Results & Downloads
Paper published: Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation
The paper “Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation” was published in IACR Communications in Cryptology. The authors are Jean‑Philippe Bossuat, Anamaria Costache, Christian Mouchet, Lea Nürnberger and Juan Ramón Troncoso‑Pastoriza. This publication, developed within the PRIVIDEMA project, advances precise and composable noise estimation techniques for CKKS, enabling more reliable exact homomorphic computations.
Paper published: Accurate and Composable Noise Estimates for CKKS with Application to Exact HE Computation
PhotoGeNIC Factsheet 05: Integration of Germanium Photonics on Silicon
The fifth issue of the PhotoGeNIC Factsheet series is now available. Download it to get an overview of the Integration of Germanium Photonics on Silicon.
PhotoGeNIC Factsheet 05: Integration of Germanium Photonics on Silicon
Scientific publication
The paper “Radio over Fiber with Cascaded Structure: Algorithm for Uplink Positioning” was published in IEEE Transactions on Wireless Communications. The authors are Dexin Kong, Diana Pamela Moya Osorio & Erik G. Larsson.
Scientific publication
Scientific publication
The paper “Distributed Deployment and Dual-Frequency Concepts to Strenghten Sub-THz Wireless Systems” was was published in IEEE Wireless Communications Magazine. The authors are Liesbet Van der Perre, Gilles Callebaut, Thomas Eriksson, Muris Sarajlic, Christian Fager, Fredrik Tufvesson, Buon Kiong Lau & Erik G. Larsson.
Scientific publication
D6.4 WP3, WP4, WP5 Demonstrator Platform
The ORSHIN Demonstrator platform showcases secure device development, focusing on secure inter- and intra-device communication, as proposed in the ORSHIN project. This document provides a high-level overview of the demonstrator, while detailed documentation is provided in the demonstrator repository.
D6.4 WP3, WP4, WP5 Demonstrator Platform
D5.2 Report about essential and beyond-essential s&p guarantees for intra-device communication in restricted environments
This document conducts an examination of current protocols used to secure intra-device communication, including standard, proprietary, and literature-based approaches.
D5.2 Report about essential and beyond-essential s&p guarantees for intra-device communication in restricted environments
D5.1 Report about Essential and Beyond Essential S&P Guarantees for Inter-device Communication in Restricted Environments
In this deliverable we present the creation of BlueBrothers: three new inter-device communication protocols providing essential and beyond-essential S&P guarantees.
D5.1 Report about Essential and Beyond Essential S&P Guarantees for Inter-device Communication in Restricted Environments
D4.1 Report on security audit and testing
In this report we present two concepts of hardware acceleration for SW security testing, one for accelerating simulation of fault injection on Software pre-silicon and the other to support Logical Software testing such as Fuzzing or Symbolic execution.
D4.1 Report on security audit and testing
D3.2 Hardware implementations of cryptographic building blocks with formally verifiable protection against physical attacks
This deliverable describes hardware implementations of cryptographic building blocks, such as the PRINCE and AES S-boxes, with formally verifiable protection against physical side-channel attacks.
D3.2 Hardware implementations of cryptographic building blocks with formally verifiable protection against physical attacks
D3.1 RISC-V processor with countermeasures against microarchitectural attacks
This deliverable describes Proteus, a RISC-V processor designed for microarchitectural security research.
D3.1 RISC-V processor with countermeasures against microarchitectural attacks
Factsheet#4: Sub-THz systems coping with an elephant in the room: strengthen first, standardize next
Sub-THz systems have been advocated for their potential to deliver ultra-fast wireless connectivity, precise localization, and innovative sensing capabilities—thanks to the abundant bandwidth available at these frequencies. Yet, as highlighted in Factsheet #4, there remains a critical challenge: the “elephant in the room” is the fragility of sub-THz links. Unlike wireless systems operating below 10 GHz, both the signal propagation and hardware performance at sub-THz frequencies pose unique difficulties that cannot simply be predicted by scaling up existing technologies. These often-overlooked complications make the path toward reliable sub-THz deployment more complex than it may initially appear. In this blog post, we explore these challenges and discuss why strengthening the foundation of sub-THz technology must come before efforts to standardize.
Factsheet#4: Sub-THz systems coping with an elephant in the room: strengthen first, standardize next
Paper published: European Conference on Research Methodology for Business and Management Studies (ECRM 2025), Vol. 24(1)
Title: Research in Education: Case Cybersecurity Project
Paper published: European Conference on Research Methodology for Business and Management Studies (ECRM 2025), Vol. 24(1)
Paper published: European Conference on Cyber Warfare and Security (ECCWS 2025), Vol. 24(1)
Title: Anchoring Security in Maritime: Defining and Protecting Critical Assets for Business Continuity
Paper published: European Conference on Cyber Warfare and Security (ECCWS 2025), Vol. 24(1)
Paper published: European Conference on Cyber Warfare and Security (ECCWS 2025), Vol. 24(1)
Title: Cyber Threats in Hospitals: GDPR and NIS2 Regulations in Preventing USB Injections.
Paper published: European Conference on Cyber Warfare and Security (ECCWS 2025), Vol. 24(1)
Paper published: 2025 6th INTERNATIONAL CONFERENCE IN ELECTRONIC ENGINEERING & INFORMATION TECHNOLOGY (EEITE 2025)
Title: Enhancing Cybersecurity through Integrated Business Continuity Management and Cyber Threat Intelligence
Paper published: 2025 6th INTERNATIONAL CONFERENCE IN ELECTRONIC ENGINEERING & INFORMATION TECHNOLOGY (EEITE 2025)
Paper published: Information & Security: An International Journal, Vol. 55(1), 2024
Title: The Role of Standards in Enhancing Cybersecurity and Business Continuity Management for Organizations
Paper published: Information & Security: An International Journal, Vol. 55(1), 2024
Paper published: Lecture Notes in Computer Science (LNCS), Security and Privacy in Smart Environments (Springer)
Title: Methodological resilience assessment of smart cyber infrastructures
Paper published: Lecture Notes in Computer Science (LNCS), Security and Privacy in Smart Environments (Springer)
Factsheet #3: 6GTandem Use Cases
The 6G Tandem project is pioneering a dual-frequency multiple antenna system, integrating sub-THz and sub-10GHz signals to meet the needs of future 6G applications. To identify future societal and industrial needs in health, entertainment, and industrial processes, the 6G Tandem project has analysed potential use cases that would benefit from its dual-frequency, highly reliable, and high-capacity network architecture.
Factsheet #3: 6GTandem Use Cases
Newsletter Issue 04
The fourth AddMorePower newsletter is now available for download. In this edition, we highlight the technical progress achieved across our work packages and look back on the many conferences and workshops where our partners have been showcasing our research.
Newsletter Issue 04
OPERANT Patch
The official patch of the Horizon Europe project “OPERANT” is here!
Its design features the project’s mascot, the vigilant owl, symbolizing awareness, precision, and reliability. The owl embodies OPERANT’s mission to ensure everything is observed, protected, and in order.
OPERANT Patch
Factsheet No 1 – How technology helps individuals track air pollutant exposure
Download Factsheet No 1: How technology helps individuals track air pollutant exposure
Factsheet No 1 – How technology helps individuals track air pollutant exposure
Scientific Publication
The paper JWT Back to the future: On the (ab)use of JWTs in IoT transactions was published at the 6th International Workshop on LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY & PRIVACY (LightSEC 2025). The authors are Alberto Battistello, Guido Bertoni, Filippo Melzani and Maria Chiara Molteni.
