Opendata, web and dolomites

REACT SIGNED

REactively Defending against Advanced Cybersecurity Threats

Total Cost €

0

EC-Contrib. €

0

Partnership

0

Views

0

Project "REACT" data sheet

The following table provides information about the project.

Coordinator
IDRYMA TECHNOLOGIAS KAI EREVNAS 

Organization address
address: N PLASTIRA STR 100
city: IRAKLEIO
postcode: 70013
website: www.forth.gr

contact info
title: n.a.
name: n.a.
surname: n.a.
function: n.a.
email: n.a.
telephone: n.a.
fax: n.a.

 Coordinator Country Greece [EL]
 Project website http://react-h2020.eu/
 Total cost 2˙726˙461 €
 EC max contribution 2˙726˙461 € (100%)
 Programme 1. H2020-EU.3.7.4. (Improve cyber security)
 Code Call H2020-DS-SC7-2017
 Funding Scheme RIA
 Starting year 2018
 Duration (year-month-day) from 2018-06-01   to  2021-05-31

 Partnership

Take a look of project's partnership.

# participants  country  role  EC contrib. [€] 
1    IDRYMA TECHNOLOGIAS KAI EREVNAS EL (IRAKLEIO) coordinator 477˙500.00
2    SYMANTEC (FRANCE) FR (COURBEVOIE) participant 605˙750.00
3    STICHTING VU NL (AMSTERDAM) participant 520˙125.00
4    RUHR-UNIVERSITAET BOCHUM DE (BOCHUM) participant 409˙375.00
5    EURECOM FR (BIOT) participant 372˙461.00
6    UNIVERSITY OF CYPRUS CY (NICOSIA) participant 341˙250.00

Map

 Project objective

Security is a vital property for every operational system and network. As systems become more powerful and, in many aspects, more complex, advanced cyber-attacks impose new threats for important operations of our society. Computer systems assist core functions of hospitals, energy centers, logistics, and communications, to name a few, and compromising such systems may have severe consequences for everyone of us. Despite the evolution of computer systems, current security defenses-although they have been substantially improved in the last decade-seem not really enough to stop advanced cyber attacks. Systems still suffer from vulnerabilities, despite the many active or passive defenses in place that have been developed in the last decades.

We believe that the core of this problem is that cyber attackers are almost always one step ahead of the cyber security researchers and practitioners. Indeed, cyber attackers are the first to strike, and while researchers try to figure out what happened, attackers have all the time in the world to plan their next strike. In this project we advocate that we should change the rules of the cyber attackers’ game and challenge the asymmetry. Instead of following the cyber attackers, researchers should try to forecast where attackers will strike next and to use this information (i) to fortify potential targets to withstand the attack and (ii) to wire targets up with forensic hooks and make them “forensics ready”. To make all this possible at a reasonable performance cost, we propose selective fortification, a mechanism that combines traditional passive and active defense approaches into a new reactive mode of operation. We take advantage of our rich background in software hardening and instrumentation for immediate delivering effective patches by selectively armoring the vulnerable part of a program.

 Deliverables

List of deliverables.
Threat Model Documents, reports 2019-11-20 16:05:34
Initial Dissemination Plan Documents, reports 2019-11-20 16:05:34
Technology Requirements Documents, reports 2019-11-20 16:05:34
Website and collaboration tools Websites, patent fillings, videos etc. 2019-11-20 16:05:34

Take a look to the deliverables list in detail:  detailed list of REACT deliverables.

