Opendata, web and dolomites

PROTASIS SIGNED

Restoring Trust in the cyber space: a Systems Security Proposal

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

 PROTASIS project word cloud

Explore the words cloud of the PROTASIS project. It provides you a very rough idea of what is the project "PROTASIS" about.

gather    collaborations    valuable    trust    incidents    individual    created    eroding    worry    supporting    fragmented    terrorist    economy    trustworthiness    society    collaborative    efficient    scientific    software    defenses    input    resource    team    collaborate    hoc    few    publications    governments    businesses    boost    specializes    class    exploits    plan    publish    people    ideally    universities    exchange    detect    places    limited    revelations    string    code    itself    ideas    community    profile    attacks    surveillance    vulnerabilities    site    malware    provides    constrained    centers    institutes    cyber    links    nation    researcher    reuse    american    viability    security    industry    protecting    world    citizens    ad    lacking    tremendous    flow    expertise    efforts    corporate    counterparts    unfortunately    groups    ict    digital    spend    unprecedented    fueled    infrastructures    techniques    repository    rising    nevertheless    prestigious    shows    exfiltration    joins    time    list    temporarily    secure    group    venues   

Project "PROTASIS" data sheet

The following table provides information about the project.

Coordinator
IDRYMA TECHNOLOGIAS KAI EREVNAS 

Organization address
address: N PLASTIRA STR 100
city: IRAKLEIO
postcode: 70013
website: www.forth.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website http://www.protasis.eu/
 Total cost 702˙000 €
 EC max contribution 702˙000 € (100%)
 Programme 1. H2020-EU.1.3.3. (Stimulating innovation by means of cross-fertilisation of knowledge)
 Code Call H2020-MSCA-RISE-2015
 Funding Scheme MSCA-RISE
 Starting year 2016
 Duration (year-month-day) from 2016-05-01   to  2020-04-30

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    IDRYMA TECHNOLOGIAS KAI EREVNAS EL (IRAKLEIO) coordinator 211˙500.00
2    STICHTING VU NL (AMSTERDAM) participant 157˙500.00
3    RUHR-UNIVERSITAET BOCHUM DE (BOCHUM) participant 153˙000.00
4    POLITECNICO DI MILANO IT (MILANO) participant 135˙000.00
5    F-SECURE OYJ FI (HELSINKI) participant 27˙000.00
6    TELEFONICA INVESTIGACION Y DESARROLLO SA ES (MADRID) participant 18˙000.00
7    MASSACHUSSETTS INSTITUTE OF TECHNOLOGY MIT CORPORATION US (CAMBRIDGE) partner 0.00
8    NORTHEASTERN UNIVERSITY US (BOSTON MA) partner 0.00
9    STEVENS INSTITUTE OF TECHNOLOGY US (HOBOKEN) partner 0.00
10    THE BOARD OF TRUSTEES OF THE UNIVERSITY OF ILLINOIS US (CHAMPAIGN) partner 0.00
11    THE REGENTS OF THE UNIVERSITY OF CALIFORNIA US (OAKLAND CA) partner 0.00
12    THE RESEARCH FOUNDATION OF STATE UNIVERSITY OF NEW YORK US (ALBANY NY) partner 0.00
13    THE TRUSTEES OF BOSTON UNIVERSITY US (BOSTON MA) partner 0.00
14    TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF NEW YORK US (NEW YORK) partner 0.00

Map

 Project objective

Fueled by a string of high profile attacks and recent revelations about unprecedented cyber surveillance, interest in systems security is rising-not just among industry and governments, but even among individual citizens across Europe. Corporate organizations worry about the viability of their businesses, nation states about cyber attacks by other nation states or terrorist groups, and citizens about the trustworthiness of the ICT infrastructures. The long list of recent security incidents is eroding people's trust in the digital economy and shows that more research is needed.

Unfortunately, expertise is fragmented across many places, while the exchange of knowledge is lacking. If one group specializes in code-reuse attacks and another in embedded systems, ideally they should team up to detect code-reuse vulnerabilities in embedded devices. Today, however, the flow of ideas is limited to publications and ad-hoc collaborations. A more efficient exchange would occur if a researcher temporarily joins the other group to collaborate directly on-site.

Over the past few years Europe has created several world-class research centers in systems security. They publish in the most prestigious venues and have a significant impact on both the scientific community and society at large. Nevertheless, in terms of numbers, most top groups are still in the US and the ability to collaborate with them would be a tremendous boost for security research in Europe.

We plan to foster such collaborations by supporting researchers from European institutes to spend time with their American counterparts in top universities. We will gather the research results in a repository that links all the exchanges and provides a valuable input for collaborative projects in itself. We will focus our research efforts on both advanced attacks (e.g., exploits, malware, and exfiltration techniques), and defenses (e.g., developing secure software and protecting resource-constrained devices).