Scientific Publication
Scientific Publication
The paper EmuOCPP: Effective and Scalable OCPP Security and Privacy Testing was published at the 3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec’25). The authors are Soumaya Boussaha, Victor Fresno-Gomez, Thomas Barber and Daniele Antonioli.
Scientific Publication
Scientific Publication
The paper PhaseSCA: When Jitter Meets Electromagnetic Side Channels was published in IACR Transactions on Cryptographic Hardware and Embedded Systems. The authors are Pierre Ayoub, Aurélien Hernandez, Romain Cayre, Aurélien Francillon and Clémentine Maurice.
Scientific Publication
Scientific Publication
The paper Higher-Order Time Sharing Masking was published in IACR Transactions on Cryptographic Hardware and Embedded Systems. The authors are Dilip Kumar S V, Siemen Dhooge, Josep Balasch, Benedikt Gierlichs and Ingrid Verbauwhede.
Scientific Publication
Scientific Publication
The paper SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes was published at the 11th ACM Cyber-Physical System Security Workshop (ACM CPSS 2025) and won the best paper award. The authors are Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti and Massimo Merro.
Scientific Publication
Scientific Publication
The paper EmuOCPP: Effective and Scalable OCPP Security and Privacy Testing was published at the 3rd USENIX Symposium on Vehicle Security and Privacy (VehicleSec’25). The authors are Soumaya Boussaha, Victor Fresno Gómez, Thomas Barber and Daniele Antonioli.
Scientific Publication
D6.2 “Integrated Framework (Final Release), Use Case Evaluation and Project Impact Assessment”
D6.2 details the evaluation results of CONNECT’s Trust Assessment Architecture when integrated/deployed in the context of the envisioned use cases unlocking the assessment of such advanced trust mechanisms as part of the end-to-end operational profile of CCAM functionalities. Building on top of the benchmarking results (per standalone component) that were documented in the previous version of this deliverable, D6.2 validates the framework’s tangible impact through three core CCAM use cases: Intersection Movement Assistance (IMA), Cooperative Adaptive Cruise Control (C-ACC), and Slow Moving Traffic Detection (SMTD). Each was tested using the most appropriate methodology – from Large-Scale Simulation scenarios to Hardware-in-the-Loop and Real-World Living Labs environment following the development pipeline adopted in V2X security and safety engineering: from conception activities and prototyping to real-world evaluation. Our findings confirm the framework’s benefits in allowing trust-aware decision making, achieving all identified KPIs and positioning it a stepping stone for future research towards converging security and safety, which can further drive industry-wide adoption.
D6.2 “Integrated Framework (Final Release), Use Case Evaluation and Project Impact Assessment”
Scientific Publication
The paper Hardware Cost Evaluation in Systems Security was published at the 2025 ACM Conference on Reproducibility and Replicability(ACM REP ’25). The authors are Jesse De Meulemeester, Quinten Norga, Ingrid Verbauwhede, Marton Bognar and Frank Piessens.
Scientific Publication
Newsletter Issue 05
The 5th issue of the ORSHIN newsletter has been released. This issue reveals the latest progress and results during the past couple of months. As ORSHIN enters its final stretch, we’re celebrating major breakthroughs in Open-source hardware and software security, pre-silicon side-channel attack resilience, firmware fuzzing and fault injection tools, and secure communication protocols for IoT. Furthermore, the newsletter promotes upcoming events organized by the ORSHIN consortium.
Newsletter Issue 05
Scientific Publication
The paper Wait a Cycle: Eroding Cryptographic Trust in Low-End TEEs via Timing Side Channels was published at the 8th Workshop on System Software for Trusted Execution (SysTEX 2025) co-located with EuroS&P. The authors are Ruben Van Dijck, Márton Bognár and Jo Van Bulck.
Scientific Publication
Scientific publication
The paper “Wideband Single-Layer D-Band Patch Antenna with Parasitic Elements and Superstrate Loading” was accepted to and presented at EuCAP 2025. The authors are Yuyan Cao, Hanieh Aliakbari, Parisa Aghdam, Buon Kiong Lau.
Scientific publication
Scientific publication
The paper “Deep Learning for sub-THz Radio Unit Selection using sub-10 GHz Channel Information and Inferred Device Beamforming” was accepted to and presented at IEEE VTC Spring 2025. The authors are Nishant Gupta, Muris Sarajlic, and Erik G. Larsson.
Scientific publication
Scientific publication
The paper “D-Band Cascode Up conversion Mixer Utilizing Double Mixing Technique for Enhanced Linearity and Output Power in 130-nm SiGe Process” was published in IEEE Transactions on Microwave Theory and Technology. The authors are Marzie Mollaalipour, Mingquan Bao,Yu Yan, Herbert Zirath.
Scientific publication
Scientific publication
The paper “Modeling, Analysis, and Optimization of Cascaded Power Amplifiers” was accepted to EUSIPCO 2025 and will be presented there at the beginning of September. The authors are Oksana Moryakova, Thomas Eriksson, and Håkan Johansson.
Scientific publication
Scientific publication
The paper “Efficient Implementation of Wireless Links Employing Polymer Microwave” was accepted by Applied Sciences. The authors are Vasileios Liakonis, Yannis Papananos, Franz Dielacher, Maciej Wojnowski, Walter Hartner.
Scientific publication
ORSHIN Factsheet No 5
How do we secure today’s smart devices? ORSHIN’s Attack Defense Framework (ADF) offers a smarter way to spot and stop threats—across every layer of connected devices, from hardware to software. Easy to use, highly visual, and built for the real world.
ORSHIN Factsheet No 5
D5.3 “MEC-enabled Orchestrator, Continous Authorization, Trust Management and DLT-based Secure Information Exchange”
This deliverable completes the description of the work of WP5 on the MEC-enabled networking technology to support the CONNECT task offloading needs, the CONNECT Distributed Ledger Technology, the use of Verifiable Credentials and the crypto protocols used to ensure the security and privacy of data in the CONNECT eco-system. Trusted task offloading, the CONNECT Distributed Ledger Technology and the use of attributes for access control and for signing and encrypting failed attestation data have all been described, implemented and measured. All of these extensions work in tandem with the MEC-enabled Orchestrator (described in earlier deliverables) managing the secure lifecycle management of CCAM services deployed over the continuum.
D5.3 “MEC-enabled Orchestrator, Continous Authorization, Trust Management and DLT-based Secure Information Exchange”
D4.3 “Virtualization- and Edge-based Security and Trust Extensions (Final Release)”
D4.3 presents the final update of the CONNECT Guard architecture including security extensions for virtualization and edge computing in CCAM systems. It introduces the latest trusted computing mechanisms, secure container deployment, and the TALOS framework for verifiable enclave migration. The document also evaluates cryptographic protocols for privacy-preserving trust assessment, enabling secure, scalable, and resilient service orchestration across vehicles, MEC, and cloud. It successfully concludes the mission of WP4 of CONNECT.
