#REWIREBlog

Dealing with Challenges of Masking

by UCLouvain, Masking is a popular countermeasure against side-channel attacks. The principle of the method…

ΟΤΑ SW Updates on Modern Vehicles

by KENOTOM,   In the modern automotive industry, vehicles are becoming more intelligent with increased needs…

REWIRE: Elevating Embedded Systems Security

by 8BELLS,   In today’s ever-changing and robust hardware and software security market, new trends and…

Leveraging Attribute-Based Signcryption for Designing Selectively Disclosed SSI Verifiable Presentations

by University of Surrey,   In REWIRE, attribute-based signcryption facilitates device enrolment into an external domain…

REWIRE: Innovative approaches to firmware security

by SECURA,   SECURA’s focus within the REWIRE project has been on advancing the security of…

Leveraging AI based Misbehaviour Detection for risk indicators in REWIRE project

by Suite5 Data Intelligence Solutions In our rapidly evolving digital world, the REWIRE project stands…

Formal Verification in REWIRE

by COLLINS AEROSPACE In the contemporary landscape, computing systems often control critical infrastructure, exposing them…

Why customization of TEEs is needed?

by Javier Vicente, Samira Briongos (NEC) Today’s System-of-System (SoS), like those in the REWIRE use…

Zero-Touch Onboarding of IoT Devices to Support Trustworthy Computing

by University of Surrey REWIRE is based on the Zero-trust notion of “Never trust, always…

Smart Satellites: A closer look at the applicability scenarios for the REWIRE initiative

by Libre Space Foundation (LSF) For the needs of the REWIRE project, the Libre Space…

Sign up for REWIRE
Newsletter

Be the first to learn about project progress updates, results, events, publications, and more!
*By signing up to receive the periodical newsletter you accept REWIRE Privacy & Cookies Policy