Rezultaty
A document listing all the relevant threat models for ReAct.
Dashboard IntegrationA document listing the implementation details of the ReAct Dashboard
Risk Prediction: Intermediate VersionThis deliverable will describe the algorithms for predicting the victims of cyberattacks
Initial Dissemination PlanThis is the plan for the Dissemination and Communication Actions of the project. Input by T7.1 and T7.2.
Risk Prediction: Final VersionThis deliverable will describe the final algorithms and accuracy results of the prediction algorithms for the victims of cyberattacks
Report on the Validation ExperimentsThis deliverable reports on the experiment conducted to validate the data collection and analysis techniques
Vulnerability DiscoveryThis will be the database with information about vulnerabilities existing and new ones found
Patching EvaluationA report with the evaluation of the techniques developed in this work package
Dashboard EvaluationA document listing the evaluation results of the ReAct Dashboard
Selective Isolation and ProtectionA report with the techniques used for discovering and isolating an exploited host
Analysis TechniquesThis deliverable describes the new techniques proposed for the interpretation and analysis of the data collected by the instrumentation proposed in T51
System EvaluationThis deliverable will describe the evaluation of the probingsystem and KPIs
Technology RequirementsA document listing all the primary technological requirements for implementing the needed techniques of ReAct.
UI USer RequirementsA document listing the user requirements for the ReAct Dashboard
Dashboard DesignA document listing the design choices of the ReAct Dashboard
Next Generation AttacksA document describing next generation of attacks that ReAct needs to consider in order to stay ahead of the security game
Final Dissemination, Communication, Exploitation and Standardization ReportThis is the final version of the Exploitation and Sustainability plan It will list the activities that will have been taken by M36 and the activities that will be continued after the end of the project Input by T71 and T72
Real-time UpdatesA report with the techniques used for live updating a program with limited or zero downtime
Report on Forensic-Readiness TechniquesThis deliverable describes the new techniques developed in task T51 for the selective instrumentation of sensitive target to increase their forensic capabilities
Scanning: Final VersionThis deliverable will describe the final algorithms andresults for Network and Host Scanning
Scanning: Preliminary VersionThis deliverable will describe the algorithms and preliminary results for Network and Host Scanning
Market Analysis and Business PlanThis deliverable will survey market opportunities identify the market niche for ReAct and propose the plan for the commercial exploitation of the results of the ReAct project developments
Midterm Dissemination, Communication, Exploitations and Standardization ReportThis is the mid of the project version of the Exploitation and Sustainability plan It will list the activities that will have been taken by M20 and the activities that will be continued Input by T71 and T72
Selective Software HardeningA report with the software instrumentation techniques used to produce temporary software patches
The web site, along with the social network accounts will be the main dissemination mechanism of the project in cyberspace. For internal communication and collaboration, the partners will use the cloud (own-cloud/git or similar) and associated telecon/chat tools. Input by T7.1.