D4.3 “Virtualization- and Edge-based Security and Trust Extensions (Final Release)”
D3.3 “CONNECT Trust & Risk Assessment and CAD Twinning Framework (Final Version)”
This deliverable describes the final version of the standalone trust assessment framework (TAF), the federated TAF and the digital twin version of the TAF (TAF-DT). For the standalone TAF, the federated TAF and the TAF-DT, the final architecture, implementation details, and evaluation results are provided. In addition to that, the approaches for trust quantification, the approach for calculating the required trustworthiness level (RTL), and details about the risk assessment framework are provided.
D3.3 “CONNECT Trust & Risk Assessment and CAD Twinning Framework (Final Version)”
Presentation delivered at the 15th International Conference on Nitride Semiconductors (ICNS-15)
Operando Strain Microscopy in GaN/Si High Electron Mobility Transistors with Nanosecond Time Resolution
Presentation delivered at the 15th International Conference on Nitride Semiconductors (ICNS-15)
D9.1 “Plan for dissemination and exploitation incl. communication activities”
D9.1 presents the MILADO communication kit constituting the launch of the internal and external communication infrastructure (e.g., mailing lists, website, social media). Furthermore, it describes the detailed plan for the project’s dissemination strategy and outlines how the different stakeholder communities will be targeted.
D9.1 “Plan for dissemination and exploitation incl. communication activities”
D8.1 “First batch of twenty 8″ Si wafers with surface nano-patterns and backside coating”
This document describes the design and processing of silicon substrate. Those are with suitable architectures for direct epitaxial III-V –semiconductor growth. Keywords
nano-structured surface.
D8.1 “First batch of twenty 8″ Si wafers with surface nano-patterns and backside coating”
Scientific Publication
The paper Design, implementation and validation of NSCP: a New Secure Channel Protocol for hardened IoT was published at DATE 2025. The authors are Alberto Battistello, Guido Bertoni, Vittorio Zaccaria and Joan Bushi.
Scientific Publication
Scientific Publication
The paper Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware- full version was published in IEEE Transactions on Information Forensics and Security. The authors are Dilip Kumar S.V., Josep Balasch, Benedikt Gierlichs and Ingrid Verbauwhede.
Scientific Publication
D2.4 “Specification of hardware resources and performance requirements”
Discussion and analysis of RadioWeaves architecture, including control mechanisms and requirements on analog and digital hardware, leading into energy models for both domains and energy efficiency case studies for both communication and power transfer. Conclusions regarding energy consumption for different deployment/design choices are drawn.
D2.4 “Specification of hardware resources and performance requirements”
D6.5 “Final report on dissemination and communication activities”
This report summarizes all dissemination and com-munication activities carried out since project start and addresses planned activities beyond project lifetime (update of D6.3).
D6.5 “Final report on dissemination and communication activities”
D5.3 “Validation of concepts and experimental assessment of key technologies”
D5.3 reports the concept validation and experimental results of the RadioWeaves technology, corresponding to the activities in Task 5.1 and Task 5.2 of REINDEER. In total, five experiments are conducted covering multiuser capabilities, low-latency and reliable communication, accurate positioning,
interacting (powering, communicating with, and positioning) with energy-neutral device (END), and reconfigurability with dynamic hardware resource allocation.
D5.3 “Validation of concepts and experimental assessment of key technologies”
D5.2 “Demonstration of smart connectivity platform, support for resilient applications, and novel technologies”
This deliverable consolidates experimental findings from D5.1 and D5.3 into a series of demonstration videos, offering a visual representation of key challenges and solutions addressed in REINDEER. These videos cover topics such as dynamic resource allocation, robustness versus latency trade-offs, accurate positioning, energy-neutral device interaction, and multi-user capabilities. Together, they highlight the advancements in distributed antenna systems and wireless power transfer technologies, offering new insights into the development of next-generation wireless ecosystems.
D5.2 “Demonstration of smart connectivity platform, support for resilient applications, and novel technologies”
D5.1 “Detailed experimental validation plan,design of experiments, and definition ofcommon formats”
Detailed experimental validation plan, design of experiments, and definition of common formats. This report provides a detailed experimental validation plan. The design of experiments describes the distributed RadioWeaves topologies to be realized in the KU Leuven testbed and the particular experiments to be performed in the ULund testbed. D5.1 also defines formats for interfacing with RadioWeaves panels and for the exchange of experimental data.
D5.1 “Detailed experimental validation plan,design of experiments, and definition ofcommon formats”
D4.3 “Assessment of signalling schemes, protocols, and algorithmsfor energy-neutral devices”
Assessment of signalling schemes, protocols, and algorithms for energy-neutral devices. Quantitative assessment of wireless power transfer, high-rate communications, and accurate positioning with energy neutral devices, based on the designs described in D4.2.
D4.3 “Assessment of signalling schemes, protocols, and algorithmsfor energy-neutral devices”
D3.4 “Ultra-robust and low-latency communications and mobility support”
This deliverable builds on the theoretical foundation formed in D3.1 and provides a more detailed analysis of robustness and latency aspects of the RadioWeaves concept. New methods are presented, covering robust beamforming, employment of constant envelope waveforms, support of environmental awareness, and scheduling and control mechanisms for dynamic environments.
D3.4 “Ultra-robust and low-latency communications and mobility support”
D3.3 “Position Estimation and Environment Learning”
Position estimation and environment learning. Report on fundamental performance limits for positioning, algorithm design and analysis for system calibration, positioning and synchronization as well as data fusion of information from radio infrastructure. An algorithm for environment sensing and learning exploits MIMO radar to infer mirror source locations.
D3.3 “Position Estimation and Environment Learning”
D2.3 “Hardware requirements to support energytransfer to energy-neutral nodes”
This deliverable reports on the evaluation and design of hardware resources needed for transfer of energy to energyneutral nodes and backscattering-based connectivity to these nodes. The assessment of the hardware requirements takes energy efficiency as an important target, and includes different aspects such as synchronization, reciprocity calibration, and out-of-band constraints due to frontend non-linearities.
D2.3 “Hardware requirements to support energytransfer to energy-neutral nodes”
D2.2 “Evaluation of the distribution of processing across infrastrcture and associated requirements on back-haul and synchronization”
This deliverable provides estimates of distributed hardware resources, and their synchronization, needed to implement targeted algorithms for selected services and the associated requirements on back-haul data transfer between processing/hardware units.
D2.2 “Evaluation of the distribution of processing across infrastrcture and associated requirements on back-haul and synchronization”
Factsheet #2: SNS JU
The Smart Networks and Services Joint Undertaking (SNS JU) is a Public-Private Partnership acting as a pivotal initiative within the European Union. SNS JU was designed to drive forward the research, innovation, and deployment of advanced network technologies, specifically focusing on 5G and future 6G networks and services. 6GTandem is part fo the SNS JU.
Factsheet #2: SNS JU
Download Factsheet #1: 6G
6G represents the next evolutionary step in wireless technology, succeeding 5. The 6GTandem project aims to advance the combined low-frequency and sub-THz distributed MIMO system to enable new applications that require an unprecedented combination of performance factors.
Download Factsheet #1: 6G
ORSHIN Newsletter Issue 04
The 4th issue of the newsletter has been released. This issue reveals the latest progress and results and highlights key activities. It further provides an overview of the most recent publications and video interviews and provides an outlook of the upcoming activities.
