Explore the words cloud of the SHARCS project. It provides you a very rough idea of what is the project "SHARCS" about.
The following table provides information about the project.
Coordinator |
IDRYMA TECHNOLOGIAS KAI EREVNAS
Organization address contact info |
Coordinator Country | Greece [EL] |
Project website | http://sharcs-project.eu |
Total cost | 3˙105˙762 € |
EC max contribution | 3˙105˙762 € (100%) |
Programme |
1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT)) |
Code Call | H2020-ICT-2014-1 |
Funding Scheme | RIA |
Starting year | 2015 |
Duration (year-month-day) | from 2015-01-01 to 2017-12-31 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | IDRYMA TECHNOLOGIAS KAI EREVNAS | EL (IRAKLEIO) | coordinator | 384˙375.00 |
2 | IBM ISRAEL - SCIENCE AND TECHNOLOGY LTD | IL (PETACH TIKVA) | participant | 545˙000.00 |
3 | ONAPP LIMITED | GI (GIBRALTAR) | participant | 443˙750.00 |
4 | STICHTING VU | NL (AMSTERDAM) | participant | 413˙125.00 |
5 | CHALMERS TEKNISKA HOEGSKOLA AB | SE (GOETEBORG) | participant | 361˙512.00 |
6 | NEURASMUS BV | NL (ROTTERDAM) | participant | 342˙375.00 |
7 | ELEKTROBIT AUTOMOTIVE GMBH | DE (ERLANGEN) | participant | 321˙250.00 |
8 | TECHNISCHE UNIVERSITAET BRAUNSCHWEIG | DE (BRAUNSCHWEIG) | participant | 294˙375.00 |
Developing new security paradigms, architectures, and software, for more secure and trustworthy ICT systems and services has clear social, scientific, and market motivation. This motivation is becoming stronger due to the changing threat landscape; over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet. We believe that to advance the field of cybersecurity, we must act proactively and in synergy, instead of being reactive to cyberattacks.
We propose SHARCS, a framework for designing, building and demonstrating secure-by-design applications and services, that achieve end-to-end security for their users. SHARCS will achieve this by systematically analyzing and extending, as necessary, the hardware and software layers in a computing system. This holistic approach is necessary, as no system can truly be secure unless every layer is secured, starting from the lowest one. We will measure the effectiveness of the SHARCS framework by using it on a diverse set of security-critical, real-word applications. The applications have been chosen from three different domains, medical, cloud and automotive, to demonstrate the platform independence capabilities of SHARCS. SHARCS will provide a powerful foundation for designing and developing trustworthy, secure-by-design applications and services for the Future Internet.
Specification and guidelines for security-by-design | Documents, reports | 2019-05-31 12:42:53 |
Dissemination report, year 2 | Documents, reports | 2019-05-31 12:42:51 |
Dissemination report, year 1 | Documents, reports | 2019-05-31 12:42:52 |
Design specification of the SHARCS runtime system, software tools and reporting | Documents, reports | 2019-05-31 12:42:45 |
Website and collaboration tools | Demonstrators, pilots, prototypes | 2019-05-31 12:42:57 |
Final implementation of the SHARCS runtime system, software tools and reporting | Documents, reports | 2019-05-31 12:42:55 |
Dissemination report, year 3 | Documents, reports | 2019-05-31 12:42:58 |
Recommendations report for security-by-design | Documents, reports | 2019-05-31 12:42:55 |
Applications and framework requirements for secure-by-design systems | Documents, reports | 2019-05-31 12:42:51 |
Final implementation of the SHARCS hardware techniques | Documents, reports | 2019-05-31 12:42:56 |
Requirements of the SHARCS runtime system, software tools and reporting | Documents, reports | 2019-05-31 12:42:44 |
Design specification of the SHARCS hardware techniques | Documents, reports | 2019-05-31 12:43:04 |
SHARCS System architectures and requirements | Documents, reports | 2019-05-31 12:42:47 |
Take a look to the deliverables list in detail: detailed list of SHARCS deliverables.
