#REWIREBlog

REWIRE: Elevating Embedded Systems Security

by 8BELLS,   In today’s ever-changing and robust hardware and software security market, new trends and…

Leveraging Attribute-Based Signcryption for Designing Selectively Disclosed SSI Verifiable Presentations

by University of Surrey,   In REWIRE, attribute-based signcryption facilitates device enrolment into an external domain…

REWIRE: Innovative approaches to firmware security

by SECURA,   SECURA’s focus within the REWIRE project has been on advancing the security of…

Leveraging AI based Misbehaviour Detection for risk indicators in REWIRE project

by Suite5 Data Intelligence Solutions In our rapidly evolving digital world, the REWIRE project stands…

Formal Verification in REWIRE

by COLLINS AEROSPACE In the contemporary landscape, computing systems often control critical infrastructure, exposing them…

Why customization of TEEs is needed?

by Javier Vicente, Samira Briongos (NEC) Today’s System-of-System (SoS), like those in the REWIRE use…

Zero-Touch Onboarding of IoT Devices to Support Trustworthy Computing

by University of Surrey REWIRE is based on the Zero-trust notion of “Never trust, always…

Smart Satellites: A closer look at the applicability scenarios for the REWIRE initiative

by Libre Space Foundation (LSF) For the needs of the REWIRE project, the Libre Space…

LWC: One for Two

by Corentin Verhamme, UCLouvain Embedded systems have become an unavoidable part of modern technology, seamlessly…

REWIRE’s MVP – Minimum Viable Product

by Thanasis Charemis, UBITECH                                    The term MVP was coined and introduced in the research…

Sign up for REWIRE
Newsletter

Be the first to learn about project progress updates, results, events, publications, and more!
*By signing up to receive the periodical newsletter you accept REWIRE Privacy & Cookies Policy