ORSHIN Newsletter Issue 04
D2.2 “Operational Landscape, Requirements and Reference Architecture – Final Version”
The CONNECT project addresses security, privacy, and trust in Cooperative, Connected, and Automated Mobility (CCAM) systems. D2.2 extends the overall architecture outlined in D2.1 and focuses on ethical analysis, the final architecture, detailed threat modelling and requirements, and the definition of the CONNECT Minimal Viable Platform. By prototyping this architecture, CONNECT will ensure secure collaboration across vehicles, MEC, and cloud, providing a foundation for privacy-preserving, trustworthy mobility solutions.
D2.2 “Operational Landscape, Requirements and Reference Architecture – Final Version”
Scientific Publication
The paper AttackDefense Framework (ADF): Enhancing IoT Devices and Lifecycles Threat Modeling was published at ACM TECS. The authors are Tommaso Sacchetti, Marton Bognar, Jesse De Meulemeester, Benedikt Gierlichs, Frank Piessens, Volodymyr Bezsmertnyi, Maria Chiara Molteni, Stefano Cristalli, Arianna Gringiani, Olivier Thomas, Daniele Antonioli.
Scientific Publication
Factsheet No 2 – ORSHIN’s Trusted Life Cycle
Download Factsheet #2: ORSHIN’s Trusted Life Cycle
Discover ORSHIN’s comprehensive Trusted Life Cycle (TLC) framework for securing open-source hardware throughout every stage of development. Learn more about our holistic approach to ensuring the security and reliability of connected devices.
Factsheet No 2 – ORSHIN’s Trusted Life Cycle
PhotoGeNIC Factsheet 4: Fabrication Techniques for Germanium Photonics II
The fourth issue of the PhotoGeNIC Factsheet series is now available. Download it to get an overview of further key fabrication techniques employed in creating germanium-based photonic devices.
PhotoGeNIC Factsheet 4: Fabrication Techniques for Germanium Photonics II
D2.2 Report about security requirements
This report explains how abstract high-level security requirements are handled in the trusted life cycle and how they are broken down into more concrete procedural requirements for the life cycle phases, and into low-level security requirements for the components.
D2.2 Report about security requirements
D2.1 Report about trusted life cycle design methodology for OSH
The deliverable provides the description of the methodology for composing open-source components. We envision a trusted life cycle of the device composed of several phases. The report will formalize these phases and identify the interaction and feedback of the design and production process up to the device decommissioning. The report provides the guidelines for the secure composition of building blocks. The guidelines help to achieve a secure result leveraging the security features of each component.
D2.1 Report about trusted life cycle design methodology for OSH
PhotoGeNIC Factsheet 3: Fabrication Techniques of Germanium I
The third issue of the PhotoGeNIC Factsheet series is now available. Download it to get an overview of the key fabrication techniques employed in creating germanium-based photonic devices.
PhotoGeNIC Factsheet 3: Fabrication Techniques of Germanium I
D4.1 ‘Initial prototypes of the cyber-threat intelligence gathering, extraction, sharing components and AI-based solutions’
The document is reporting the current state of the initial prototypes of the cyber-threat intelligence gathering, extraction, sharing components and AI-based solutions of DYNAMO while reflecting on the whole DYNAMO architecture and their collaboration with the rest of the platform.
D4.1 ‘Initial prototypes of the cyber-threat intelligence gathering, extraction, sharing components and AI-based solutions’
Factsheet No 1 – Introduction to ORSHIN
Download Factsheet #1: ORSHIN’s Approach to Trust and Security
Explore ORSHIN’s innovative solutions for enhancing the security and trustworthiness of open-source hardware in IoT and critical infrastructure. Download now to learn more about transparency, third-party verification, and advanced security audits.
Factsheet No 1 – Introduction to ORSHIN
Scientific Publication
The paper Advanced wafer singulation techniques for miniaturized metal-oxide (MOX) micro-hotplates based gas analyzer was published at IEEE 2024 in Berlin, Germany. The authors are Serguei Stoukatch, Francois Dupont and Jean-Michel Redouté.
Scientific Publication
Scientific publication
The paper “Toward Energy-Efficient Massive MIMO: Graph Neural Network Precoding for Mitigating Non-Linear PA Distortion” was published in IEEE Transactions on Cognitive Communications and Networking. The authors are Thomas Feys, Liesbet Van der Perre, François Rottenberg
Scientific publication
Scientific Publication
The paper “Libra: Architectural Support For Principled, Secure And Efficient Balanced Execution On High-End Processors” was published at ACM CCS 2024. The authors are Hans Winderix, Marton Bognar, Lesly-Ann Daniel, Frank Piessens.
Scientific Publication
Scientific Publication
The paper “Duplication-Based Fault Tolerance for RISC-V Embedded Software” was published at the European Symposium on Research in Computer Security (ESORICS 2024). The authors are Volodymyr Bezsmertnyi, Jean-Michel Cioranesco, and Thomas Eisenbarth.
Scientific Publication
D1.3 “Legal and Ethical Framework”
This deliverable presents the second and final version of the CONNECT Data Management Plan. In addition, the deliverable includes a roadmap definition as it pertains to the ethical and legal aspects of the Trust Assessment part, which plays a central role in CONNECT.
D1.3 “Legal and Ethical Framework”
Scientific Publication
The paper “Intellectual Property Exposure: Subverting and Securing Intellectual Property Encapsulation in Texas Instruments Microcontrollers” was published at USENIX Security Symposium 2024. The Authors are Marton Bognar, Cas Magnus, Frank Piessens, Jo Van Bulck.
Scientific Publication
Poster presented at the 16th International Conference on X-Ray Microscopy
Nanoscale examination of degradation in copper metallization layers using lab-based nanoTXM and DFXM
Poster presented at the 16th International Conference on X-Ray Microscopy
Scientific publication
The paper “MmWave for Extended Reality: Open User Mobility Dataset, Characterisation, and Impact on Link Quality” was published in IEEE Communications Magazine. The authors are Alexander Marinsek, Sam De Kunst, Gilles Callebaut, Lieven De Strycker, Liesbet Van der Perre.
Scientific publication
DYNAMO 5th Factsheet: Crisis Communication & Enhancement of Organisational Resilience
The fifth issue of the DYNAMO Factsheet series is now available. Download it to get an overview of the role of crisis communication and the enhancement of organisational resilience.
DYNAMO 5th Factsheet: Crisis Communication & Enhancement of Organisational Resilience
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper entitled: “CTI Sharing Practices and MISP Adoption in Finland’s Critical Infrastructure Protection”
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper entitled: “Measuring Societal Impacts of Cybersecurity”
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper entitled: “E-EWS-based Governance Framework for Sharing Cyber Threat Intelligence in the Energy Sector”
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper entitled: “The Social Domain: Resilience of Information-Sharing Networks”
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Paper entitled: “Business Model Canvas and Competition to Understand Exploitation of Cybersecurity Project Results”
Paper published: Proceedings of the 23rd European Conference on Cyber Warfare and SecurityPaper (ECCWS)
Scientific publication
The paper “Channel Performance Metrics and Evaluation for XR Head-Mounted Displays with mmWave Arrays” was published in IEEE Transactions on Communications. The authors are Alexander Marinsek, Xuesong Ca, Lieven De Strycker, Fredrik Tufvesson and Liesbet Van der Perre.
