WP4 – Development of Resilient Systems
Coordinated by
IESE (M01-M36)
Objective
In this WP, tools and methods will be developed for supporting creation of resilient systems w.r.t security attacks and vulnerabilities. The scope is to develop systems that can cope with behavior disturbances caused by malicious attacks, that manifest into a loss of control and can bring a system into hazardous situations. A resilient system shall be able to compensate for interruptions and get back into a safe state in case of emergency situations caused by malicious attacks. In this regard the system shall be able to autonomously and automatically construct awareness of its security in a dynamic environment, to recognize critical situations and to identify the right operational mode for remaining into a secure and trusted operational state.
Concretely, this work package has the following objectives:
- To develop methods and tools that enable runtime evaluation of system operational state in dynamic environments.
- To enhance existing tools that can predict failure propagation caused by malicious attacks and support the transition of an ICT system into a resilient state. Prediction is performed in a simulated environment by counteracting the capabilities of the system under evaluation to detect that it is under evaluation.
- To develop methods that during runtime bring a system into a safe, trusted state, making it resilient to malicious attacks.
Deliverables
- D4.1 Report on Self-checking of vulnerabilities and failures WP4 (7 – RESILTECH) Report Confidential, only for members of the consortium (including the Commission Services) M30
- D4.2 Report on methods and tools for the failure prediction WP4 (2 – Fraunhofer) Report Confidential, only for members of the consortium (including the Commission Services) M24
- D4.3 Report on Method development for resilient systems WP4 (2 – Fraunhofer) Report Confidential, only for members of the consortium (including the Commission Services) M30
Outcomes
BIECO Project – Methodology for Security Evaluation
We happily announce that BIECO has been presented at @YavaConf 2022! The session entitled "BIECO Project - Methodology for Security Evaluation" has been presented on Tuesday - September 27th, by Marcin Byra, @7bulls.com. The presentation is available here....
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond – Video
Dis you miss the opportunity to attend to the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+)? Don't worry! You can still see the video that D. Sara Matheu presented about the BIECO work performed within WP6. Abstract: While the...
WP3 Monthly meeting July 2022
After the face-to-face meeting of BIECO in June in Lisbon, where useful ideas for the correct development of the tools have been clarified and secured, the regular WP3 monthly meetings have been taken up. In the July meeting, the evolution of the different detection,...
2nd Workshop on Accountability, Liability and Trust for 5G and Beyond
1st International Conference on 6G Networking BIECO participates this Friday 8th july in the 2nd Workshop on Accountability, Liability, and Trust for 5G and Beyond (WALT5G+). This conference provides an interdisciplinary forum to exchange innovative research ideas,...
BIECO first F2F meeting
BIECO Progress Meeting Agenda 7-9th June 2022, 09:00- 17:00 WET Location: UNINOVA – Building 1 – Campus da FCT-UNL, Quinta da Torre, 2829-516 Caparica Meeting Objectives: 1. Analysing the Review Meeting 2. Align the view of the...
GROOT: GdpR-based cOmbinatOrial Testing strategy (BIECO Version)
Short description In this video, the CNR presents GROOT, a generic combinatorial testing methodology specifically conceived for assessing compliance with the GDPR and its contextualization in the context of the access control domain, considering the peculiarity of the...