
AuthentiSafe: A Milestone in the CROSSCON Project for IoT Authentication
Author: Christoph Sendner, Chair of Software Engineering (Informatik II) at UWUAuthentiSafe is a pivotal result of the CROSSCON project, which was created to enhance security and efficiency in…

Ensuring Secure IoT Systems: CROSSCON’s Approach to Security Testing
Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The ever-growing Internet of Things (IoT) ecosystem presents a double-edged sword: while it enables groundbreaking applications, it…

Ensuring Memory Safety for Trusted Applications through Secure Compilation
Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…

TEE vulnerabilities, are you still there?
Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…

Challenges of Embedding Security in IoT Devices
Author: Malvina Catalano Gonzaga, CYSEC IntroductionThe Internet of Things (IoT) has revolutionized the way we interact with technology, embedding connectivity into everyday objects and systems…

Secure-by-formal-design
Author: Jurij Mihelič, Beyond Semiconductor Secure-by-formal-design: Towards better software and hardware assuranceDeveloping and building a cross-platform open security stack for connected…

Improving the resilience of trusted applications with control flow integrity
Author: Alberto Tacchella, Post-doctoral at Uni. Trento Improving the resilience of trusted applications with control flow integrityOne of the targets of the CROSSCON project is the development…

CROSSCON & (Secure) Friends
RISC-V Summit EU, Munich, Germany

CROSSCON & (Secure) Friends
RISC-V Summit EU, Munich, Germany