Security Testing Tool

 Coordinated by
CNR

GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).

Description

Describe the innovation content of the result:
GROOT tool is leveraging Combinatorial Testing for assessing mechanisms and tool processing Personal Data with respect to the GDPR’s demands.
Who will be the customer?
Public and private Companies using ICT systems and authorization systems for managing protected resources and personal data.
What benefit will it bring to the customers?
A data protection by design solution for improving the compliance with the currently applicable legal framework concerning the protection of personal data.
When is the expected date of achievement in the project (Mth/yr)?
08/2023
When is the time to market (Mth/yr)?
At the end of the project
What are the costs to be incurred after the project and before exploitation?
After finishing BIECO, GROOT will be ready for use without further investment. However, further research, based on it, will need to be framed on other innovation projects..
What is the approximate price range of this result/price of licences?
Open Source
What are the market size in Millions € for this result and relevant trend?
According to recent survey, the GDPR Services market was valued at € 1042.97 million in 2020 and is expected to reach € 3846.12 million by 2026
How will this result rank against competing products in terms of price/performance?
We have applied data protection by design and by default approach, by incorporating GDPR concepts at the early stage of developing GROOT, differentiating this result from the existing security solutions.
Who are the competitors for this result?
Other security testing tools based on combinatorial approaches.
How fast and in what ways will the competition respond to this result?
Incorporating GDPR concepts into existing methodologies and tools is not a straightforward task. We estimate that pairing security and privacy in a unique framework takes at least one year.
Who are the partners involved in the result?
CNR
Who are the industrial partners interested in the result (partners, sponsors, etc.)?

 Unknown at the moment

Have you protected or will you protect this result? How? When?
GROOT has been presented at ICTSS7 2021, and the first related research contribution8 will be available soon. We are planning to prepare an extended contribution for a journal article by the end of the project.

Other results

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Monitoring Tool

The monitoring tool is an infrastructure in charge of setting up and managing a monitoring component. It is based on event messages and enables the collection of complex events.

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This