Scientific publication
Scientific Publication
The paper Unveiling the Vulnerability of Oxide-Breakdown-Based PUF was published at IEEE Electron Device Letters. The authors are Pablo Saraza-Canflanca, Ferenc Fodor, Javier Diaz Fortuny, Benedikt Gierlichs, Robin Degraeve Ben Kaczer and Ingrid Verbauwhede.
Scientific Publication
D6.1 “Plan for dissemination and exploitation incl. communication activities”
This deliverable provides an initial plan for dissemination and exploitation incl. communication activities and training and will be periodically updated based on the project’s progress. It also constitutes an initial dissemination & communication kit for 6GTandem, as well as the launch of the project website and communication infrastructure in M03.
D6.1 “Plan for dissemination and exploitation incl. communication activities”
D1.1 “Project quality plan”
This project quality plan constitutes a set of project templates and explains the project management, review and internal quality control process, as well as other organizational topics such as meeting organization. It further includes the open science practices within the 6GTandem project. This handbook shall support all partners in their daily work.
D1.1 “Project quality plan”
DYNAMO Data Protection Notice
This is to inform the data subjects that may have been affected by the crawling operations about the processing carried out as part of the project and enable them to exercise their data protection rights. The responsible partner (controller) is CERTH.
DYNAMO Data Protection Notice
D7.1: Plan for dissemination and exploitation incl. communication activities
D7.1 provides an initial plan for dissemination and exploitation incl. communication activities and training and will be periodically updated based on the project’s progress. It also constitutes an initial dissemination & communication kit for AddMorePower, as well as the launch of the project website and communication infrastructure in M03.
D7.1: Plan for dissemination and exploitation incl. communication activities
D3.1: Imaging protocols for Lab-based Transmission X-ray Microscopy and nano-Computed Tomography
The protocols will be established for both, Mo and Cu sources. The documents will be distributed on relevant platforms (e.g. GitHub).
D3.1: Imaging protocols for Lab-based Transmission X-ray Microscopy and nano-Computed Tomography
D2.2: Documentation of domain-level ontologies – CHADAs & MODAs
The community standards CHADA and MODA describe the common understanding on describing, processing, characterizing and modelling of materials and of their properties for the applied methods in AddMorePower in a formalized way.
D2.2: Documentation of domain-level ontologies – CHADAs & MODAs
D2.1: Data Management Plan
The comprehensive Data Management Plan (DMP) outlines the type of collected data, produced research outputs, the compliance with the FAIR data principles, the way in which data will be stored and preserved throughout the lifespan of AddMorePower, ethical aspects and security issues. The DMP will be a living document which will be regularly updated.
D2.1: Data Management Plan
D1.1: Project quality plan
The project quality plan (project handbook) constitutes a set of project templates and explains the project management, review, internal quality control process, and other organizational topics such as meeting organization. This handbook shall support all partners in their daily work.
D1.1: Project quality plan
Paper published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
Paper entitled: “Utilization and Sharing of Cyber Threat Intelligence Produced by Open-Source Intelligence”
Paper published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
Paper published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
Paper entitled: “Utilization and Sharing of Cyber Threat Intelligence Produced by Open-Source Intelligence”
Paper published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
Paper Published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
Paper entitled: “Implementation of OSINT for Improving an International Finance Sector Organization’s Cybersecurity”
Paper Published: Proceedings of The 19th International Conference on Cyber Warfare and Security (ICCWS)
D1.3 ‘Ethical and Legal Protocol and Compliance Assessment’
Task 1.4 aims to identify the ethical and legal aspects of the DYNAMO project and to assess compliance of (a) the research and (b) the project’s technological solution with the current ethical and legal framework. D1.3 constitutes the official report.
D1.3 ‘Ethical and Legal Protocol and Compliance Assessment’
Scientific Publication
The paper Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs was published at IEEE Symposium on Security & Privacy 2024.The authors are Hans Winderix, Márton Bognár, Job Noorman, Lesly-Ann Daniel and Frank Piessens.
Scientific Publication
D5.2 “Distributed Processing, Fast Offloading and MEC-enabled Orchestrator”
D5.2 follows up the D5.1 contributions to deliver the first version of the CONNECT orchestrator and the mechanisms for secure data exchange. The here-in reported work covers the task-offloading logic and the implementation details of the CONNECT orchestartor software. Lastly, the work is completed with the Blockchain architecture and data handling principles to facilitate the CONNECT accountable attestation and monitoring (when combined with the D5.1 claims).
D5.2 “Distributed Processing, Fast Offloading and MEC-enabled Orchestrator”
D4.2 “Virtualization- and Edge-based Security and Trust Extensions”
D4.2 documents the high-level design of the complete CONNECT security architecture as developed by Workpackage WP4. Compared to D4.1 we refine and add users stories and designs for the Multi- Access Edge Cloud (MEC). We also add detailed cryptographic protocols that implement the trust assessment of the services of CONNECT. Finally, we detail the concepts and interactions for secure migration and up- grade of TEE-protected workloads. This is the technical foundation for Secure Task Offloading. The key questions that this deliverable answers are “How can the Multi-access Edge Cloud (MEC) be architected to provide robust security and privacy guarantees?”, “How can cryptography help to remotely assess trust of services while maintaining sound privacy guar- antees?”, and “How can vehicle and edge collaborate while maintaining security?”.
D4.2 “Virtualization- and Edge-based Security and Trust Extensions”
D3.2 “CONNECT Trust & Risk Assessment and CAD Twinning Framework (Initial Version)”
This deliverable builds upon D3.1 and describes major build- ing blocks for the standalone trust assessment framework (TAF), the federated TAF and the digital twin version TAF-DT. For the standalone TAF, a fine-grained architecture underlying our current prototype is provided, federated TAF and TAF-DT are described as high-level architectures.
D3.2 “CONNECT Trust & Risk Assessment and CAD Twinning Framework (Initial Version)”
D7.2 “Dissemination, Communication, Clustering and Exploitation activities”
This deliverable presents the CONNECT dissemination, communication, clustering, standardization, and exploitation activities up to M18. Furthermore, it contains information highlighting open-source contributions and workshop organization activities.
D7.2 “Dissemination, Communication, Clustering and Exploitation activities”
Publication in the Journal “Nature Communications”
Article entitled: “Rare disease research workflow using multilayer networks elucidates the molecular determinants of severity in Congenital Myasthenic Syndromes”
Publication in the Journal “Nature Communications”
DYNAMO 3rd Factsheet: Resilience
The third issue of the DYNAMO Factsheet series is now available. Download it to get an overview of the 4Rs of Resilience of DYNAMO, the Resilience Cycle and the Resilience Assessment Methodology.
DYNAMO 3rd Factsheet: Resilience
D4.1 “Conceptual Architecture of Customizable TEE and Attestation Models Specifications”
D4.1 documents the initial results of Workpackage 4. It speci- fies the core security architecture of CONNECT revolving around the use of HW-based trust anchors for supporting both the continuous trust as- sessment of the CCAM-wide continuum as well as the secure lifecylce management of all comprised devices. D4.1 refines the architecture (com- ponents and flows) presented in D2.1 and puts forth a deteiled description of all interactions and sequence of actions with the underlying Trusted Computing Base for providing node- and data-centric trustworthiness ev- idence. Furthermore, it documents user stories that specify desired fea- tures, and finally outlines the key hierarchy and formalized requirements. This overarching TEE architecture will guide the design of all security pro- tocols and cryptographic mechanisms to be documented in D4.2.
