#REWIREBlog

Securing the Automotive Edge with REWIRE

Introduction and Challenge  The automotive sector is experiencing one of the most profound transformations in…

Securing Future’s Smart Cities with REWIRE

Introduction  The vision of smart cities rests on their capacity to connect services, infrastructures, and…

Securing Smart Satellites with REWIRE

Satellite systems are essential to global communications, navigation, space monitoring, and security, supporting and enabling…

REWIRE Risk Assessment – Automotive Use Case

In order to demonstrate the implied relevance in real world use cases, REWIRE applies its…

Instantiation of REWIRE MSPL-based Security Policies

Risk assessment is only valuable if it leads to effective enforcement. Once risks are identified…

REWIRE SW/FW Vulnerability Analysis

Modern systems are only as secure as their software and firmware. Vulnerabilities in these layers…

REWIRE Continuous and Modular Risk Assessment

As the world becomes increasingly dependent on interconnected vehicles, IoT devices, and smart infrastructures, risk…

REWIRE Risk Assessment Architecture

Introduction Cybersecurity in modern systems is increasingly about resilience and adaptability. Traditional risk assessment methods,…

REWIRE Functionalities regarding SW Update and Migration (Part 2)

Beyond software updates, workloads sometimes need to migrate between hosts—for maintenance, hardware replacement, or load…

REWIRE Functionalities regarding SW Update and Migration (Part 1)

Introduction Software updates and secure migration are essential components of modern cybersecurity and resilience. Devices…

The Types of Keys within the REWIRE Ecosystem

Cryptography is only as strong as the management of its keys, and poor practices can…

REWIRE Harmonised Key Management

Cryptography is only as strong as the management of its keys. In Trusted Execution Environments…

REWIRE ZTO Workflow in Practice

The REWIRE Zero-Touch Onboarding framework yields several required benefits, such as scalability since supports mass…

REWIRE Zero-Touch Onboarding

This present blog aims to explore how REWIRE’s Zero-Touch Onboarding operates to strengthen the runtime…

Secure Enrollment in REWIRE

by University of Surrey Nada El Kassem from the University of Surrey introduced secure enrollment…

Formal Verification within the REWIRE Context

By Collins During their presentations, Stylianos (Stelios) Basagiannis and Simone Fulvio Rollini from Collins, on…

Secure Software Update on Trusted Applications in RISC-V

By NEC and RUB Samira Briongos from NEC and Annika Wilde from Ruhr University Bochum…

LRBC Scheme on Securing SW/FW Update Process

This blog post reviews the key points of the presentation of Corentin Verhamme and Francois…

Trust Concepts in REWIRE & ENTRUST

In the series of webinars co-organised by REWIRE and ENTRUST, as a result of the…

REWIRE’s Dynamic Trust Assessment Framework

The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness Webinar…

Configuration Integrity Verification for REWIRE Project

UBITECH The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness…

REWIRE Demo: Setup on StarFive VisionFive 2

UBITECH   The present blog comes from the presentations took place during the REWIRE Cybersecurity Awareness…

AI Misbehaviour Detection within REWIRE Context

Suite5 by Spiros Kousouris AI-Based Misbehavior Detection within REWIRE manages the successful integration of AI-based…

Trustworthy AI within the REWIRE Context

AI Trustworthiness remains one of the major challenges from a tech and business perspective. Despite…

REWIRE on Operational Assurance

by Ilias Aliferis, UNISYSTEMS REWIRE Framework Integration The guarantee of assurance within the REWIRE context…

REWIRE Legal Aspects: A Brief Overview

The REWIRE project and its partners aim to ensure the adherence of all relevant EU-level…

Smart Satellites: A REWIRE Use Case Story with edge results

by LSF, NOWADAYS, satellite missions are characterised by escalating complexity. This complexity requires robust cybersecurity…

REWIRE Ethics and Legal Roadmap

by Ubitech, The present blog post provides an interplay analysis between the concepts of trust…

Putting the REWIRE Framework at Work

by Ubitech, The overall architectural framework of REWIRE project including all the relevant components, defines…

Security Mechanisms against Vehicle Cyberattacks

by Kenotom, The future of autonomous driving seems very promising, with the rise of innovative…

