Opendata, web and dolomites


Secure Hardware-Software Architectures for Robust Computing Systems

Total Cost €


EC-Contrib. €






Project "SHARCS" data sheet

The following table provides information about the project.


Organization address
address: N PLASTIRA STR 100
postcode: 70013

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website
 Total cost 3˙105˙762 €
 EC max contribution 3˙105˙762 € (100%)
 Programme 1. H2020-EU.2.1.1. (INDUSTRIAL LEADERSHIP - Leadership in enabling and industrial technologies - Information and Communication Technologies (ICT))
 Code Call H2020-ICT-2014-1
 Funding Scheme RIA
 Starting year 2015
 Duration (year-month-day) from 2015-01-01   to  2017-12-31


Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
3    ONAPP LIMITED GI (GIBRALTAR) participant 443˙750.00
4    STICHTING VU NL (AMSTERDAM) participant 413˙125.00
6    NEURASMUS BV NL (ROTTERDAM) participant 342˙375.00
7    ELEKTROBIT AUTOMOTIVE GMBH DE (ERLANGEN) participant 321˙250.00


 Project objective

Developing new security paradigms, architectures, and software, for more secure and trustworthy ICT systems and services has clear social, scientific, and market motivation. This motivation is becoming stronger due to the changing threat landscape; over the past decade we are witnessing an ever-increasing amount of cyberattacks on the Internet. We believe that to advance the field of cybersecurity, we must act proactively and in synergy, instead of being reactive to cyberattacks.

We propose SHARCS, a framework for designing, building and demonstrating secure-by-design applications and services, that achieve end-to-end security for their users. SHARCS will achieve this by systematically analyzing and extending, as necessary, the hardware and software layers in a computing system. This holistic approach is necessary, as no system can truly be secure unless every layer is secured, starting from the lowest one. We will measure the effectiveness of the SHARCS framework by using it on a diverse set of security-critical, real-word applications. The applications have been chosen from three different domains, medical, cloud and automotive, to demonstrate the platform independence capabilities of SHARCS. SHARCS will provide a powerful foundation for designing and developing trustworthy, secure-by-design applications and services for the Future Internet.


List of deliverables.
Specification and guidelines for security-by-design Documents, reports 2019-05-31 12:42:53
Dissemination report, year 2 Documents, reports 2019-05-31 12:42:51
Dissemination report, year 1 Documents, reports 2019-05-31 12:42:52
Design specification of the SHARCS runtime system, software tools and reporting Documents, reports 2019-05-31 12:42:45
Website and collaboration tools Demonstrators, pilots, prototypes 2019-05-31 12:42:57
Final implementation of the SHARCS runtime system, software tools and reporting Documents, reports 2019-05-31 12:42:55
Dissemination report, year 3 Documents, reports 2019-05-31 12:42:58
Recommendations report for security-by-design Documents, reports 2019-05-31 12:42:55
Applications and framework requirements for secure-by-design systems Documents, reports 2019-05-31 12:42:51
Final implementation of the SHARCS hardware techniques Documents, reports 2019-05-31 12:42:56
Requirements of the SHARCS runtime system, software tools and reporting Documents, reports 2019-05-31 12:42:44
Design specification of the SHARCS hardware techniques Documents, reports 2019-05-31 12:43:04
SHARCS System architectures and requirements Documents, reports 2019-05-31 12:42:47

Take a look to the deliverables list in detail:  detailed list of SHARCS deliverables.


