Vulnerability Detection Tool
Coordinated by
Gradiant
A tool, based on supervised learning algorithms, locates and identifies the type of vulnerability existing from potentially vulnerable source code.
Description
Describe the innovation content of the result:
A tool, based on supervised learning algorithms, locates and identifies the type of vulnerability existing from potentially vulnerable source code.
Who will be the customer?
Developers or software owners who want to identify the presence of vulnerabilities in their tools.
What benefit will it bring to the customers?
Locate and identify potential vulnerabilities, allowing to focus it patching and thus avoid possible attacks by external entities.
When is the expected date of achievement in the project (Mth/yr)?
February 2023
When is the time to market (Mth/yr)?
2-3 years
What are the costs to be incurred after the project and before exploitation?
1-2 M€
What is the approximate price range of this result/price of licences?
~1.000€
What are the market size in Millions € for this result and relevant trend?
2.500 M€
How will this result rank against competing products in terms of price/performance?
To be determined.
Who are the competitors for this result?
Checkmarxk, Micro Focus, Veracode, Synopsys.
How fast and in what ways will the competition respond to this result?
To be determined.
Who are the partners involved in the result?
N/A.
Who are the industrial partners interested in the result (partners, sponsors, etc.)?
N/A.
Have you protected or will you protect this result? How? When?
IP rights for source code are reserved. The source code will not be publicly available.
Other results
Extension of the Approach to the Communications within the Whole Supply Chain of the Microfactory
Once the secure communication with a vehicle has been demonstrated for remote FW update, it is straightforward to extend it to general Service-Over-the-Air architecture and even further.
Remote Updating – Upgrading of Vehicle Firmware
Securing remote and in-vehicle communications against cyber-attacks, possibly performed with quantum computers in the near future, is a major goal in the automotive sector. For such a purpose I-FEV focused on a thorough study and an architecture and protocol design to develop and implement a Service Over the Air (SOtA )system, starting from Electronic Control Unit (ECU) firmware update on its electric vehicles from remote.
Time Sensitive Network Simulation
Simulate the real time communication for the distributed based on the Time sensitive network simulation. Additionally, simulate the fail-operation clock synchronization methodology. This simulation will validate the communication stack.
Fail-operation clock synchronization methodology
Domain Specific Language
The domain specific language enables specification of digital twin behaviour in a manner that can enable a predicted evaluation of its trustworthy behaviour in a simulated environment.
Security Testing Tool
GdpR-based cOmbinatOrial Testing (GROOT) is a general combinatorial strategy for testing systems managing GDPR’s concepts (e.g., Data Subject, Personal Data or Controller).