WP3 – Vulnerabilities Management

 Coordinated by
GRAD (M01-M30)

Objective

This work package has the following objectives:

  1. Analyze the state of the art to incorporate the latest advances in detection, forecasting and propagation of vulnerabilities
  2. Compile a representative dataset of software vulnerabilities, taking into account the data provided by BIECO’s use cases as well as from other public sources, and select the most representative features for an effective vulnerability detection process.
  3. Provide advanced tools to detect and forecast accurately vulnerabilities in ICT systems and components.
  4. Provide an advanced tool to analyze the propagation of vulnerabilities across the ICT supply chain.

Deliverables

Outcomes

Fuzzing Tool

Fuzzing Tool will test System Under Test (SUT) security vulnerabilities or inputs not contemplated that could compromise the system; as a black-box process, by using unintended or incorrect inputs and monitoring their corresponding outputs.

ResilBlockly

This exploitation result consists in cybersecurity consultancy services supported by ResilBlockly (former Blockly4SoS), a Model-Driven Engineering tool that has been developed in the context of BIECO.

Security evaluation methodology

Security evaluation methodology to evaluate the security of an ICT system. The methodology is based on standards such as ISO 31000 standard for Risk Management, the ISO 29119 standard for Security Testing or the MUD standard…

Extended MUD file

The extended Manufacturer Usage Description (MUD) file is an extension of the MUD Internet Engineering Task Force (IETF) standard…

BIECO Project

SUBSCRIBE and become part of the BIECO community!

We don’t spam!

Share This