year authors and title journal last update
List of publications.
2016 A. Oikonomopoulos, E. Athanasopoulos, H. Bos, C. Giuffrida
Poking Holes in Information Hiding
published pages: , ISSN: , DOI:
USENIX Security Symposium 2019-05-30
2017 Pawlowski, M. Contag, V. van der Veen, C. Ouwehand, T. Holz, H. Bos, E. Athanasopoulos, C. Giuffrida
MARX: Uncovering Class Hierarchies in C++ Programs
published pages: , ISSN: , DOI:
NDSS Symposium 2017 2019-05-30
2017 Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Box, Cristiano Giuffrida
ASLR on the Line: Practical Cache Attacks on the MMU
published pages: , ISSN: , DOI:
NDSS Symposium 2017 2019-05-30
2016 Enes Göktaş, Angelos Economopoulos, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos
Bypassing clang’s SafeStack for Fun and Profit.
published pages: , ISSN: , DOI:
Black Hat Europe, 2016 2019-05-30
2017 S. Rawat, V. Jain, A. Kumar, L. Cojocar, C. Giuffrida, H. Bos
VUzzer: Application-aware Evolutionary Fuzzing
published pages: , ISSN: , DOI:
NDSS 2017 2019-05-30
2016 Razavi, Kaveh, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, and Herbert Bos.
Flip Feng Shui: Hammering a Needle in the Software Stack.
published pages: 1-18, ISSN: , DOI:
USENIX Security Symposium 2019-05-30
2016 K. Razavi, B. Gras, E. Bosman, B. Preneel, C. Giuffrida, H. Bos
Flip Feng Shui Rowhammering the VM’s Isolation
published pages: , ISSN: , DOI:
Black Hat Europe 2016 2019-05-30
2016 Christos Strydis
Uw hartslag als wachtwoord.
published pages: , ISSN: , DOI:
Monitor 2019-05-30
2016 Vassilis Prevelakis and Mohammad Hamad
Controlling Change via Policy Contracts.
published pages: , ISSN: , DOI:
Proceedings of the Internet of Things Software Update Workshop (IoTSU) 2019-05-30
2016 Goktas, R. Gawlik, B. Kollenda, E. Athanasopoulos, G. Portokalidis, C. Giuffrida, H. Bos
Undermining Information Hiding (And What to do About it).
published pages: , ISSN: , DOI:
USENIX Security Symposium 2019-05-30
2016 Robert M. Seepers, Wenjin Wang, Gerard de Haan, Ioannis Sourdis, Christos Strydis
Attacks on Heartbeat-Based Security Using Remote Photoplethysmography
published pages: 1-1, ISSN: 2168-2194, DOI: 10.1109/JBHI.2017.2691282
IEEE Journal of Biomedical and Health Informatics 2019-05-30
2015 Elias Athanasopoulos, Martin Boehner, Cristiano Giuffrida, Dmitry Pidan, Vassilis Prevelakis, Ioannis Sourdis, Christos Strydis, John Thomson
Increasing the Trustworthiness of Embedded Applications.
published pages: 321-322, ISSN: , DOI:
In Proceedings of the 8th International Conference on Trust & Trustworthy Computing 2019-05-30
2016 Angelos Oikonomopoulos, Cristiano Giuffrida, Sanjay Rawat, Herbert Bos
Binary Rejuvenation: Applications and Challenges
published pages: 68-71, ISSN: 1540-7993, DOI: 10.1109/MSP.2016.20
IEEE Security & Privacy 14/1 2019-05-30
2017 A. Milburn, H. Bos, C. Giuffrida
SafeInit: Comprehensive and Practical Mitigation of Uninitialized Read Vulnerabilities
published pages: , ISSN: , DOI:
NDSS Symposium 2017 2019-05-30
2016 Robert Seepers, Christos Strydis, Ioannis Sourdis, Chris De Zeeuw
Enhancing Heart-Beat-Based Security for mHealth Applications
published pages: 1-1, ISSN: 2168-2194, DOI: 10.1109/JBHI.2015.2496151
IEEE Journal of Biomedical and Health Informatics 2019-05-30
2016 Koen Koning, Herbert Bos, Cristiano Giuffrida
Secure and Efficient Multi-variant Execution Using Hardware-assisted Process Virtualization.
published pages: , ISSN: , DOI:
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks 2019-05-30
2015 Christos Strydis
Using heartbeats to secure pacemaker communication.
published pages: , ISSN: , DOI:
2016 D. Andriesse, X. Chen, V. van der Veen, A. Slowinska, H. Bos
An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries
published pages: , ISSN: , DOI:
USENIX Security Symbosium 2019-05-30
2016 E. Bosman, K. Razavi, H. Bos, C. Giuffrida
Over the Edge: Silently Owning Windows 10\'s Secure Browser
published pages: , ISSN: , DOI:
Black Hat USA, 2016 2019-05-30
2015 Vassilis Prevelakis
EU-funded research to create secure-by-design architectures.
published pages: 11, ISSN: , DOI:
HiPEAC Info Newsletter, vol. 42 2019-05-30
2016 Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, and Cristiano Giuffrida.
A Tough call: Mitigating Advanced Code-Reuse Attacks at the Binary Level.
published pages: , ISSN: , DOI:
Proceeding of the 37th IEEE Symposium on Security and Privacy 2019-05-30
2016 Marcel Caria
Cyber-Physical Systems: Closing the Gap between Hardware and Software
published pages: , ISSN: , DOI:
ERCIM News No. 106 2019-05-30
2016 Eirini Degkleri, Antonios A. Chariton, Panagiotis Ilia, Panagiotis Papadopoulos, Evangelos P. Markatos
Leveraging DNS for timely SSL Certificate Revocation.
published pages: , ISSN: , DOI:
3rd ACM-W Europe Celebration of Women in Computing 2019-05-30

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "SHARCS" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email ( and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "SHARCS" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.2.1.1.)

DEL4ALL (2020)

Digital Enhanced Learning for ALL

Read More  

SOPHIA (2019)

Socio-physical Interaction Skills for Cooperative Human-Robot Systems in Agile Production

Read More  

STARTUP3 (2020)

Supporting deep-tech based innovative market players to uptake opportunities, upgrade performance and upscale their business

Read More