WEBINARS
REWIRE Cybersecurity Awareness Webinar Series
Trust or Bust: Reinforcing the IoT Interoperable Security Stack with Efficient Secure Lifecycle Management Capabilities – The RISC-V Opportunity
Join REWIRE Cybersecurity Awareness Webinar Series
As IoT ecosystems scale to include millions of autonomous devices, ensuring security, trust, and privacy becomes critical. A key challenge is how to evaluate and maintain trust across complex, interconnected systems—from individual edge components to large-scale “Systems-of-Systems.”
The REWIRE project addresses this by developing lightweight, scalable attestation and cryptographic mechanisms that quantify device trustworthiness across the compute continuum. Leveraging RISC-V hardware and Keystone TEE, REWIRE introduces the first attestation extensions enabling runtime integrity verification with minimal performance impact. These innovations form the basis of a harmonized Trusted Computing Base and an interoperable security stack designed to support secure, trusted IoT environments.
Explore these breakthroughs in our dedicated webinar series who represents a well-defined, targeted and collaborative series of training events co-organized by two EU-funded research projects: REWIRE and ENTRUST.
The series of webinars aim to focus on five concrete emerging aspects and trends on cybersecurity for complex IoT ecosystem environments, showcasing real-world implications and demonstrating the solutions developed within the context of REWIRE and ENTRUST.
The REWIRE Cybersecurity Awareness Webinar Series is a targeted set of interactive sessions co-organized by the EU-funded projects REWIRE and ENTRUST. The series will address five high-impact topics shaping the future of IoT cybersecurity. Experts from academia and industry will share real-world applications, demonstrate project results, and explore trends in:
- Artificial Intelligence (AI) Misbehaviour Detection
- Cryptography for Embedded Systems
- Risk Assessment and Threat Modelling
- Trustworthiness Extensions
- Formal Verification in IoT Ecosystems
About the Projects
REWIRE
To address the challenge of cyber threats like viruses, data breaches and denial of service attacks in an increasingly digitalised and connected world, the EU-funded REWIRE project introduces a holistic cybersecurity platform that can continuously monitor open-source and open-specification hardware and software for IoT devices, assessing potential threats. The platform will provide protection throughout the IoT device lifetime. REWIRE will also introduce a cybersecurity certification procedure that is in line with the new EU cybersecurity regulations. The novel solutions will be tested across three pilot environments – automotive, smart cities and smart satellites – paving the way for more secure data exchange.
More info: https://www.rewire-he.eu/

ENTRUST
ENTRUST aims to ensure end-to-end trust management of medical devices strengthening trust & privacy in the entire medical ecosystem. The breakthrough solutions that ENTRUST provides, will not limit the applicability of connected medical devices, by enclosing to them cybersecurity features including formally verified trust models, risk assessment process, secure lifecycle procedures, security policies, technical recommendations and the first-ever real-time Conformity Certificates to safeguard connected medical devices.
More info: https://www.entrust-he.eu/

REWIRE Cybersecurity Awareness Webinar Series
📅 Agenda Highlights
📌 Webinar 1: “Reinforcing Trust Assessment Mechanisms through AI-based Misbehavior Detection Mechanisms”
When 🗓️ 9 May 2025 | 🕐 13:00-14:00pm CEST
An insightful session focusing on how AI-based Misbehavior Detection Mechanisms can enhance the accuracy of dynamic trust assessment frameworks when considered as an additional trust source.
Agenda and Speakers:
- 13.00-13.15: Welcome and Opening Keynote
- Title: REWIRE Vision Towards Trustworthy “Systems-of-System”
- Speakers: Sofianna Menesidou, Athanasios Charemis, Thanassis Giannetsos, UBITECH
- 13.15-13.50: Main Session
- Title: REWIRE AI-based Misbehavior Detection as a Trust
- Speaker: Spiros Kousouris, Suite5
- 13.50-14.00: Closing Remarks and Q&A Session
- 13.00-13.15: Welcome and Opening Keynote
Where? You will receive the link to the online workshop once you enrolled to the Webinars.