Publikacje
Autorzy:
Victor Duta, Cristiano Giuffrida, Herbert Bos, Erik van der Kouwe
Opublikowane w:
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021, Strona(/y) 743-757, ISBN 9781450383172
Wydawca:
ACM
DOI:
10.1145/3445814.3446740
Autorzy:
Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana
Opublikowane w:
Proceedings of the 30th USE-NIX Se-cu-ri-ty Sym-po-si-um, 2021
Wydawca:
30th USENIX Security Symposium
Autorzy:
Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 2019, Strona(/y) 310-325, ISBN 978-1-7281-1148-3
Wydawca:
IEEE
DOI:
10.1109/eurosp.2019.00031
Autorzy:
Stephan van Schaik, Alyssa Milburn, Sebastian Osterlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
2019 IEEE Symposium on Security and Privacy (SP), 2019, Strona(/y) 88-105, ISBN 978-1-5386-6660-9
Wydawca:
IEEE
DOI:
10.1109/sp.2019.00087
Autorzy:
Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
Opublikowane w:
Proceedings of the Internet Measurement Conference, 2019, Strona(/y) 280-293, ISBN 9781450369480
Wydawca:
ACM
DOI:
10.1145/3355369.3355582
Autorzy:
Giuseppe Antonio Di Luna, Davide Italiano, Luca Massarelli, Sebastian Österlund, Cristiano Giuffrida, Leonardo Querzoni
Opublikowane w:
Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021, Strona(/y) 1034-1045, ISBN 9781450383172
Wydawca:
ACM
DOI:
10.1145/3445814.3446695
Autorzy:
Kotzias, Platon; Caballero, Juan; Bilge, Leyla
Opublikowane w:
Proceedings of the 42nd IEEE Symposium on Security & Privacy (S&P 2021), 2021
Wydawca:
42nd IEEE Symposium on Security & Privacy (S&P 2021)
Autorzy:
Sebastian Österlund, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019, Strona(/y) 559-572, ISBN 9781450362405
Wydawca:
ACM
DOI:
10.1145/3297858.3304054
Autorzy:
Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019, Strona(/y) 545-558, ISBN 9781450362405
Wydawca:
ACM
DOI:
10.1145/3297858.3304073
Autorzy:
Pietro Frigo, Emanuele Vannacc, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Opublikowane w:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Strona(/y) 747-762, ISBN 978-1-7281-3497-0
Wydawca:
IEEE
DOI:
10.1109/sp40000.2020.00090
Autorzy:
Hany Ragab, Enrico Barberis, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 30th USENIX Security Symposium, 2021
Wydawca:
30th USENIX Security Symposium
Autorzy:
Ser-gej Schu-mi-lo, Cor-ne-li-us Ascher-mann, Ali Ab-ba-si, Simon Wör-ner, Thors-ten Holz
Opublikowane w:
Proceedings of the 30th USE-NIX Se-cu-ri-ty Sym-po-si-um, 2021
Wydawca:
30th USE-NIX Se-cu-ri-ty Sym-po-si-um
Autorzy:
Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Opublikowane w:
Proceedings of the 35th Annual Computer Security Applications Conference, 2019, Strona(/y) 97-112, ISBN 9781450376280
Wydawca:
ACM
DOI:
10.1145/3359789.3359797
Autorzy:
Antreas Dionysiou, Vassilis Vassiliades, Elias Athanasopoulos
Opublikowane w:
Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security, 2021, Strona(/y) 265-279, ISBN 9781450382878
Wydawca:
ACM
DOI:
10.1145/3433210.3453092
Autorzy:
Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos P. Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
Opublikowane w:
Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Wydawca:
Internet Society
DOI:
10.14722/ndss.2019.23070
Autorzy:
Finn de Ridder, Pietro Frigo,Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
Opublikowane w:
Proceedings of the 30th USENIX Security Symposium, 2021
Wydawca:
30th USENIX Security Symposium
Autorzy:
Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020, Strona(/y) 1871-1885, ISBN 9781450370899
Wydawca:
ACM
DOI:
10.1145/3372297.3417289
Autorzy:
Sebastian Österlund, Elia Geretto, Andrea Jemmett, Emre Güler, Philipp Görz, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
Opublikowane w:
Proceedings of the 14th European Workshop on Systems Security, 2021, Strona(/y) 1-7, ISBN 9781450383370
Wydawca:
ACM
DOI:
10.1145/3447852.3458720
Autorzy:
Güler, Emre; Görz, Philipp; Geretto, Elia; Jemmett, Andrea; Österlund, Sebastian; Bos, Herbert; Giuffrida, Cristiano; Holz, Thorsten
Opublikowane w:
Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020, 360 - 372, Numer 1, 2020
Wydawca:
36th Annual Computer Security Applications Conference (ACSAC 2020)
DOI:
10.1145/3427228.3427266
Autorzy:
Robert Gawlik, Thorsten Holz
Opublikowane w:
Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 18), 2018
Wydawca:
USENIX
Autorzy:
tephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Opublikowane w:
Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), 2018
Wydawca:
USENIX Association
Autorzy:
Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 27th USENIX Security Symposium (USENIX Security 18), 2018
Wydawca:
USENIX Association
Autorzy:
Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
Opublikowane w:
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18), 2018
Wydawca:
USENIX Association