 Publications

year authors and title journal last update
List of publications.
2020 Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures
published pages: , ISSN: , DOI:
2020-01-29
2020 Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
NetCAT: Practical Cache Attacks from the Network
published pages: , ISSN: , DOI:
2019-11-20
2019 Andre Pawlowski, Victor van der Veen, Dennis Andriesse, Erik van der Kouwe, Thorsten Holz, Cristiano Giuffrida, Herbert Bos
VPS: Excavating High-Level C++ Constructs from Low-Level Binaries to Protect Dynamic Dispatching
published pages: , ISSN: , DOI:
2019-11-20
2018 Robert Gawlik, Thorsten Holz
SoK: Make JIT-Spray Great Again
published pages: , ISSN: , DOI:
Proceedings of the 12th USENIX Workshop on Offensive Technologies (WOOT 18) 2019-11-20
2018 tephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think
published pages: , ISSN: , DOI:
2019-11-20
2018 Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks
published pages: , ISSN: , DOI:
2019-11-20
2019 Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida
RIDL: Rogue In-Flight Data Load
published pages: , ISSN: , DOI:
2019-11-20
2019 Constantinos Diomedous, Elias Athanasopoulos
Practical Password Hardening based on TLS
published pages: , ISSN: , DOI:
2019-11-20
2019 Platon Kotzias, Leyla Bilge, Pierre-Antoine Vervier, Juan Caballero
Mind Your Own Business: A Longitudinal Study of Threats and Vulnerabilities in Enterprises
published pages: , ISSN: , DOI:
2019-11-20
2019 Kouwe, Erik van der, Gernot Heiser, Dennis Andriesse, Herbert Bos, and Cristiano Giuffrida
SoK: Benchmarking Flaws in Systems Security
published pages: , ISSN: , DOI:
2019-11-20
2019 Österlund, Sebastian, Koen Koning, Pierre Olivier, Antonio Barbalace, Herbert Bos, and Cristiano Giuffrida
KMVX: Detecting Kernel Information Leaks with Multi-Variant Execution
published pages: , ISSN: , DOI:
2019-11-20
2019 Koustubha Bhat, Erik van der Kouwe, Herbert Bos, Cristiano Giuffrida
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations
published pages: , ISSN: , DOI:
2019-11-20
2019 Panagiotis Papadopoulos, Nicolas Kourtellis, Evangelos P. Markatos
Cookie synchronization: Everything you always wanted to know but were afraid to ask
published pages: , ISSN: , DOI:
2019-11-20
2019 Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis
REAPER: Real-time App Analysis for Augmenting the Android Permission System
published pages: , ISSN: , DOI:
Proceedings of the 9th ACM Conference on Data and Application Security and Privacy (ACM CODASPY) 2019-11-20
2019 Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks
published pages: , ISSN: , DOI:
2019-11-20
2019 Panagiotis Papadopoulos, Panagiotis Ilia, Michalis Polychronakis, Evangelos Markatos, Sotiris Ioannidis, Giorgos Vasiliadis
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation
published pages: , ISSN: , DOI:
2019-11-20
2019 Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz
REDQUEEN: Fuzzing with Input-to-State Correspondence
published pages: , ISSN: , DOI:
2019-11-20
2019 Cornelius Aschermann, Tommaso Frassetto, Thorsten Holz, Patrick Jauernig, Ahmad-Reza Sadeghi, Daniel Teuchert
NAUTILUS: Fishing for Deep Bugs with Grammars
published pages: , ISSN: , DOI:
Network and Distributed System Security Symposium (NDSS 2019) 2019-11-20
2018 Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
published pages: , ISSN: , DOI:
2019-11-20
2019 Michalis Pachilakis, Panagiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis
No More Chasing Waterfalls: A Measurement Study of the Header Bidding Ad-Ecosystem
published pages: , ISSN: , DOI:
2019-11-20
2019 Panagiotis Papadopoulos, Panagiotis Ilia, Evangelos Markatos
Truth in Web Mining: Measuring the Profitability and the Imposed Overheads of Cryptojacking
published pages: , ISSN: , DOI:
2019-11-20
2019 Sanghyun Hong, Pietro Frigo, Yigitcan Kaya, Cristiano Giuffrida, Tudor Dumitras
Terminal Brain Damage: Exposing the Graceless Degradation in Deep Neural Networks Under Hardware Fault Attacks
published pages: , ISSN: , DOI:
2019-11-20

Are you the coordinator (or a participant) of this project? Plaese send me more information about the "REACT" project.

For instance: the website url (it has not provided by EU-opendata yet), the logo, a more detailed description of the project (in plain text as a rtf file or a word file), some pictures (as picture files, not embedded into any word file), twitter account, linkedin page, etc.

Send me an  email (fabio@fabiodisconzi.com) and I put them in your project's page as son as possible.

Thanks. And then put a link of this page into your project's website.

The information about "REACT" are provided by the European Opendata Portal: CORDIS opendata.

More projects from the same programme (H2020-EU.3.7.4.)

Cyber-MAR (2019)

Cyber preparedness actions for a holistic approach and awareness raising in the MARitime logistics supply chain

Read More  

FORESIGHT (2019)

Advanced cyber-security simulation platform for preparedness training in Aviation, Naval and Power-grid environments

Read More  

THREAT-ARREST (2018)

THREAT-ARREST Cyber Security Threats and Threat Actors Training - Assurance Driven Multi-Layer, end-to-end Simulation and Training

Read More