BIECO Integrated Platform Coordinated byHOLISUN BIECO Integrated Platform will integrate the tools in a loosely coupled way. Description Describe the innovation content of the result: A loosely coupled platform which can connect various tools and can design and run a...
Data Collection Tool Coordinated byUTC Data Collection Tool (DCT) stores information from relevant vulnerability related datasets, providing a single access point to information required by the vulnerability detection and forecasting tools developed in T3.3, as well...
Vulnerability Detection Tool Coordinated byGradiant A tool, based on supervised learning algorithms, locates and identifies the type of vulnerability existing from potentially vulnerable source code. Description Describe the innovation content of the result: A tool,...
Vulnerability Exploitability Forecasting Tool Coordinated byGradiant Vulnerability Exploitability Forecasting Tool will estimate the probability of a vulnerability to be exploited in the next 3, 6 or 12 months. Description February 2023Describe the innovation content...
Vulnerability Propagation Tool Coordinated byGradiant Vulnerability Propagation Tool will calculate and offer the paths affected by a vulnerability in the source code. Description Describe the innovation content of the result:Allows the developers or security experts...
Fuzzing Tool Coordinated byGradiant Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding...
ResilBlockly Coordinated byRESILTECH This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO. Description Describe the...
Security tools for AI Investments platform Coordinated by7bulls Secured AI Investments platform using the outcome of the BIECO project. Description Describe the innovation content of the result: The key innovation products will be:Security tools for AI Investments...
Log Forgery Blocker Coordinated by7bulls Log Forgery Blocker – a brand new product on the market. Description Describe the innovation content of the result:New product on the market – Log Forgery Blocker.Who will be the customer?The customers are companies...
Security evaluation methodology Coordinated byUMU Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD...
Extended MUD file Coordinated byUMU The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard. The MUD specification’s major goal is to limit the threat and attack surface of a certain IoT...
Monitoring Tool Coordinated byCNR The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events. Description Describe the innovation content of the...
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category .
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
This cookie is native to PHP applications. The cookie is used to store and identify a users' unique session ID for the purpose of managing user session on the website. The cookie is a session cookies and is deleted when all the browser windows are closed.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
Set by Google to distinguish users.
Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
16 years 2 months 25 days 5 hours 2 minutes
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.