Securing the Automotive Edge with REWIRE
Introduction and Challenge The automotive sector is experiencing one of the most profound transformations in…
Introduction and Challenge The automotive sector is experiencing one of the most profound transformations in…
Introduction The vision of smart cities rests on their capacity to connect services, infrastructures, and…
Satellite systems are essential to global communications, navigation, space monitoring, and security, supporting and enabling…
In order to demonstrate the implied relevance in real world use cases, REWIRE applies its…
Risk assessment is only valuable if it leads to effective enforcement. Once risks are identified…
Modern systems are only as secure as their software and firmware. Vulnerabilities in these layers…
As the world becomes increasingly dependent on interconnected vehicles, IoT devices, and smart infrastructures, risk…
Introduction Cybersecurity in modern systems is increasingly about resilience and adaptability. Traditional risk assessment methods,…
Beyond software updates, workloads sometimes need to migrate between hosts—for maintenance, hardware replacement, or load…
Introduction Software updates and secure migration are essential components of modern cybersecurity and resilience. Devices…
Cryptography is only as strong as the management of its keys, and poor practices can…
Cryptography is only as strong as the management of its keys. In Trusted Execution Environments…
The REWIRE Zero-Touch Onboarding framework yields several required benefits, such as scalability since supports mass…
This present blog aims to explore how REWIRE’s Zero-Touch Onboarding operates to strengthen the runtime…
by University of Surrey Nada El Kassem from the University of Surrey introduced secure enrollment…
By Collins During their presentations, Stylianos (Stelios) Basagiannis and Simone Fulvio Rollini from Collins, on…
By NEC and RUB Samira Briongos from NEC and Annika Wilde from Ruhr University Bochum…
This blog post reviews the key points of the presentation of Corentin Verhamme and Francois…
In the series of webinars co-organised by REWIRE and ENTRUST, as a result of the…
The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness Webinar…
UBITECH The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness…
UBITECH The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness…
Suite5 by Spiros Kousouris AI-Based Misbehavior Detection within REWIRE manages the successful integration of AI-based…
AI Trustworthiness remains one of the major challenges from a tech and business perspective. Despite…
by Ilias Aliferis, UNISYSTEMS REWIRE Framework Integration The guarantee of assurance within the REWIRE context…
The REWIRE project and its partners aim to ensure the adherence of all relevant EU-level…
by LSF, NOWADAYS, satellite missions are characterised by escalating complexity. This complexity requires robust cybersecurity…
by Ubitech, The present blog post provides an interplay analysis between the concepts of trust…
by Ubitech, The overall architectural framework of REWIRE project including all the relevant components, defines…
by Kenotom, The future of autonomous driving seems very promising, with the rise of innovative…
by Ubitech, The 2025 Work Programme released by the European Commission (EC) aims to reinforce…
by Libre Space Foundation, The growing number of satellites in orbit, each with critical functions,…
by Odins, Within the context of the REWIRE project, ODINS leads the Smart City Use…
by UCLouvain, Masking is a popular countermeasure against side-channel attacks. The principle of the method…
by KENOTOM, In the modern automotive industry, vehicles are becoming more intelligent with increased needs…
by 8BELLS, In today’s ever-changing and robust hardware and software security market, new trends and…
by University of Surrey, In REWIRE, attribute-based signcryption facilitates device enrolment into an external domain…
by SECURA, SECURA’s focus within the REWIRE project has been on advancing the security of…
by Suite5 Data Intelligence Solutions In our rapidly evolving digital world, the REWIRE project stands…
by COLLINS AEROSPACE In the contemporary landscape, computing systems often control critical infrastructure, exposing them…
by Javier Vicente, Samira Briongos (NEC) Today’s System-of-System (SoS), like those in the REWIRE use…
by University of Surrey REWIRE is based on the Zero-trust notion of “Never trust, always…
by Libre Space Foundation (LSF) For the needs of the REWIRE project, the Libre Space…
by Corentin Verhamme, UCLouvain Embedded systems have become an unavoidable part of modern technology, seamlessly…
by Thanasis Charemis, UBITECH The term MVP was coined and introduced in the research…
by Anthony Feijoo, ODINS The heightened expectations surrounding the Internet of Things (IoT) paradigm have…
by Athanasios Alexopoulos, KENOTOM In the last decades, due to technological advancements in Artificial Intelligence…
By Nikoletta Triantafyllopoulou, Libre Space Foundation Open-source space technology and satellites UPSat: the first-ever Open-source…
by Konstantina Papachristopoulou, Eight Bells Ltd. The Data Format Fusion (DFF) mechanism is a data…
by Ilias Aliferis, UNISYSTEMS Software integration is always a challenging task, since it a complex…
By Spiros Kousouris, SUITE5 The Internet of Things (IoT) has revolutionised the way we interact…
by Dr. Kaitai Liang, TUD The Project REWIRE aims to advance the state-of-the-art in auditing…
by Javier de Vicente Gutiérrez, NEC Laboratories Europe Secure remote computation [1] is the problem…
by Sjors van den Elzen, MSc., SECURA Binary analysis techniques Using state of the art…
by Dr. François Koeune, UCLouvain Generally speaking, the security of cryptographic algorithms is evaluated by…
by Dr. Stylianos Kazazis, UBITECH Rewire Nowadays, trust is the fundamental requirement that needs to…