
EURECOM
EURECOM
Funder
123 Projects, page 1 of 25
Open Access Mandate for Publications and Research data assignment_turned_in Project2018 - 2023Partners:EURECOMEURECOMFunder: European Commission Project Code: 771844Overall Budget: 1,991,500 EURFunder Contribution: 1,991,500 EURThe vast majority of research in computer security is dedicated to the design of detection, protection, and prevention solutions. While these techniques play a critical role to increase the security and privacy of our digital infrastructure, it is enough to look at the news to understand that it is not a matter of "if" a computer system will be compromised, but only a matter of "when". It is a well known fact that there is no 100% secure system, and that there is no practical way to prevent attackers with enough resources from breaking into sensitive targets. Therefore, it is extremely important to develop automated techniques to timely and precisely analyze computer security incidents and compromised systems. Unfortunately, the area of incident response received very little research attention, and it is still largely considered an art more than a science because of its lack of a proper theoretical and scientific background. The objective of BITCRUMBS is to rethink the Incident Response (IR) field from its foundations by proposing a more scientific and comprehensive approach to the analysis of compromised systems. BITCRUMBS will achieve this goal in three steps: (1) by introducing a new systematic approach to precisely measure the effectiveness and accuracy of IR techniques and their resilience to evasion and forgery; (2) by designing and implementing new automated techniques to cope with advanced threats and the analysis of IoT devices; and (3) by proposing a novel forensics-by-design development methodology and a set of guidelines for the design of future systems and software. To provide the right context for these new techniques and show the impact of the project in different fields and scenarios, BITCRUMBS plans to address its objectives using real case studies borrowed from two different domains: traditional computer software, and embedded systems.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::cca4eff1242fba624f2086b5b543eca8&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::cca4eff1242fba624f2086b5b543eca8&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euOpen Access Mandate for Publications assignment_turned_in Project2015 - 2020Partners:EURECOMEURECOMFunder: European Commission Project Code: 670896Overall Budget: 2,358,770 EURFunder Contribution: 2,358,770 EURAdvances in theory, integration techniques and standardization have led to huge progress in wireless technologies. Despite successes with past and current (5G) research, new paradigms leading to greater spectral efficiencies and intelligent network organizations will be in great demand to absorb the continuous growth in mobile data. Our ability to respond suitably to this challenge in the next decade will ensure sustained competitiveness in the digital economy. With few exceptions such as ad-hoc topologies, classical wireless design places the radio device under the tight control of the network. Promising technologies envisioned in 5G such as (i) Coordinated MultiPoint (CoMP) techniques, (ii) Massive MIMO, or (ii) Millimeter-wave (MMW) by-and-large abide by this model. Pure network-centric designs, such as optical cloud-supported ones raise cost and security concerns and do not fit all deployment scenarios. Also they make the network increasingly dependent on a large amount of signaling and device-created measurements. Our project envisions a radically new approach to designing the mobile internet, which taps into the device’s new capabilities. Our approach recasts devices as distributed computational nodes solving together multi-agent problems, allowing to maximize the network performance by exploiting local measurement and information exchange capabilities. The success of the project relies on the understanding of new information theory limits for systems with decentralized information, the development of novel device communication methods, and advanced team-based statistical signal processing algorithms. The potential gains associated with exploiting the devices’ collective, network friendly, intelligence are huge. The project will demonstrate long-term impact of the new paradigm, in pushing the frontiers of mobile internet performance, as well as short- to mid-term impact through its adaptation to currently known communications scenarios and techniques.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::8e73da6a0b15fa481d16b8bf17421c47&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda__h2020::8e73da6a0b15fa481d16b8bf17421c47&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euOpen Access Mandate for Publications and Research data assignment_turned_in Project2023 - 2028Partners:EURECOMEURECOMFunder: European Commission Project Code: 101077361Overall Budget: 1,499,060 EURFunder Contribution: 1,499,060 EURSENSIBILITÉ describes a novel theory for distributed computing of nonlinear functions over communication networks. Motivated by the long-lasting open challenge to invent technologies that scale with the network size, this intriguing and far-reaching theory elevates distributed encoding and joint decoding of information sources, to the critical network computing problem for a class of network