Autorzy:
Vivek Jain, Sanjay Rawat, Cristiano Giuffrida, Herbert Bos
Opublikowane w:
Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18, 2018, Strona(/y) 505-517, ISBN 9781-450365697
Wydawca:
ACM Press
DOI:
10.1145/3274694.3274746
Autorzy:
Erik van der Kouwe, Taddeus Kroes, Chris Ouwehand, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18, 2018, Strona(/y) 17-27, ISBN 9781-450365697
Wydawca:
ACM Press
DOI:
10.1145/3274694.3274705
Autorzy:
Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos
Opublikowane w:
2019 IEEE Symposium on Security and Privacy (SP), 2019, Strona(/y) 55-71, ISBN 978-1-5386-6660-9
Wydawca:
IEEE
DOI:
10.1109/sp.2019.00089
Autorzy:
Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos Markatos
Opublikowane w:
The World Wide Web Conference on - WWW '19, 2019, Strona(/y) 1432-1442, ISBN 9781450366748
Wydawca:
ACM Press
DOI:
10.1145/3308558.3313542
Autorzy:
Yun Shen, Enrico Mariconti, Pierre Antoine Vervier, Gianluca Stringhini
Opublikowane w:
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18, 2018, Strona(/y) 592-605, ISBN 9781-450356930
Wydawca:
ACM Press
DOI:
10.1145/3243734.3243811
Autorzy:
Behrad Garmany, Martin Stoffel, Robert Gawlik, Philipp Koppe, Tim Blazytko, Thorsten Holz
Opublikowane w:
Proceedings of the 34th Annual Computer Security Applications Conference on - ACSAC '18, 2018, Strona(/y) 300-312, ISBN 9781-450365697
Wydawca:
ACM Press
DOI:
10.1145/3274694.3274723
Autorzy:
Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras
Opublikowane w:
Proceedings of the 28th USENIX Security Symposium, 2019
Wydawca:
USENIX
Autorzy:
Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Opublikowane w:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Strona(/y) 20-38, ISBN 978-1-7281-3497-0
Wydawca:
IEEE
DOI:
10.1109/sp40000.2020.00082
Autorzy:
Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi
Opublikowane w:
Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Wydawca:
Internet Society
DOI:
10.14722/ndss.2020.23018
Autorzy:
Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida.
Opublikowane w:
Proceedings of the 29th USENIX Security Symposium, 2020
Wydawca:
USENIX Security Symposium
Autorzy:
Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Opublikowane w:
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Strona(/y) 309-321, ISBN 978-1-7281-5087-1
Wydawca:
IEEE
DOI:
10.1109/eurosp48549.2020.00027
Autorzy:
Teemu Rytilahti, Thorsten Holz
Opublikowane w:
Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Wydawca:
Internet Society
DOI:
10.14722/ndss.2020.24389
Autorzy:
Sergej Schumilo, Cornelius Aschermann, Ali Abbasi, Simon Worner, Thorsten Holz
Opublikowane w:
Proceedings 2020 Network and Distributed System Security Symposium, 2020, ISBN 1-891562-61-4
Wydawca:
Internet Society
DOI:
10.14722/ndss.2020.23096
Autorzy:
Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, Thorsten Holz
Opublikowane w:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Strona(/y) 1597-1612, ISBN 978-1-7281-3497-0
Wydawca:
IEEE
DOI:
10.1109/sp40000.2020.00117
Autorzy:
Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thors-ten Holz
Opublikowane w:
Proceedings of the 29th USENIX Security Symposium. Boston, 2020
Wydawca:
29th USENIX Security Symposium
Autorzy:
Emre Güler, Cornelius Aschermann, Ali Abbasi, and Thorsten Holz
Opublikowane w:
Proceedings of the 28th USENIX Security Symposium, 2019
Wydawca:
28th USENIX Security Symposium
Autorzy:
Savino Dambra, Leyla Bilge, Davide Balzarotti
Opublikowane w:
2020 IEEE Symposium on Security and Privacy (SP), 2020, Strona(/y) 1367-1383, ISBN 978-1-7281-3497-0
Wydawca:
IEEE
DOI:
10.1109/sp40000.2020.00019
Autorzy:
Radhesh Krishnan Konoth, Bjorn Fischer, Wan Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos
Opublikowane w:
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Strona(/y) 569-586, ISBN 978-1-7281-5087-1
Wydawca:
IEEE
DOI:
10.1109/eurosp48549.2020.00043
Autorzy:
Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert
Opublikowane w:
Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Wydawca:
Internet Society
DOI:
10.14722/ndss.2019.23412
Autorzy:
Pietro Borrello, Daniele Cono D’Elia, Leonardo Querzoni, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 28th ACM Conference on Computer and Communications Security (CCS), 2021
Wydawca:
ACM
Autorzy:
Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
Opublikowane w:
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019, Strona(/y) 37-48, ISBN 9781450360999
Wydawca:
ACM
DOI:
10.1145/3292006.3300027
Autorzy:
Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero
Opublikowane w:
Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Wydawca:
Internet Society
DOI:
10.14722/ndss.2019.23522
Autorzy:
Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021
Wydawca:
DSN
Autorzy:
Neophytos Christou, Elias Athanasopoulos.
