Explore the words cloud of the SCARE project. It provides you a very rough idea of what is the project "SCARE" about.
The following table provides information about the project.
Coordinator |
TTY-SAATIO
There are not information about this coordinator. Please contact Fabio for more information, thanks. |
Coordinator Country | Finland [FI] |
Total cost | 1˙499˙950 € |
EC max contribution | 1˙499˙950 € (100%) |
Programme |
1. H2020-EU.1.1. (EXCELLENT SCIENCE - European Research Council (ERC)) |
Code Call | ERC-2018-STG |
Funding Scheme | ERC-STG |
Starting year | 2018 |
Duration (year-month-day) | from 2018-12-01 to 2023-11-30 |
Take a look of project's partnership.
# | ||||
---|---|---|---|---|
1 | TAMPEREEN KORKEAKOULUSAATIO SR | FI (TAMPERE) | coordinator | 1˙499˙950.00 |
2 | TTY-SAATIO | FI (TAMPERE) | coordinator | 0.00 |
'As the recent 'HeartBleed' bug in OpenSSL demonstrates, the security of cryptographic software and devices cannot be understated. They build the foundation for basic security guarantees such as confidentiality and authentication, enabling technologies such as secure communication. For example, Transport Layer Security enables e-commerce, a 1.9 trillion USD global industry in 2016.
The more modern trend, especially in the embedded space, is towards hardware-assisted security. Here the aim is to leverage hardware to accomplish security goals that are simply unrealistic in software-only solutions. One example is Trusted Execution Environments (TEE) that provide a secure sandbox to execute security-critical software. TEEs, often driven by ARM TrustZone Technology, are present in the majority of smartphones on the market today.
Side-channel analysis (SCA) is a cryptanalytic technique that targets not the formal description of a cryptographic primitive but the implementation of it. Examples of side-channels include power consumption, electro-magnetic radiation, acoustic emanations, and various timings. Attackers then use this auxiliary signal to recover critical algorithm state and, in combination with cryptanalytic techniques, secret key material. This is a young but very active field within security and cryptography stemming from covert channels.
SCA is the focus of SCARE. Objectives include the discovery of next generation covert channels, paving the way for novel SCA classes, and extending these to full-fledged end-to-end SCA attacks by identifying specific vulnerabilities in widely-deployed cryptography software libraries such as OpenSSL and hardware-assisted security technologies such as TEEs. In turn, SCARE will deliver a methodology for SCA security assurance: not just development, evaluation, and deployment of acute countermeasures, but bringing SCA into the product life cycle as part of continuous integration.'
Data Management Plan | Open Research Data Pilot | 2019-07-30 13:55:41 |
Take a look to the deliverables list in detail: detailed list of SCARE deliverables.
Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SCARE" project.
For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.
Send me an email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.
Thanks. And then put a link of this page into your project's website.
The information about "SCARE" are provided by the European Opendata Portal: CORDIS opendata.