01/01/2015 to 31/12/2018

 An emerging structure in our information processing-based society is the notion of trusted complex systems interacting via heterogeneous networks with an open, mostly untrusted world. This view characterises a wide variety of systems ranging from the information system of a company to the connected components of a private house, all of which have to be connected with the outside.

It is in particular the case for some aircraft-embedded computer systems, which communicate with the ground through untrusted communication media. Besides, the increasing demand for new capabilities, such as enhanced on-board connectivity, e.g. using mobile devices, together with the need for cost reduction, leads to more integrated and interconnected systems. For instance, modern aircrafts embed a large number of computer systems, from safety-critical cockpit avionics to passenger entertainment. Some systems meet both safety and security requirements. Despite thorough segregation of subsystems and networks, some shared communication resources raise the concern of possible intrusions.

Some techniques have been developed and still need to be investigated to ensure security and confidentiality properties of such systems. Moreover, most of them are model-based techniques operating only at architectural level and provide no guarantee on the actual implementations. However, most security incidents are due to attackers exploiting subtle implementation-level software vulnerabilities. Systems should therefore be analysed at software level as well (i.e. source or executable code), in order to provide formal assurance that security properties indeed hold for real systems.

Because of the size of such systems, and considering that they are evolving entities, the only economically viable alternative is to perform automatic analyses. Such analyses of security and confidentiality properties have never been achieved on large-scale systems where security properties interact with other software properties, and even the mapping between high-level models of the systems and the large software base implementing them has never been done and represents a great challenge. The goal of this project is to develop the new concepts and technologies necessary to meet such a challenge.

This project will allow for the formal verification of security properties of software-intensive embedded systems, using automatic static analysis techniques at different levels of representation: models, source and binary codes. Among expected outcomes of the project will be a set of prototype tools, able to deal with realistic large systems and the elaboration of industrial security evaluation processes, based on static analysis.

Friday, 3 August, 2018


Castilla y León as a leading region in Spain’s cybersecurity thanks to the Cybersecurity Innovation Hub

The Cybersecurity Innovation Hub, just presented on its first 2019 event on the 18th of February in León (Spain) is a digital ecosystem around cybersecurity and advanced technologies, mainly directed at companies to help them carry out their digital transformation in a safe digital environment.

Future Events

ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments
21/02/2019 to 28/02/2019

From February 24th to the 28th, 2097, the ICDS 2019, The Thirteenth International Conference on Digital Society and eGovernments will be host in Athens, Greece.

The event will focus on state-of-the-art public services, e-government services in the context of digital society, Internet and web services, digital intelligence, networking and telecommunications, e-commerce, e-business and other areas.

Global Cyber Security Summit

Global Cyber Security Summit

Developing a Robust Cyber Defense Strategy

Please Note: This program is under Chatham House Rule