Page tree

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

(F-Secure, Arcada, Aalto, UH: WP2-01, WP2-03)

Changes to Scenario

The initial high-level goals remained valid. We haven’t been able to allocate work for embedded code analysis and for handling obfuscation techniques yet. A new high-priority item in the plan is to support near-real-time processing of unknown APK’s seen in user devices to minimize the time gap between appearance of new malicious or unwanted APK’s and the capability of detection / blocking of those by the protection software. This requires serious changes to the APK handling process and architecture. Another idea to be explored in 2018 is detection and analysis of outlier packages, in particular, for improving the training sets and for studying potentially new attack techniques (in collaboration between Arcada and FSC).

...

Scenario 2 – Cloud Assisted Management for IoT

(Trustonic, Aalto: WP2-01, WP2-03)

Changes to Scenario

As part of the feasibility study, the Scenario 2 partners refined the scope of the scenario by identifying the essential roles in the IoT secure update ecosystem and performed a gap analysis to identify the how well state-of-the-art software update techniques (geared for different settings) meet security requirements under specific assumptions. The feasibility study identified limitations in current techniques that prevent them from meeting the operational and security requirements of all stakeholders of IoT deployments, and thus prevents existing techniques from being directly incorporated into large-scale IoT deployments. Here we summarize concrete requirements identified by the feasibility study that the software update architecture must meet. These requirements are consistent with the original considerations identified for Scenario 2.

...

Scenario 3 – Cloud-Assisted Trust Relation Database

(SSH, UH: WP2-02)

Changes to Scenario

The use cases described in the original version assume a single owner of a trust relation database which at least in principle is allowed to see all trust relations. Of course, this does not mean that this owner can have access to the corresponding private keys.

...

Scenario 4 – DDoS Detection and Mitigation in Cloud Assisted Services (formely Fake Base Station Detection Using Cloud Services)

(Aalto, Nokia: WP2-03)

Changes to Scenario

This scenario was heavily changed, due to severe difficulties in achieving the initially proposed goals.

...

(Nokia, Arcada, F-Secure, Aalto, UH: WP2-03)

Changes to Scenario

No changes to the scenario.

...