CROSSCON: from knowhow generation to technology development, maturation and impact creation - Mission accomplished!
Author: Hristo Koshutanski, Project Coordinator, ATOS Dear Readers and IoT Security Technologists, As in each journey, we have come to the final completion of our mission of CROSSCON…
Secure Authentication Using Context
Authors: Hamid Dashtbani, PhD student at University of Würzburg Traditional authentication methods such as certificates and cryptographic keys remain vulnerable to a range of attacks…
Achieving persistent tagging for robust stack memory error protection
Authors: Carlo Ramponi, Ph.D. Student at University of Trento Why Memory Safety Still MattersDespite decades of research, memory safety remains the number one source of critical…
Many TEEs, One Hypervisor: Enhancing Cross-Platform Security and Interoperability
Authors: João Sousa, PhD Student at UMINHOTiago Gomes, Assistant Professor at UMINHOIn many IoT systems, various devices coexist, presenting an ongoing challenge to ensure they all provide the…
Fuzzing the Future: How AI is Transforming Hardware Security Evaluation
Authors: Nikhilesh Singh, Postdoc at TU DarmstadtHuimin Li, Postdoc at TU DarmstadtLichao Wu Postdoc at TU DarmstadtMohamadreza Rostami, PhD Student at TU DarmstadtProf. Dr.-Ing. Ahmad-Reza…
AuthentiSafe: A Milestone in the CROSSCON Project for IoT Authentication
Author: Christoph Sendner, Chair of Software Engineering (Informatik II) at UWUAuthentiSafe is a pivotal result of the CROSSCON project, which was created to enhance security and efficiency in…
Ensuring Secure IoT Systems: CROSSCON’s Approach to Security Testing
Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The ever-growing Internet of Things (IoT) ecosystem presents a double-edged sword: while it enables groundbreaking applications, it…
Ensuring Memory Safety for Trusted Applications through Secure Compilation
Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…
TEE vulnerabilities, are you still there?
Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…
Challenges of Embedding Security in IoT Devices
Author: Malvina Catalano Gonzaga, CYSEC IntroductionThe Internet of Things (IoT) has revolutionized the way we interact with technology, embedding connectivity into everyday objects and systems…