Deliverables
No./Title Download
D1.1 - State of the art, project concept and requirements
D1.2 - ASTRID architecture
D2.1 - Programmable Components and Context Models
D2.3 - Forensic Architecture
D2.4 - First public release of the secure orchestration components
D3.2 - First report on security algorithms and tools
D4.1 - Validation and demonstration scenarios
Research papers
Authors Title Publication Details Download from Zenodo
Stefan Covaci, Riccardo Rapuzzi, Matteo Repetto, Fulvio RissoA New Paradigm to Address Threats for Virtualized ServicesIEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), July, 23rd-27th, Tokyo, Japan, No pages, 978-1-5386-2667-2/0730-3157
Alessandro Carrega, Matteo Repetto, Fulvio Risso, Stefan Covaci, Anastasios Zafeiropoulos, Thanassis Giannetsos and Orazio ToscanoSituational Awareness in Virtual Networks: the ASTRID ApproachIEEE 7th International Conference on Cloud Networking (CloudNet), October, 22nd-24th, Tokyo, Japan, No pages,
Stefan Covaci, Matteo Repetto, and Fulvio RissoTowards Autonomous Security Assurance in 5G InfrastructuresIEICE Transactions on Communications, , Tokyo, Japan, No pages, 0916-8516/1745-1345
R. Bolla, A. Carrega, M. RepettoAn abstraction layer for cybersecurity context2019 International Conference on Computing, Networking and Communications (ICNC), February 18th-21st, 2019, Honolulu, HI, USA, No pages, 978-1-5386-9223-3
Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo TumoloAccelerating Linux Security with eBPF iptablesProceedings of the ACM SIGCOMM 2018 Conference (SIGCOMM 2018), , Budapest, Hungary, No pages,
Matteo Bertrone, Sebastiano Miano, Jianwen Pi, Fulvio Risso, Massimo TumoloToward an eBPF-based clone of iptablesNetdev 0x12, The Technical Conference on Linux Networking, , Montreal, Canada, No pages,
Sebastiano Miano, Matteo Bertrone, Fulvio Risso, Massimo Tumolo, Mauricio Vasquez BernalCreating Complex Network Services with eBPF: Experience and Lessons LearnedIEEE International Conference on High Performance Switching and Routing (HPSR 2018), , Bucarest, Romania, No pages,
N. Koutroumpouchos, C. Ntatogian, S.A. Menesidou, K. Liang, P. Gouvas, C. Xenakis, T. GiannetsosSecure Edge Computing with Lightweight Control-Flow Property-based Attestation1st International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-defined and Virtualized Infrastructures (co-located with IEEE Conference on Network Softwarization), June 2019, Paris, France, No pages,
T. Giannetsos, I. KrontirisSecuring V2X Communications for the Future - Can PKI Systems offer the answer?1st Location Privacy Workshop held in conjunction with the 14th International Conference on Availability, Reliability and Security, August 2019, UK, No pages,
Constantinos Pouyioukka; Thanassis Giannetsos; Weizhi MengCrowdLED: Towards Crowd-Empowered and Privacy-Preserving Data Sharing Using Smart ContractsIFIP International Conference on Trust Management, , Copenhagen, Denmark, No pages, 978-3-030-33716-2
Whitepapers
Title Download
Beyond the security perimeter model: Shedding light on cloud services
Other
Coming soon...