Demo: Detecting Third-Party Library Problems with Combined Program Analysis
The Telecommunication Systems Institute
Grigoris Ntousakis, Sotiris Ioannidis, and Nikos Vasilakis
Demo: Detecting Third-Party Library Problems with Combined Program AnalysisCertification Requirements for Supply Chain Services
To be provided soon
ACM/SIGSAC Conference on Computer and Communications Security (CCS)
Date of the conference:
Is this a peer-reviewed publication?
Is this a joint public/private publication?
Project Coordinator: Sofoklis Efremidis
Institution: Maggioli SPA
Duration: 36 months
Participating organisations: 14
Number of countries: 10
📢defining Assets of the CYRENE automotive pilot infrastructure have been elaborated! This allows us to define the attack graphs and the related mitigation strategies. More info in the blog post at: #CYRENEAutomotivePilotRead More
Want to stay informed on the progress and achievements of the @CYRENE_H2020 project? Sign up for our newsletter to stay updated. Register now: #ICTsecurity #supplychain #cyrene https://t.co/VkUmHMwOO6Read More
📢 #CYRENE project started collaborating with the EU Horizon Result Booster! This important initiative will empower the Exploitation and Business Strategy of our 13 Key Exploitable Results! Stay tuned! #CYRENE #EXPLOITATIONRead More
Want to stay informed on the progress and achievements of the @CYRENE_H2020 project? Sign up for our newsletter to stay updated. Register now: #ICTsecurity #supplychain #cyrene https://t.co/m9Ik8wZQ0wRead More
This project has received funding from the European Union’s Horizon 2020 Research and Innovation program under grant agreement No 952690. The website reflects only the view of the author(s) and the Commission is not responsible for any use that may be made of the information it contains.