Opublikowane w:
Proceedings of the 3rd International Workshop on Emerging Technologies for Authorization and Authentication, 2020
Wydawca:
3rd International Workshop on Emerging Technologies for Authorization and Authentication (co-located with ESORICS)
Autorzy:
Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz
Opublikowane w:
Proceedings 2019 Network and Distributed System Security Symposium, 2019, ISBN 1-891562-55-X
Wydawca:
Internet Society
DOI:
10.14722/ndss.2019.23371
Autorzy:
Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
Proceedings of the 42nd IEEE Symposium on Security & Privacy (S&P 2021), 2021
Wydawca:
42nd IEEE Symposium on Security & Privacy (S&P 2021)
Autorzy:
Erik van der Kouwe, Gernot Heiser, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida
Opublikowane w:
IEEE Security & Privacy, Numer 18/3, 2020, Strona(/y) 48-57, ISSN 1540-7993
Wydawca:
IEEE Computer Society
DOI:
10.1109/msec.2020.2969862
Autorzy:
Michalis Papaevripides, Elias Athanasopoulos
Opublikowane w:
ACM Transactions on Privacy and Security, Numer 24/2, 2021, Strona(/y) 1-29, ISSN 2471-2566
Wydawca:
ACM Transactions on Privacy and Security
DOI:
10.1145/3418898
Autorzy:
Antreas Dionysiou, Elias Athanasopoulos
Opublikowane w:
Computers & Security, Numer 97, 2020, Strona(/y) 101947, ISSN 0167-4048
Wydawca:
Pergamon Press Ltd.
DOI:
10.1016/j.cose.2020.101947
Autorzy:
Constantinos Diomedous, Elias Athanasopoulos
Opublikowane w:
Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings, Numer 11543, 2019, Strona(/y) 441-460, ISBN 978-3-030-22037-2
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-22038-9_21
Autorzy:
Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Opublikowane w:
Research in Attacks, Intrusions, and Defenses - 21st International Symposium, RAID 2018, Heraklion, Crete, Greece, September 10-12, 2018, Proceedings, Numer 11050, 2018, Strona(/y) 47-66, ISBN 978-3-030-00469-9
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-00470-5_3
Autorzy:
Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Opublikowane w:
Information Security - 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings, Numer 11723, 2019, Strona(/y) 277-296, ISBN 978-3-030-30214-6
Wydawca:
Springer International Publishing
DOI:
10.1007/978-3-030-30215-3_14
Prawa własności intelektualnej
Numer wniosku/publikacji:
18
181725
Data:
2018-07-04
Numer wniosku/publikacji:
DES
190041
Data:
2019-02-05
Wnioskodawca/wnioskodawcy:
NORTONLIFELOCK FRANCE
Wyszukiwanie danych OpenAIRE...
Podczas wyszukiwania danych OpenAIRE wystąpił błąd
Brak wyników