topologies and a class of nonlinear functions of dependent sources. Our theory will elevate distributed communication to the realm of distributed computation of any function over any network. Overall, this problem requires communicating correlated messages over a network, coding distributed sources for computation of functions, and meeting the desired fidelity given a distortion criterion for the given function. In such a scenario, the classical separation theorem of Claude Shannon, which modularizes the design of source and channel codes to achieve the capacity of communication channels, is in general inapplicable. SENSIBILITÉ envisions a networked computation framework for nonlinear functions. It will use the structural information of the sources and the decomposition of nonlinear functions for efficient distributed compression algorithms. For scalability, it will design message sets that are oblivious to the protocol information. For parsimonious representations across networks, it will grip the curious trade-off between quantization and compression of functions. SENSIBILITÉ has a contemporary vision of network-driven functional compression via accounting for the description length and time complexities towards alleviating large-scale, real-world networks of the future. The advanced theory will be tested in a real-life setting on applications of grand societal impact, such as over-the-air computing for the internet-of-things, massive data compression for computational imaging, and zero-error computation for real-time holographic communications.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::568fee97e86b3f3d3bf89966f295cb69&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::568fee97e86b3f3d3bf89966f295cb69&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euOpen Access Mandate for Publications and Research data assignment_turned_in Project2023 - 2024Partners:EURECOMEURECOMFunder: European Commission Project Code: 101101031Funder Contribution: 150,000 EURCommunicating video-on-demand (VoD) over various networks is very costly. VoD drives up the costs for purchasing bandwidth and overprovisioning infrastructures, as well as the costs to content providers (Netflix, Amazon, etc.) that must pay large fees to network operators to deliver content to their clients. To reduce the massive VoD fees, networks employ caches. Our findings in our ERC project DUALITY reveal a new method of exploiting caches that boosts the performance of various networks. We wish to explore the practical ramifications of these findings in practical networks. This project will explore the algorithmic and testing work needed to render these ideas practical.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::1e8422f2ab21582fce6c95d8c3acc5bd&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::1e8422f2ab21582fce6c95d8c3acc5bd&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.euOpen Access Mandate for Publications and Research data assignment_turned_in Project2024 - 2025Partners:EURECOMEURECOMFunder: European Commission Project Code: 101158350Funder Contribution: 150,000 EURMobile malware is getting harder and harder to detect. This is one of the reasons why malicious apps regularly appear on the official Play Store, despite the considerable effort Google and the security industry put into early detection and validation of each application. To mitigate this problem, EVADES aims to combine a number of novel techniques developed as part of the ERC BitCrumbs project into the first evasion-resilient, scalable, and maintainable sandbox to analyze Android applications. Our current prototype outperforms all open-source and commercial competitors, showing a significant technological advantage over the current market. We already performed preliminary experiments and the results we obtained are as worrisome for users as they are encouraging to justify a business idea. In fact, 70% of the Android malware we tested with our technology implemented some form of evasion targeting existing malware analysis tools. This shows that the data we are using today to decide whether applications are benign or malicious is completely unreliable. The EVADES project will focus on transforming our prototype server-side component into production software, developing the missing client-side components required to produce an MVP, and exploring different ways we could sell and monetize our technology. We are certain that our solution has the potential to revolutionize the Android security market by providing a more accurate and scalable way to collect information about the behavior of applications. This is paramount for any mobile security solution, as well as for existing and future machine learning-based approaches that today struggle to use the ‘unreliable‘ information provided by existing dynamic analysis systems.
All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::67390636e9e1737063a3864c5f7e86ba&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eumore_vert All Research productsarrow_drop_down <script type="text/javascript"> <!-- document.write('<div id="oa_widget"></div>'); document.write('<script type="text/javascript" src="https://www.openaire.eu/index.php?option=com_openaire&view=widget&format=raw&projectId=corda_____he::67390636e9e1737063a3864c5f7e86ba&type=result"></script>'); --> </script>
For further information contact us at helpdesk@openaire.eu
chevron_left - 1
- 2
- 3
- 4
- 5
chevron_right