  2. Compile a representative dataset of software vulnerabilities, taking into account the data provided by BIECO’s use cases as well as from other public sources, and select the most representative features for an effective vulnerability detection process.
  3. Provide advanced tools to detect and forecast accurately vulnerabilities in ICT systems and components.
  4. Provide an advanced tool to analyze the propagation of vulnerabilities across the ICT supply chain.

Deliverables

Outcomes

BIECO Project – Methodology for Security Evaluation

BIECO Project – Methodology for Security Evaluation

We happily announce that BIECO has been presented at @YavaConf 2022!  The session entitled "BIECO Project - Methodology for Security Evaluation" has been presented on Tuesday - September 27th, by Marcin Byra, @7bulls.com. The presentation is available here....

WP3 Monthly meeting July 2022

WP3 Monthly meeting July 2022

After the face-to-face meeting of BIECO in June in Lisbon, where useful ideas for the correct development of the tools have been clarified and secured, the regular WP3 monthly meetings have been taken up. In the July meeting, the evolution of the different detection,...

 BIECO first F2F meeting 

 BIECO first F2F meeting 

  BIECO Progress Meeting Agenda  7-9th June 2022, 09:00- 17:00 WET  Location: UNINOVA – Building 1 – Campus da FCT-UNL, Quinta da Torre, 2829-516 Caparica  Meeting Objectives:  1. Analysing the Review Meeting 2. Align the view of the...

GROOT: GdpR-based cOmbinatOrial Testing strategy (BIECO Version)

GROOT: GdpR-based cOmbinatOrial Testing strategy (BIECO Version)

Short description In this video, the CNR presents GROOT, a generic combinatorial testing methodology specifically conceived for assessing compliance with the GDPR and its contextualization in the context of the access control domain, considering the peculiarity of the...

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This