Cybersecurity in the European Commission’s 2025 Work Programme

by Ubitech, The 2025 Work Programme released by the European Commission (EC) aims to reinforce…

REWIRE: Securing Software Updates for Satellites

by Libre Space Foundation, The growing number of satellites in orbit, each with critical functions,…

IoT Security: A Smart City Use Case

by Odins, Within the context of the REWIRE project, ODINS leads the Smart City Use…

Dealing with Challenges of Masking

by UCLouvain, Masking is a popular countermeasure against side-channel attacks. The principle of the method…

ΟΤΑ SW Updates on Modern Vehicles

by KENOTOM,   In the modern automotive industry, vehicles are becoming more intelligent with increased needs…

REWIRE: Elevating Embedded Systems Security

by 8BELLS,   In today’s ever-changing and robust hardware and software security market, new trends and…

Leveraging Attribute-Based Signcryption for Designing Selectively Disclosed SSI Verifiable Presentations

by University of Surrey,   In REWIRE, attribute-based signcryption facilitates device enrolment into an external domain…

REWIRE: Innovative approaches to firmware security

by SECURA,   SECURA’s focus within the REWIRE project has been on advancing the security of…

Leveraging AI based Misbehaviour Detection for risk indicators in REWIRE project

by Suite5 Data Intelligence Solutions In our rapidly evolving digital world, the REWIRE project stands…

Formal Verification in REWIRE

by COLLINS AEROSPACE In the contemporary landscape, computing systems often control critical infrastructure, exposing them…

Why customization of TEEs is needed?

by Javier Vicente, Samira Briongos (NEC) Today’s System-of-System (SoS), like those in the REWIRE use…

Zero-Touch Onboarding of IoT Devices to Support Trustworthy Computing

by University of Surrey REWIRE is based on the Zero-trust notion of “Never trust, always…

Smart Satellites: A closer look at the applicability scenarios for the REWIRE initiative

by Libre Space Foundation (LSF) For the needs of the REWIRE project, the Libre Space…

LWC: One for Two

by Corentin Verhamme, UCLouvain Embedded systems have become an unavoidable part of modern technology, seamlessly…

REWIRE’s MVP – Minimum Viable Product

by Thanasis Charemis, UBITECH                                    The term MVP was coined and introduced in the research…

Smart Scenarios: A gap on IoT’s future

by Anthony Feijoo, ODINS The heightened expectations surrounding the Internet of Things (IoT) paradigm have…

“Decentralized” vs “Centralized” Automotive Architectures – REWIRE Demo

by Athanasios Alexopoulos, KENOTOM In the last decades, due to technological advancements in Artificial Intelligence…

Smart Satellites: Secure software updates for spacecraft applications and services

By Nikoletta Triantafyllopoulou, Libre Space Foundation Open-source space technology and satellites UPSat: the first-ever Open-source…

Data Format Fusion Mechanism

by Konstantina Papachristopoulou, Eight Bells Ltd. The Data Format Fusion (DFF) mechanism is a data…

The continuous integration and development process of REWIRE towards the assurance of the secure lifecycle of IoT devices

by Ilias Aliferis, UNISYSTEMS Software integration is always a challenging task, since it a complex…

AI-based Misbehavior detection in IoT environments

By Spiros Kousouris, SUITE5 The Internet of Things (IoT) has revolutionised the way we interact…

Blockchain, Oracles, and Trust in Project REWIRE

by Dr. Kaitai Liang, TUD The Project REWIRE aims to advance the state-of-the-art in auditing…

Secure Remote Computation and Trusted Execution Environments

by Javier de Vicente Gutiérrez, NEC Laboratories Europe Secure remote computation [1] is the problem…

Embedded software security analysis in REWIRE

by Sjors van den Elzen, MSc., SECURA Binary analysis techniques Using state of the art…

Addressing the risk of physical-level attacks

by Dr. François Koeune, UCLouvain Generally speaking, the security of cryptographic algorithms is evaluated by…

REWIRE behind the Scenes

by Dr. Stylianos Kazazis, UBITECH Rewire Nowadays, trust is the fundamental requirement that needs to…

Sign up for REWIRE
Newsletter

Be the first to learn about project progress updates, results, events, publications, and more!
*By signing up to receive the periodical newsletter you accept REWIRE Privacy & Cookies Policy