Coordinatore | SIEMENS AKTIENGESELLSCHAFT
Organization address
address: Wittelsbacherplatz 2 contact info |
Nazionalità Coordinatore | Germany [DE] |
Totale costo | 5˙281˙619 € |
EC contributo | 3˙426˙387 € |
Programma | FP7-SECURITY
Specific Programme "Cooperation": Security |
Code Call | FP7-SEC-2011-1 |
Funding Scheme | CP-FP |
Anno di inizio | 2012 |
Periodo (anno-mese-giorno) | 2012-05-01 - 2015-08-31 |
# | ||||
---|---|---|---|---|
1 |
SIEMENS AKTIENGESELLSCHAFT
Organization address
address: Wittelsbacherplatz 2 contact info |
DE (MUNCHEN) | coordinator | 676˙757.79 |
2 |
CHALMERS TEKNISKA HOEGSKOLA AB
Organization address
address: - contact info |
SE (GOETEBORG) | participant | 594˙445.22 |
3 |
UNIVERSITEIT TWENTE
Organization address
address: DRIENERLOLAAN 5 contact info |
NL (ENSCHEDE) | participant | 552˙534.22 |
4 |
SECURITY MATTERS BV
Organization address
address: MIRASTRAAT 93 contact info |
NL (ENSCHEDE) | participant | 446˙193.28 |
5 |
EURECOM
Organization address
address: ROUTE DES CRETES - SOPHIA ANTIPOLIS 2229 contact info |
FR (VALBONNE) | participant | 426˙927.65 |
6 |
LIANDER NV
Organization address
address: UTRECHTSEWEG 68 contact info |
NL (ARNHEM) | participant | 238˙740.00 |
7 |
SYMANTEC (FRANCE)
Organization address
address: 17 AVENUE DE L'ARCHE contact info |
FR (COURBEVOIE) | participant | 228˙313.63 |
8 |
Enel Ingegneria e Innovazione SpA
Organization address
address: Viale Regina Margherita 125 contact info |
IT (Rome) | participant | 161˙116.00 |
9 |
UNIVERSITAET ULM
Organization address
address: HELMHOLTZSTRASSE 16 contact info |
DE (ULM) | participant | 101˙360.00 |
10 |
SYMANTEC LIMITED
Organization address
address: "Barrow street, South Bank House 6th floor" contact info |
IE (DUBLIN 4) | participant | 0.00 |
Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.
'The CRISALIS project aims at providing new means to secure critical infrastructure environments from targeted attacks, carried out by resourceful and motivated individuals. The recent discovery of a malware called Stuxnet, show that these threats are already a reality. Their success in infiltrating Critical Infrastructure environments is calling attention on the ineffectiveness of standard security mechanisms at detecting them. Stuxnet is believed to have been operating undetected for almost one year leveraging multiple vulnerabilities that were previously unknown, and has been discovered only as a consequence to an operational anomaly that triggered the attention of the field operators. This fact clearly shows that our methods to find vulnerabilities and detect ongoing or successful attacks in critical infrastructure environments are not sufficient.
CRISALIS focuses on these two aspects: detection of vulnerabilities and attacks in critical infrastructure environments. We focus on two different, yet interlinked, use cases that are typical for the power grid infrastructure: control systems based on SCADA protocols and the Advanced Metering Infrastructure. CRISALIS leverages the unique characteristics of critical infrastructure environments to produce novel practical mechanisms and techniques for their security assessment and protection. This is achieved by pursuing three main research objectives: (i) providing new methodologies and techniques to secure critical infrastructure systems; (ii) providing new tools to detect intrusions; (iii) developing new, more effective, techniques to analyze infected systems. Particular attention is paid to ensure the practical implementation of these techniques in real-world environments, and to minimize the impact on operations, goals which are attainable thanks to the direct involvement in the process of end users and device manufacturers who provide expertise and realistic test environments to validate the proposed methodologies.'