Final review Meeting 28 September 2023

DRAFT AGENDA: Thursday 28th September 2023 13.00 – 17.00 CET AGENDA Overview 13:00 – 13:10Project Overview13:10 – 13:25BIECO Tools13:25 – 14:35BIECO Use Cases,including Demos14:35:15:05WP3 & WP4 Presentations15:05 – 15:15BREAK15:15 –...

BIECO Integrated Platform

BIECO Integrated Platform  Coordinated byHOLISUN BIECO Integrated Platform will integrate the tools in a loosely coupled way. Description Describe the innovation content of the result: A loosely coupled platform which can connect various tools and can design and run a...

Data Collection Tool

Data Collection Tool Coordinated byUTC Data Collection Tool (DCT) stores information from relevant vulnerability related datasets, providing a single access point to information required by the vulnerability detection and forecasting tools developed in T3.3, as well...

Vulnerability Detection Tool

Vulnerability Detection Tool  Coordinated byGradiant A tool, based on supervised learning algorithms, locates and identifies the type of vulnerability existing from potentially vulnerable source code. Description Describe the innovation content of the result: A tool,...

Vulnerability Exploitability Forecasting Tool

Vulnerability Exploitability Forecasting Tool Coordinated byGradiant Vulnerability Exploitability Forecasting Tool will estimate the probability of a vulnerability to be exploited in the next 3, 6 or 12 months. Description February 2023Describe the innovation content...

Vulnerability Propagation Tool

Vulnerability Propagation Tool Coordinated byGradiant Vulnerability Propagation Tool will calculate and offer the paths affected by a vulnerability in the source code. Description Describe the innovation content of the result:Allows the developers or security experts...

Fuzzing Tool

Fuzzing Tool Coordinated byGradiant Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding...

ResilBlockly

ResilBlockly Coordinated byRESILTECH This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO. Description Describe the...

Security tools for AI Investments platform

Security tools for AI Investments platform Coordinated by7bulls Secured AI Investments platform using the outcome of the BIECO project. Description Describe the innovation content of the result: The key innovation products will be:Security tools for AI Investments...

Log Forgery Blocker

Log Forgery Blocker Coordinated by7bulls Log Forgery Blocker – a brand new product on the market. Description Describe the innovation content of the result:New product on the market – Log Forgery Blocker.Who will be the customer?The customers are companies...

Security evaluation methodology

Security evaluation methodology  Coordinated byUMU Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD...

Extended MUD file

Extended MUD file  Coordinated byUMU The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard. The MUD specification’s major goal is to limit the threat and attack surface of a certain IoT...