Home » R&I Project Hub » R&I Project Hub

R&I Project Hub

Harpocrates

HARPOCRATES, focuses on setting the foundations of digitally blind evaluation systems that will, by design, eliminate proxies such as geography, gender, race, and others and eventually have a tangible impact on building fairer, democratic and unbiased societies. We plan to design several practical cryptographic schemes (Functional Encryption and Hybrid Homomorphic Encryption) for analysing data in a privacy-preserving way.

CROSSCON

Many connected devices that do not have security-related hardware features are used in security-critical scenarios, such as in healthcare, critical infrastructure, or automotive systems, thus becoming valuable targets for cyberattacks.

Enabling Data Enrichment Pipelines for AI-driven Business Products and Services

enRichMyData provides a novel paradigm for building rich, high-quality, valuable datasets to feed Big Data Analytics and AI applications. The paradigm consists of facilitating the specification and scalable execution of data enrichment pipelines, with a focus on supporting various data enrichment operations such as discovery, understanding, selection, cleaning, transformation, and integration of Big Data from a variety of sources.

COBALT

COBALT proposes the introduction of a Common Certification Model (CCM) for European industries, leveraging existing standards and composing a unified cybersecurity namespace for ICT processes. The proposal will uphold the paradigm of Digital Twinning (DT) via the creation of Digital Threads and extend it in a vertical agnostic approach across different industries, including Quantum computing (involving FHG’s Quantum Computer) and I4.0.

CUSTODES

Cybersecurity certification as introduced by the EU Cybersecurity Act (EUCSA) will play a crucial role in increasing the trust to and security of ICT Products, ICT Services and ICT Processes. Cybersecurity certification is a complex process, posing a variety of challenges to the different interested parties.

CERTIFAI

According to the EU Cyber Resilience Act, “hardware and software products are increasingly subject to successful cyberattacks, leading to an estimated global annual cost of cybercrime of EUR 5.5 trillion by 2021”. This is due to a low level of cybersecurity, reflected by widespread vulnerabilities and inadequate approaches for identifying and mitigating the rapidly and constantly evolving cyber threats and vulnerabilities, as well as ensuring continuous compliance with regulations, industry standards, and best practices.

EMERALD

Cloud-based services have grown from basic computing services to complex ecosystems, comprising (virtual) infrastructure, business processes and application code. These advanced services also increasingly leverage the usage of Artificial Intelligence, including Machine Learning or Natural Language Processing techniques, raising the complexity even higher. Due to the cascade of dependencies among the different products and services, the need arose to bring more agility to the certification process of cloud-based services, e.g.

CyberSecDome

Organisations across the sectors significantly benefit from digital transformation to support evolving business models, services and customer experience. Despite the benefits of digital infrastructure adoption, there are numerous security challenges that could pose any digital disruption and risks for the critical service delivery and overall business continuity.

COCOON

The convergence of Information Technology (IT) with Operational Technology (OT) environments for digitising mission-critical stability and flexibility of Electrical Power and Energy System (EPES) operations as well as new Ancillary Services (AS) business markets through Distributed Renewable Energy Sources (DRES), has undoubtedly expanded the cyber-attack spectrum in modern power grids with intrinsic cyber-physical properties.

QUBIP

The exciting frontiers opened by the development of quantum computers (QC) come at the cost of breaking the foundations of current digital security. The research community is working to the definition of post-quantum cryptography (PQC) to counteract this threat. However, the transition to PQC is delicate and takes time because it impacts many functions, algorithms, and protocols in a-priori unknown cascade of dependencies.

Pages