Momentum! Key Exploitable Results

CyberSec4Europe’s legacy beyond the end of the project can be seen in the results of the work carried out by all partners over the past four years.

In a series of reports, we highlighted the individual and joint exploitation and innovation plans, involving assets and solutions across the different project domains, ranging from, for example, maritime transport to the Flagship cyber range challenges. As CyberSec4Europe comprises diverse organisations – from software vendors, commercial businesses, universities, research institutes, SMEs, legal and consultancy firms to not-for-profit organisations – each type of partner has evolved exploitation strategies in line with their own needs and opportunities. And we celebrate each and every one!

At Momemtum! we showcased six of the key exploitable assets and solutions over the course of the first day. As difficult as it was to narrow down the results to six, our independent jury members – Stelian Brad from Cluj IT Cluster and Stefan Bumerl of CRYPTAS it-Security GmbH – identified just two to go forward to the European Commission’s Horizon Results Platform.

OBSIDIAN Sharemind MPC Extensions

Improving the fight against banking fraud ensuring GDPR compliance and banking secrecy
Liina Kamm, Cybernetica AS
(Authors: Linda Kamm, Baldur Kubo, Cybernetica; Mederic Collas, Informatique Banque Populaire)

Flagship

A realistic cyber security exercise using a feature rich live cyber range
Jani Päijänen, JAMK

Replica TEE

Enabling Seamless Replication of SGX Enclaves in the Cloud
Alessandro Sforzin, NEC Laboratories Europe GmbH
(Authors: Claudio Soriente, Ghassan Karame, Wenting Li, Sergey Fedorov, NEC)

CaPe

A consent-based personal data suite to manage personal data in compliance with the GDPR
Vincenzo Savarino, Engineering Ingegneria Informatica S.p.A.

EBIDS (An ensemble-based intrusion detection system)

Pushing Intelligence in Threat Sharing Platforms
Giuseppe Manco, Consiglio Nazionale delle Ricerche (CNR)

SecCerts: datamining security certification documents

An analysis tool for certificates of security products
Petr Švenda, Masaryk University