Empty Banner

Threat-driven security testing
and proactive DEFense identification for EDGE-cloud systems

Workplan

WP1 - Project Management and dissemination

WP1 is focused on management, dissemination and exploitation activities.

WP2 - Asset-centric edge-cloud threat modeling

WP2 is focused on the automatic identification of threats applicable to a specific edge-cloud system based on its architecture and asset properties.

WP3 - Threat-driven design for security & resilience

WP3 focuses on the identification of appropriate controls to enforce in a cloud-edge system based on existing threats, by relying upon Moving Target Defence strategies able to preserve the efficacy of controls in place over time by proactively changing the attack surface.

WP4 - Threat-driven security testing

WP4 has the goal to define a process to automatically generate and execute a list of concrete attacks from system and threat models to conduct and effective yet low-cost penetration testing

WP5 - ML- and CTI-based attack generation

WP5 has a threefold objective: (i) To transform raw data into suitable representations and to address the gap between ML development and operation
for security testing; (ii) To improve the detection of anomalies by the convergence of different learning approaches and explainability; (iii) To support security testing by means of ML-based attacks in order to validate defense and countermeasures.

WP6 - Case studies, implementation and validation

WP6 is devoted to dissemination and validation activiteis.