 Deliverables

List of deliverables.
D1.1 Website and collaboration tools Documents, reports 2020-04-09 10:01:33
D3.2 Cyber Attacks - Midterm Report Documents, reports 2020-04-09 10:01:33
D4.2 Defences in the IoT - Midterm Report Documents, reports 2020-04-09 10:01:33
D2.6 Dissemination and Communication Plan Documents, reports 2020-04-09 10:01:33
D4.1 Defences in the IoT - First Progress Report Documents, reports 2020-04-09 10:01:33
D2.1 Dissemination Progress report, year 1 Documents, reports 2020-04-09 10:01:33
D2.5 Cyber Security Repository Documents, reports 2020-04-09 10:01:33
D2.2 Dissemination Progress report, year 2 Documents, reports 2020-04-09 10:01:33
D3.1 Cyber Attacks - First Progress Report Documents, reports 2020-04-09 10:01:33

Take a look to the deliverables list in detail:  detailed list of PROTASIS deliverables.

 Publications

year authors and title journal last update
List of publications.
2018 Andrea Continella, Mario Polino, Marcello Pogliani, Stefano Zanero
There’s a Hole in that Bucket! A Large-scale Analysis of Misconfigured S3 Buckets
published pages: , ISSN: , DOI:
2020-04-09
2019 Marcello Pogliani, Davide Quarta, Mario Polino, Martino Vittone, Federico Maggi, Stefano Zanero
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
published pages: 161-175, ISSN: 2263-8733, DOI: 10.1007/s11416-019-00329-8
Journal of Computer Virology and Hacking Techniques 15/3 2020-04-09
2019 Kostas Drakonakis, Panagiotis Ilia, Sotiris Ioannidis, Jason Polakis
Please Forget Where I Was Last Summer: The Privacy Risks of Public Location (Meta)Data
published pages: , ISSN: , DOI:
2020-04-09
2019 Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Talon: An Automated Framework for Cross-Device Tracking Detection
published pages: , ISSN: , DOI:
2020-04-09
2019 Florian Quinkert, Tobias Lauinger, William Robertson, Engin Kirda and Thorsten Holz
It’s Not What It Looks Like: Measuring Attacks and Defensive Registrations of Homograph Domains
published pages: , ISSN: , DOI:
2020-04-09
2019 Konstantinos Solomos, Panagiotis Ilia, Sotiris Ioannidis, Nicolas Kourtellis
Automated Measurements of Cross-Device Tracking
published pages: , ISSN: , DOI:
2020-04-09
2018 Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
published pages: , ISSN: , DOI:
2020-04-09
2019 Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos
Is Privacy possible without Anonymity? The case for microblogging services
published pages: , ISSN: , DOI:
2020-04-09
2019 Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
Cookie synchronization: Everything you always wanted to know but were afraid to ask
published pages: , ISSN: , DOI:
2020-04-09
2019 Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
REAPER: Real-time App Analysis for Augmenting the Android Permission System
published pages: , ISSN: , DOI:
Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2020-04-09
2019 Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
published pages: , ISSN: , DOI:
2020-04-09
2018 Pietro De Nicolao, Marcello Pogliani, Mario Polino, Michele Carminati, Davide Quarta, Stefano Zanero
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
published pages: , ISSN: , DOI:
2020-04-09
2018 Davide Quarta, Federico Salvioni, Andrea Continella, Stefano Zanero
Extended Abstract: Toward Systematically Exploring Antivirus Engines
published pages: , ISSN: , DOI:
2020-04-09
2019 Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem
published pages: , ISSN: , DOI:
2020-04-09
2018 Panagiotis Papadopoulos, Antonios A. Chariton, Elias Athanasopoulos, Evangelos P. Markatos
Where’s Wally? How to Privately Discover your Friends on the Internet
published pages: , ISSN: , DOI:
2020-04-09
2017 Antonis A. Chariton, Eirini Degkleri, Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos P. Markatos
CCSP: a Compressed Certificate Status Protocol
published pages: , ISSN: , DOI:
IEEE International Conference on Computer Communications (INFOCOM \'17) 2020-04-09
2019 Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking
published pages: , ISSN: , DOI:
2020-04-09

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "PROTASIS" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "PROTASIS" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.1.3.3.)

ROVER (2020)

RELIABLE TECHNOLOGIES AND MODELS FOR VERIFIED WIRELESS BODY-CENTRIC TRANSMISSION AND LOCALIZATION

Read More  

MEGA (2019)

Heavy metal free emitters for new-generation light sources

Read More  

MAIL (2019)

Identifying Marginal Lands in Europe and strengthening their contribution potentialities in a CO2sequestration strategy

Read More