D4.1 “Conceptual Architecture of Customizable TEE and Attestation Models Specifications”
Scientific publication
The paper “Impact of array configuration on head-mounted display performance at mmWave bands” is now available for open access on ArXiv. The authors are Alexander Marinsek, Xuesong Cai, Lieven De Strycker, Fredrik Tufvesson and Liesbet Van der Perre.
Scientific publication
Scientific Publication
An Open Dataset Storage Standard for 6G Testbeds has been published by Gilles Callebaut, Michiel Sandra, Christian Nelson, Thomas Wilding, Daan Delabie, Benjamin J. B. Deutschmann, William Tärneberg, Emma Fitzgerald, Liesbet Van der Perre from the 6GTandem consortium. The paper was successfully presented at IEEE CAMA 2023.
Scientific Publication
D5.1 “Distributed Processing and CCAM Trust Functions Offloading & Data Space Modelling”
D5.1 paves the way to the CONNECT orchestration im- plementation by first defining the task migration/offloading problem and then presenting a comprehensive analysis of the state-of-the-art. Derived insights suggest candidate approaches for the CONNECT implementation. Furthermore, the document explores identity management and proposes verifiable and presentation claims to verify a CONNECT entity’s attributes or identity. The involved data model to hold the needed information is finally introduced.
D5.1 “Distributed Processing and CCAM Trust Functions Offloading & Data Space Modelling”
Scientific Publication
The paper 6G Radio Testbeds: Requirements, Trends, and Approaches, has been accepted for publication in the IEEE Microwave Magazine’s Wireless Communications Focus Issue by the MTT-S TC-23. The authors are Gilles Callebaut, Liang Liu, Thomas Eriksson, Liesbet Van der Perre, Ove Edfors and Christian Fager.
Scientific Publication
D1.2 “Project Quality and Risk Assessment Plan”
The project quality plan shows the project management process, review process, quality checks, meeting organization, which is communicated to all partners. The risk assessment plan shows how potential risks are assessed and mitigated in order to avoid any negative influence on the PhotoGeNIC project objectives.
D1.2 “Project Quality and Risk Assessment Plan”
D7.3 “Updated plan and initial report on dissemination and communication activities”
This deliverable includes information on the dissemination, communication and exploitation activities, as well as on internal and external training activities of the EXFILES project. It is the first report on the communication and dissemination activities of the first 18 project months. It thus contains relevant information about all executed activities up to M18, as well as an updated plan of future activities. The deliverable will be updated and finalized within “D7.6 Final report on dissemination & communication activities” at the project end.
D7.3 “Updated plan and initial report on dissemination and communication activities”
D7.2 “Hands-on trainings for contributors”
This document describes deliverable D7.2 “Hands-on training for contributors”. As part of this deliverable, RISCURE has made available (and will continue to enable access for the entire duration of the project) two standard, hands-on online training courses to all EXFILES contributors.
D7.2 “Hands-on trainings for contributors”
D2.1 “Operational Landscape, Requirements and Reference Architecture – Initial Version”
D2.1 defines the technical requirements of CONNECT, alongside the specification of the conceptual reference architecture, the functional components, and interfaces between them. It also provides an analysis and point of reference for CONNECT in relation to the use cases and reference scenarios including an analysis of the trust models, that need to be considered for capturing the security and privacy requirements of each of the target CCAM services, and the trusted computing anchors to be further investigated and deployed as part of all actors – both at the MEC and Edge. Its purpose is to define the parameters for the rest of the CONNECT project and provide the necessary input for the design and implementation of all security enablers and models towards the dynamic trust assessment of complex CCAM ecosystems.
D2.1 “Operational Landscape, Requirements and Reference Architecture – Initial Version”
D1.2 “Project Quality Plan”
This Project Quality Plan constitutes a set of project templates and explanations on the project management process, review process, quality checks and meeting organisation, which are communicated to all partners. It further includes the risk assessment plan and shows how potential risks are assessed and mitigated.
D1.2 “Project Quality Plan”
D3.1 “Architectural Specification of CONNECT Trust Assessment Framework, Operation and Interaction”
Deliverable 3.1 presents initial work towards the Trust Asssessment Framework (TAF). It includes definition of core terminology for trust assessment, a state of the art analysis and requirements engineering which motivates our decision for a TAF based on Subjective Logic. Subsequently, an ap-proach to trust modeling is described including a methodol- ogy for deriving trust relationships and examples for such trust relationships and trust sources are given based on the four CONNECT use case. Finally, a high-level architecture of the TAF is presented and first considerations for the evaluation of the TAF are described.
D3.1 “Architectural Specification of CONNECT Trust Assessment Framework, Operation and Interaction”
Paper published in IEEE Internet of Things Magazine
The Internet of Vehicles (IoV) — Security, Privacy, Trust, and Reputation Management for Connected Vehicles
Authors: A. Drobot, T. Zhang, M. L. Buonarosa, F. Kargl, S. Schwinke and B. Sikdar
Paper published in IEEE Internet of Things Magazine
Scientific Publication
The paper MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling was published at Euro SP23 on July 3-7 2023. The authors are Marton Bognar, Hans Winderix, Jo Van Bulck, Frank Piessens
Scientific Publication
Poster on FEM Simulations to optimize a micro mirror array package for a wide operating temperature range
Partner Fraunhofer presented a poster at SPIE Photonics West 2023.
Poster on FEM Simulations to optimize a micro mirror array package for a wide operating temperature range
Scientific Publication
The paper E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem was published at WiSec’23 on 31st May 2023. The authors are Marco Casagrande, Riccardo Cestaro, Eleonora Losiouk, Mauro Conti and Daniele Antonioli.
Scientific Publication
Scientific Publication
The paper PROSPECT: Provably Secure Speculation for the Constant-Time Policy was published at USENIX Security’23 on 1st February 2023. The authors are Lesly-Ann Daniel, Marton Bognar, Job Noorman, Sébastien Bardin, Tamara Rezk and Frank Piessens.
Scientific Publication
D6.1 “Plan for dissemination and exploitation including communication activities”
This report constitutes an updated plan and initial report on the partners` dissemination, communication and exploitation activities of the first 6 months. It also provides an overview of the PhotoGeNIC communication kit, including the project’s visual identity as well as communication and dissemination materials, which are used within the project.
D6.1 “Plan for dissemination and exploitation including communication activities”
Scientific Publication
The paper Lightweight Countermeasures Against Original Linear Code Extraction Attacks on a RISC-V Core was published at HOST on 1st-3rd May 2023. The authors are Théophile Gousselot, Olivier Thomas, Jean-Max Dutertre, Olivier Potin and Jean-Baptiste Rigaud.
Scientific Publication
Scientific Publication
The paper Low-Cost First-Order Secure Boolean Masking in Glitchy Hardware was published at the DATE 2023 on 19th April 2023. The authors are Dilip Kumar S V, Josep Balasch, Benedikt Gierlichs and Ingrid Verbauwhede.
Scientific Publication
Scientific Publication
The paper Efficient attack-surface exploration for electromagnetic fault injection was published at the COSADE 2023 on 4th April 2023. The authors are Daniele Antonio Carta, Vittorio Zaccaria, Gabriele Quagliarella and Maria Chiara Molteni.