year | authors and title | journal | last update |
---|---|---|---|
2016 |
A. Oikonomopoulos, E. Athanasopoulos, H. Bos, C. Giuffrida Poking Holes in Information Hiding published pages: , ISSN: , DOI: |
USENIX Security Symposium | 2019-05-30 |
2017 |
Pawlowski, M. Contag, V. van der Veen, C. Ouwehand, T. Holz, H. Bos, E. Athanasopoulos, C. Giuffrida MARX: Uncovering Class Hierarchies in C++ Programs published pages: , ISSN: , DOI: |
NDSS Symposium 2017 | 2019-05-30 |
2017 |
Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Box, Cristiano Giuffrida ASLR on the Line: Practical Cache Attacks on the MMU published pages: , ISSN: , DOI: |
NDSS Symposium 2017 | 2019-05-30 |
2016 |
Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin
Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano
Giuffrida, Herbert Bos Bypassing clang’s SafeStack for Fun and Profit. published pages: , ISSN: , DOI: |
Black Hat Europe, 2016 | 2019-05-30 |
2017 |
S. Rawat, V. Jain, A. Kumar, L. Cojocar, C. Giuffrida, H. Bos VUzzer: Application-aware Evolutionary Fuzzing published pages: , ISSN: , DOI: |
NDSS 2017 | 2019-05-30 |
2016 |
Razavi, Kaveh, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos. Flip Feng Shui: Hammering a Needle in the Software Stack. published pages: 1-18, ISSN: , DOI: |
USENIX Security Symposium | 2019-05-30 |
2016 |
K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida, H. Bos Flip Feng Shui Rowhammering the VM’s Isolation published pages: , ISSN: , DOI: |
Black Hat Europe 2016 | 2019-05-30 |
2016 |
Christos Strydis Uw hartslag als wachtwoord. published pages: , ISSN: , DOI: |
Monitor | 2019-05-30 |
2016 |
Vassilis Prevelakis and Mohammad Hamad Controlling Change via Policy Contracts. published pages: , ISSN: , DOI: |
Proceedings of the Internet of Things Software Update Workshop (IoTSU) | 2019-05-30 |
2016 |
Goktas, R. Gawlik, B. Kollenda, E. Athanasopoulos, G. Portokalidis, C. Giuffrida, H. Bos Undermining Information Hiding (And What to do About it). published pages: , ISSN: , DOI: |
USENIX Security Symposium | 2019-05-30 |
2016 |
Robert M. Seepers, Wenjin Wang, Gerard de Haan, Ioannis Sourdis, Christos Strydis Attacks on Heartbeat-Based Security Using Remote Photoplethysmography published pages: 1-1, ISSN: 2168-2194, DOI: 10.1109/JBHI.2017.2691282 |
IEEE Journal of Biomedical and Health Informatics | 2019-05-30 |
2015 |
Elias Athanasopoulos, Martin Boehner, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, John Thomson Increasing the Trustworthiness of Embedded Applications. published pages: 321-322, ISSN: , DOI: |
In Proceedings of the 8th International Conference on Trust & Trustworthy Computing | 2019-05-30 |
2016 |
Angelos Oikonomopoulos, Cristiano Giuffrida, Sanjay Rawat, Herbert Bos Binary Rejuvenation: Applications and Challenges published pages: 68-71, ISSN: 1540-7993, DOI: 10.1109/MSP.2016.20 |
IEEE Security & Privacy 14/1 | 2019-05-30 |
2017 |
A. Milburn, H. Bos, C. Giuffrida SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities published pages: , ISSN: , DOI: |
NDSS Symposium 2017 | 2019-05-30 |
2016 |
Robert Seepers, Christos Strydis, Ioannis Sourdis, Chris De Zeeuw Enhancing Heart-Beat-Based Security for mHealth Applications published pages: 1-1, ISSN: 2168-2194, DOI: 10.1109/JBHI.2015.2496151 |
IEEE Journal of Biomedical and Health Informatics | 2019-05-30 |
2016 |
Koen Koning, Herbert Bos, Cristiano Giuffrida Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization. published pages: , ISSN: , DOI: |
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks | 2019-05-30 |
2015 |
Christos Strydis Using heartbeats to secure pacemaker communication. published pages: , ISSN: , DOI: |
2019-05-30 | |
2016 |
D. Andriesse, X. Chen, V. van der Veen, A. Slowinska, H. Bos An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries published pages: , ISSN: , DOI: |
USENIX Security Symbosium | 2019-05-30 |
2016 |
E. Bosman, K. Razavi, H. Bos, C. Giuffrida Over the Edge: Silently Owning Windows 10\'s Secure Browser published pages: , ISSN: , DOI: |
Black Hat USA, 2016 | 2019-05-30 |
2015 |
Vassilis Prevelakis EU-funded research to create secure-by-design architectures. published pages: 11, ISSN: , DOI: |
HiPEAC Info Newsletter, vol. 42 | 2019-05-30 |
2016 |
Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, and Cristiano Giuffrida. A Tough call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. published pages: , ISSN: , DOI: |
Proceeding of the 37th IEEE Symposium on Security and Privacy | 2019-05-30 |
2016 |
Marcel Caria Cyber-Physical Systems: Closing the Gap between Hardware and Software published pages: , ISSN: , DOI: |
ERCIM News No. 106 | 2019-05-30 |
2016 |
Eirini Degkleri, Antonios A. Chariton, Panagiotis Ilia, Panagiotis Papadopoulos, Evangelos P. Markatos Leveraging DNS for timely SSL Certificate Revocation. published pages: , ISSN: , DOI: |
3rd ACM-W Europe Celebration of Women in Computing | 2019-05-30 |
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SHARCS" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "SHARCS" are provided by the European Opendata Portal: CORDIS opendata.