bp18a

AuthentiSafe: A Milestone in the CROSSCON Project for IoT Authentication

Author: Christoph Sendner, Chair of Software Engineering (Informatik II) at UWUAuthentiSafe is a pivotal result of the CROSSCON project, which was created to enhance security and efficiency in…
bp19

Ensuring Secure IoT Systems: CROSSCON’s Approach to Security Testing

Author: Ákos Milánkovich, Security Analyst at SEARCH-LAB The ever-growing Internet of Things (IoT) ecosystem presents a double-edged sword: while it enables groundbreaking applications, it…
bp17

Ensuring Memory Safety for Trusted Applications through Secure Compilation

Author: Alberto Tacchella, Post-doctoral at Uni. Trento A Trusted Application (TA) is an application running in a Trusted Execution Environment (TEE) that implements a security-critical…
bp17

TEE vulnerabilities, are you still there?

Author: João Sousa, University of Minho TrustZone is an Arm hardware technology widely adopted in billions of mobile devices [2] and, more recently, in industrial control systems [3] and servers…
bp16

Challenges of Embedding Security in IoT Devices

Author: Malvina Catalano Gonzaga, CYSEC IntroductionThe Internet of Things (IoT) has revolutionized the way we interact with technology, embedding connectivity into everyday objects and systems…
bp15

Secure-by-formal-design

Author: Jurij Mihelič, Beyond Semiconductor Secure-by-formal-design: Towards better software and hardware assuranceDeveloping and building a cross-platform open security stack for connected…
BP-14

Improving the resilience of trusted applications with control flow integrity

Author: Alberto Tacchella, Post-doctoral at Uni. Trento Improving the resilience of trusted applications with control flow integrityOne of the targets of the CROSSCON project is the development…
RISC-V

CROSSCON & (Secure) Friends

RISC-V Summit EU, Munich, Germany
RISC-V

CROSSCON & (Secure) Friends

RISC-V Summit EU, Munich, Germany