Scientific Publication
D7.1 ‘Internal & external IT communication infrastructure (incl. Project website) & initial plan for the dissemination and communication of results’
This deliverable constitutes the launch of the internal and external DYNAMO communication infrastructure including the establishment of mailing lists, new IT infrastructure and the DYNAMO website. This deliverable describes the detailed plan for the project dissemination strategy to be adopted throughout the project’s lifetime, and it defines the plan with which the different stakeholder communities will be targeted, as well as the social media that will be used.
D7.1 ‘Internal & external IT communication infrastructure (incl. Project website) & initial plan for the dissemination and communication of results’
D7.1 “Plan for Dissemination and Exploitation incl. Communication”
This deliverable presents the CONNECT communication kit including the project’s visual identity as well as communication and dissemination material to be used within the project. Furthermore, a detailed standardization plan is documented constituting a guideline for the liaison and further dissemination of the CONNECT project to external target groups and related standardization working groups. A timeline of short- and long-term dissemination activities is presented.
D7.1 “Plan for Dissemination and Exploitation incl. Communication”
Paper published in the 26th International Conference on Artificial Intelligence and Statistics (AISTATS)
Paper entitled “Isotropic Gaussian Processes on Finite Spaces of Graphs”
Paper published in the 26th International Conference on Artificial Intelligence and Statistics (AISTATS)
6GTandem Announcement Letter
The Horizon Europe project “6GTandem” will co-design novel dual-frequency operation at sub-10 GHz and sub-THz frequencies and a new highly integrated and distributed radio transceiver architecture to deliver high-performance energy efficient services for future 6G applications.
6GTandem Announcement Letter
DYNAMO Announcement Letter
We are happy to announce that under the technical leadership of CERTH in Greece, the coordination of Frauenhofer EMI in Germany with the support of the Austrian based private research company Technikon, the scientists of the consortium are engaged in a EC funded research project entitled “Dynamic Resilience Assessment Method including combined Business Continuity Management and Cyber Threat Intelligence solution for Critical Sectors” or DYNAMO. In this three-year project, 15 partners from ten different countries will work to address the problem of cyber threats in critical sectors such as health, energy and transportation.
DYNAMO Announcement Letter
Factsheet 4 – Main Achievements & ongoing work
The fourth iPC factsheet about the main achievements and ongoing work is now available. Much has already been done in the first two project periods to achieve the goal to improve the care of children with cancer and our partners are continuously working in the third project period to solve the mathematical and computational bottlenecks of data- and model-based medicine. Therefore, the fourth iPC factsheet describes the most important achievements so far and the ongoing work in the current project period.
Factsheet 4 – Main Achievements & ongoing work
D7.3 Identification of cell subpopulations in each tumour type, their association with response to therapy, and prediction of effective alternative therapies
Tumour decomposition into cells and subtypes and inference about the effects of treatments and perturbations on each tumour component (cell or tumor subclone).
D7.3 Identification of cell subpopulations in each tumour type, their association with response to therapy, and prediction of effective alternative therapies
Factsheet 3 – iPC Open Source Software
The third iPC factsheet about the iPC Open source software is now available.
It describes 3 of the 25 open source softwares that were developed during the project framework.
The focus will be on INtERAcT, CONSIFER and DECODE, which were developed by our partner IBM.
Factsheet 3 – iPC Open Source Software
Factsheet 2 – iPC Platforms
The second iPC factsheet about the iPC Platforms is now available. It describes the 5 cloud-based platforms that were developed during the project framework from our partners BSC, XLAB, CHOP, AMC, PMC, DKFZ, UGent and BCM.
Factsheet 2 – iPC Platforms
D1.4 Model development data including genetic perturbation screens and gene-drug synergies
This deliverable reports on the generation of CROPseq and drug screening data for two Ewing Sarcoma cell lines, one Hepatoblastoma cell line and one B-cell Acute Lymphoblastic Leukemia cell line.
D1.4 Model development data including genetic perturbation screens and gene-drug synergies
Conference Paper “ECML PKDD International Workshop on eXplainable Knowledge Discovery in Data Mining”
Paper entitled: “Is Attention Interpretation? A Quantitative Assessment On Sets”
Conference Paper “ECML PKDD International Workshop on eXplainable Knowledge Discovery in Data Mining”
Factsheet 1 – Tumour Type Working Groups
The first iPC factsheet on Tumour Type Working Groups is now available. It describes the 5 different types of childhood cancer and the work our partners are doing.
The working groups are led by our partners IGTP, DKFZ, PMC, CURIE, UZH and MPG.
Factsheet 1 – Tumour Type Working Groups
D7.2 Software to define tumour subclones and association with therapy response
Flow cytometry is an important diagnostic tool in childhood acute lymphoblastic leukaemia (ALL), flow cytometry data analysis is limited by multiple sources of bias and variation. We present a unified machine learning framework for automated analysis of a standardized diagnostic paediatric leukaemia staining that can overcome these challenges. We applied our framework in a large cohort of ALL flow cytometry samples and demonstrated how it can robustly extract the frequencies of cell lineage populations with minimal expert intervention. This work provides a proof of concept that our method meets the needs of an automated analysis tool for diagnostic flow cytometry data.
D7.2 Software to define tumour subclones and association with therapy response
D8.3 Metabolic models
Oncogene-driven metabolic rewiring in cancer is key to allow proliferation of tumour cells in low nutrient and oxygen conditions. To study such phenomena, reconstructing context-specific metabolic models through omics data integration is crucial. Here we report the original pipeline to construct context-specific metabolic models from scRNA-seq data and we applied it to scRNA-seq data from Ewing Sarcoma.
D8.3 Metabolic models
D4.3 Topological analysis of multi-omics and multi-cancer molecular networks resulting in the definition of molecular mechanisms
Three types of network-based analysis of gene-gene interaction networks have been suggested and tested on the multi-omics paediatric cancer datasets. User-friendly computational environment for joint application of matrix factorization and network analysis has been implemented.
D4.3 Topological analysis of multi-omics and multi-cancer molecular networks resulting in the definition of molecular mechanisms
D8.2 Network models for molecular target identification
We focused on the development of patient specific signalling networks using prior knowledge about the molecular events and CRISPR perturbation datasets and associated the activity of the nodes of signalling network with drug response data to find molecular targets.
D8.2 Network models for molecular target identification
D4.4 Consensus multi-omics subtypes of paediatric cancers
We report on the implementation of a method for multilayer community trajectory analysis and its applications, including a published study on medulloblastoma, a study on congenital myasthenic syndromes, and a study on the functional characterization of commonalities among a selection of paediatric tumours.
D4.4 Consensus multi-omics subtypes of paediatric cancers
Consensus multi-omics subtypes of paediatric cancers
We report on the implementation of a method for multilayer community trajectory analysis and its applications, including a published study on medulloblastoma, a study on congenital myasthenic syndromes, and a study on the functional characterization of commonalities among a selection of paediatric tumours.
Consensus multi-omics subtypes of paediatric cancers
D2.4 DAC Portal prototype, validated analytical workflows, analysis prototype, updated metadata standards and portal prototype
We report on the selection of the appropriate data models to handle the available data and metadata to the iPC Central Computational and Data platform. We also report on the current status of the development for the iPC Data portal.
