WP3 – Vulnerabilities Management
Coordinated by
GRAD (M01-M30)
Objective
This work package has the following objectives:
- Analyze the state of the art to incorporate the latest advances in detection, forecasting and propagation of vulnerabilities
- Compile a representative dataset of software vulnerabilities, taking into account the data provided by BIECO’s use cases as well as from other public sources, and select the most representative features for an effective vulnerability detection process.
- Provide advanced tools to detect and forecast accurately vulnerabilities in ICT systems and components.
- Provide an advanced tool to analyze the propagation of vulnerabilities across the ICT supply chain.
Deliverables
- D3.1 Report on the state of the art of vulnerability management WP3 (5 – GRADIANT) Report Public M6
- D3.2 Dataset with software vulnerabilities WP3 (4 – UTC) Other Confidential, only for members of the consortium (including the Commission Services) M12
- D3.3 Report of the tools for vulnerability detection and forecasting WP3 (5 – GRADIANT) Report Public M18
- D3.4 Report of the tools for vulnerabilities propagation WP3 (5 – GRADIANT) Report Public M21
- D3.5 Updated Report of the tools for vulnerability detection and forecasting WP3 (5 – GRADIANT) Report Public M30
- D3.6 Updated Report of the tools for vulnerabilities propagation WP3 (5 – GRADIANT) Report Public M30
Outcomes
Monthly Wp3 meeting
BIECO WP3On November the 30th, it was taken the monthly Wp3 meeting. On it, it was updated the latest progress as well as future actions, and all WP3 members were coordinated in order to achieve the programmed objective.These advances were centered on both tasks T3.3...
WP7 monthly meeting M15
The 29th November took place the WP7 monthly meeting. As part of T7.3 we tried to instantiate and coordinate the different steps of the security evaluation methodology being developed in T7.2.
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems
The BIECO Conceptual Framework Towards Security and Trust in ICT Ecosystems Authors: Ricardo Peres, Lilian Adkinson, Emilia Cioroaica, Eda Marchetti, Enrico Schiavone, Sara Matheu, Ovidiu Cosma, Radoslaw Piliszek, Jose Barata Document type: Publication in Conference...
25th Nov – ICT Gateway
In the meeting on the 25th of November, we have defined templates for specifying vertical abstractions of components interacting with the ICT Gateway. When fed with real-time data, these abstractions become digital twins that are predictively evaluated in a simulation...
A MDE Tool for Security Risk Assessment of Enterprises
A MDE Tool for Security Risk Assessment of Enterprises Authors: Enrico Schiavone, Nicola Nostro, Francesco Brancati Document type: Publication in Conference proceedings Publication: INDUSTRY TRACK - LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 10. , 2021,...
WP2 activities November
During November, WP2 partners have been refining the representations of data flows and component structures of the BIECO framework, which will be some of the core elements included in Deliverable 2.4. Even in the remote setting, interesting discussions have been...