WP3 – Vulnerabilities Management
Coordinated by
GRAD (M01-M30)
Objective
This work package has the following objectives:
- Analyze the state of the art to incorporate the latest advances in detection, forecasting and propagation of vulnerabilities
- Compile a representative dataset of software vulnerabilities, taking into account the data provided by BIECO’s use cases as well as from other public sources, and select the most representative features for an effective vulnerability detection process.
- Provide advanced tools to detect and forecast accurately vulnerabilities in ICT systems and components.
- Provide an advanced tool to analyze the propagation of vulnerabilities across the ICT supply chain.
Deliverables
- D3.1 Report on the state of the art of vulnerability management WP3 (5 – GRADIANT) Report Public M6
- D3.2 Dataset with software vulnerabilities WP3 (4 – UTC) Other Confidential, only for members of the consortium (including the Commission Services) M12
- D3.3 Report of the tools for vulnerability detection and forecasting WP3 (5 – GRADIANT) Report Public M18
- D3.4 Report of the tools for vulnerabilities propagation WP3 (5 – GRADIANT) Report Public M21
- D3.5 Updated Report of the tools for vulnerability detection and forecasting WP3 (5 – GRADIANT) Report Public M30
- D3.6 Updated Report of the tools for vulnerabilities propagation WP3 (5 – GRADIANT) Report Public M30
Outcomes
Defining the behavior of IoT devices through the MUD standard: review, challenges and research directions
Authors: José L. Hernández Ramos, Sara N. Matheu, Angelo Feraudo, Gianmarco Baldini, Jorge Bernal Bernabe, Poonam Yadav, Antonio Skarmeta and Paolo Bellavista
BIECO Workshop – 2nd Day
M12 Workshop - day twoAgenda - Second day (08.09.2021) 09:00 – 09:05 Meeting Opening Review previous day agreements UNI/HS09:05 – 09:35 Video presentation - UTC09:35 – 11:00 BIECO Platform demo Common Platform Discussion: Design and Runtime Phase Tools’ Interaction...
The Challenges of Software Cybersecurity Certification
Authors: José L. Hernández-Ramos, Sara N. Matheu and Antonio Skarmeta
Basic aspects in redundancy-based intrusion tolerance
Authors: Felicita Di Giandomenico, Giulio Masetti (both ISTI-CNR Pisa)
A Survey on the State of the Art of Vulnerability Assessment Techniques
Authors: Eva Sotos Martínez, Nora M. Villanueva ,Lilian Adkinson Orellana
Data Based Message Validation as a Security Cornerstone in Loose Coupling Software Architecture
Authors: Oliviu Matei, Rudolf Erdei, Daniela Delinschi, Laura Andreica