📌 Webinar 2: “Reinforcing IoT Interoperable Security Stack through Advanced Crypto and Attestation Mechanisms”
When 🗓️ 12 May 2025 | 🕐 12:00- 15.30 CEST
A packed event featuring three back-to-back sessions:
A holistic forward-looking description of harmonized Trusted Computing Base enabling the compute continuum-wide trust quantification anchored to decentralized Roots of Trust.
Agenda and Speakers:
- 12.00-12.15: REWIRE/ENTRUST Vision Towards Trustworthy “Systems-of-Systems”
- Speakers: Sofianna Menesidou, Athanasios Charemis, Thanassis Giannetsos, UBITECH
- 12:15 – 12:45: Securing SW/FW Update Process with Authenticated Encryption and Strong Leakage Protection – the LRBC Scheme
- Speakers: Francois Koeune, Corentin Verhamme, UCLouvain
- 12:45 – 13:15: Secure SW Update on Trusted Applications in RISC-V Systems
- Speakers: Samira Brongos (NEC), Annika Wilde (Rugh University of Bochum)
- 13:15 – 13:45: Zero Touch Onboarding of Trustworthy Embedded Systems
- Speakers: Nada El Kasseem, Yalan Wang, Surrey University
- 13:45 14:15: Reinforcing Conformity Certificate Management with Enhanced Privacy
- Speakers: Antonio Skarmeta, Jesus Garcia Rodrigues, University of Murcia
- 14:15 – 14:45: Efficient and Scalable Attestation Mechanisms for RISC-V Devices
- Speakers: Giorgos Pekridis, Nikos Varvitsotis, Stefanos Vasileiadis, UBITECH
- 14:45 – 15:15: Dynamic Trust Assessment Framework
- Speaker: Nikos Fotos, UBiTECH
Where? You will receive the link to the online workshop once you enrolled to the Webinars.
📌 Webinar 3: “Compositional Verification and Validation Toolchain for Design-Time System Assurances”
When 🗓️ 19th May 2025 | 🕐 12:00- 13.30 CEST
On the use of Compositional Validation and Verification tools for not only ensuring design-time correctness, of HW configurations to be synthesized and deployed to RISC-V architecture devices, but also limiting the design space of runtime device state verification, thus, allowing for more efficient attestation processes.
Agenda and Speakers:
- 12.00-12.15: Welcome and Opening Keynote
- Title: REWIRE Vision Towards Trustworthy “Systems-of-System”
- Speakers: Sofianna Menesidou, Athanasios Charemis, Thanassis Giannetsos, UBITECH
- 12.15-13.25: Main Session
- 12.15-12.45: REWIRE Compositional Verification and Validation Capabilities
- Speakers: Simone Fulvio Rolline, Stelios Basayiannis, COLLINS
- 12.45-13.25: ENTRUST Formal Verification of Secure Device Enrollment
- Speakers: Leonard Tudorache, Ivan Kurtev, TU/e
- 12.15-12.45: REWIRE Compositional Verification and Validation Capabilities
- 13.25-13.30: Closing Remarks and Q&A Session
- 12.00-12.15: Welcome and Opening Keynote
Where? You will receive the link to the online workshop once you enrolled to the Webinars.
Register today
Express your interest by sending an email to [email protected] with the following details:
- First name
- Last name
- Organisation
- Sector/Affiliation
- Industry
- Academia
- Healthcare Provider
- Technology Provider
- Standards Body
- Policymaker
- Other
- Job Title/Role
- Attendance:
- Webinar 1: “Reinforcing Trust Assessment Mechanisms through AI-based Misbehavior Detection Mechanisms”
- Webinar 2: Webinar 2: “Reinforcing IoT Interoperable Security Stack through Advanced Crypto and Attestation Mechanisms”
- Webinar 3: Webinar 3: “Compositional Verification and Validation Toolchain for Design-Time System Assurances”
Any data you provide, will only be used for purposes of the organisation and participation of the webinars.
Sign up for REWIRE
Newsletter