D2.4 DAC Portal prototype, validated analytical workflows, analysis prototype, updated metadata standards and portal prototype
D3.3 Integration of INtERAcT, MelanomaMine and LimTox and application to biomedical publications on paediatric cancers
This deliverable reports on the integration of INtERAcT and the implemented text mining workflow. The workflow was developed to adapt LimTox and MelanomaMine to pediatric tumor abstracts from PubMed and relies on INtERAcT in its downstream component of inferring molecular associations between entities extracted from unstructured text.
D3.3 Integration of INtERAcT, MelanomaMine and LimTox and application to biomedical publications on paediatric cancers
D1.3 Synthetic data for testing and training patient, cancer, and drug models
Synthetic data generation is emerging as an important solution for precision medicine. Therefore, an explainable Variational AutoEncoder (VAE) model is developed for synthetic transcriptomics data generation in medulloblastoma. The model can be used to complement and interpolate available data with synthetic instances. It is also transparent as it is able to match the learned latent variables with unique gene expression patterns. The model can also be adapted to other pediatric cancers and the resulting synthetic datasets used to test and train patient, cancer, and drug models in other work packages of the iPC project.
D1.3 Synthetic data for testing and training patient, cancer, and drug models
Paper published in the Special Issue Hepatoblastoma and Other Pediatric Liver Tumors
Paper entitled “Bridging molecular basis, prognosis, and treatment of pediatric liver tumors”.
Paper published in the Special Issue Hepatoblastoma and Other Pediatric Liver Tumors
Paper published in the Journal for ImmunoTherapy of Cancer
Paper entitled “Identification and validation of viral antigens sharing sequence and structural homology with tumor-associated antigens (TAAs).”
Paper published in the Journal for ImmunoTherapy of Cancer
Paper presented in the “Computer Vision for Microscopy Image Analysis (CVMI)” workshop
Paper entitled “Unsupervised Detection of Cancerous Regions in Histology Imagery using Image-to-Image Translation”
Paper presented in the “Computer Vision for Microscopy Image Analysis (CVMI)” workshop
Paper published in Physics of Life Reviews: pp. 132-134
Paper entiteld: „Adaptation through the lense of single-cell multi-omics data Comment on “Dynamic and thermodynamic models of adaptation” by A.N. Gorban et al.”
Paper published in Physics of Life Reviews: pp. 132-134
Paper published in the Proceedings of International Conference on Machine Learning (ICML) 2021
A new network inference algorithm from TUDA with iPC acknowledge was published in the ICML 2021. Paper entitled “Active Learning of Continuous-Time Bayesian Networks Through Interventions”.
Paper published in the Proceedings of International Conference on Machine Learning (ICML) 2021
D4.2 An interactive online atlas of interconnected network maps based on the NaviCell platform
With the development of the NaviCell 3.0 web server, there is a complete and automated web-based infrastructure for hosting molecular maps, patient similarity network maps, and multi-omics datasets for the project. The NaviCell platform supports molecular map navigation and exploration using the Google maps
engine. The logic of navigation is taken from Google maps. This NaviCell 3.0 web-server is freely available and several step-by-step tutorials are accessible.
D4.2 An interactive online atlas of interconnected network maps based on the NaviCell platform
D7.1 Application of software enabling computational deconvolution of bulk RNA-sequencing data to immune cell profiles of patient samples
Computational deconvolution of bulk RNA-sequencing data to infer cell type composition of a sample is challenging. Benchmarking of various computational deconvolution tools revealed various data processing parameters that impact deconvolution accuracy and revealed the importance of a complete reference matrix. As a complete reference matrix is often not available, an algorithm was designed that can handle missing cell types. This algorithm can be applied to establish the immune cell repertoire of primary tumor biopsies without prior knowledge of the full spectrum of cell types in the biopsy.
D7.1 Application of software enabling computational deconvolution of bulk RNA-sequencing data to immune cell profiles of patient samples
D3.1 Identification of important regulatory elements using multi-level matrix factorization approaches
D3.1 describes the techniques for dimensionality reduction used in iPC and their application to a selection of cohorts (at different omics levels) as well as a meta-analysis of the four solid tumor types of interest. The goal of the deliverable is to provide a list of pathways and biological functions having a key role in multiple paediatric cancers.
D3.1 Identification of important regulatory elements using multi-level matrix factorization approaches
D3.2 Adaptation of MelanomaMine and LiMTox to the analysis of paediatric cancers and application to biomedical publications on paediatric cancers
The paper reports on the implementation of the iPC text mining workflow and three use cases for extracting biomedical information from large volumes. The workflow builds on the general framework of two text mining tools, LimTox and MelanomaMine. These tools will be used in the framework of the iPC project but also beyond, having a clear impact in the research community.
D3.2 Adaptation of MelanomaMine and LiMTox to the analysis of paediatric cancers and application to biomedical publications on paediatric cancers
D8.1 Data-driven model for molecular targets and drug repositioning
This deliverable provides a detailed overview of the proposed computational tool for predicting patient-specific drugs with potential therapeutic benefit for paediatric cancer treatment and provides, for example, evidence for the goodness of the model in predicting such patient-specific drugs.
D8.1 Data-driven model for molecular targets and drug repositioning
D2.3 Recommended metadata standards and portal prototype
The iPC project aims to ensure interoperability of data between different resources, so the platform must enforce principles and well-defined standards for data accessibility, usability, and registration. This deliverable provides an overview of the different approaches to representing metadata within the iPC Platform, and the efforts to integrate and leverage them within the iPC Catalog and the overall iPC Central Computational and Data Platform to enable meaningful management of research data.
D2.3 Recommended metadata standards and portal prototype
D1.2 Collection of high-quality clinical and molecular paediatric cancer datasets as well as other tumour types
In this deliverable, demographic, clinical, and molecular profiles were collected for several pediatric and adult tumors. In addition, the focus here is on collections of single cell profiles of high risk cancers. The datasets will be used to evaluate the effects of treatments and perturbations on cancer cells, build models, and provide information on deciphering regulatory interactions. These data will allow characterization of cancer cell types that predict treatment outcome, as well as cell types that are resistant to therapies.
D1.2 Collection of high-quality clinical and molecular paediatric cancer datasets as well as other tumour types
“Artificial Intelligence in Cancer Research: learning at different levels of data granularity”
Article published in the Molecular Oncology Journal, Volume 15, Issue 4 Pages 817-829.
“Artificial Intelligence in Cancer Research: learning at different levels of data granularity”
Article published in the Cancer Cell Journal, Volume 39, Issue 6, P 810-826
Article entitled “STAG2 mutations alter CTCF-anchored loop extrusion, reduce cis-regulatory interactions and EWSR1-FLI1 activity in Ewing sarcoma”.
Article published in the Cancer Cell Journal, Volume 39, Issue 6, P 810-826
Publication in the Journal of Medical Internet Research (JMIR).
Article entitled “Artificial Intelligence–Aided Precision Medicine for COVID-19: Strategic Areas of Research and Development”.
Published in the JMIR, Volume 23 Issue 3 by partner Barcelona Supercomputing Center (BSC).
Publication in the Journal of Medical Internet Research (JMIR).
Paper published in the International Joint Conference on Neural Networks-2021 (IJCNN2021)
Paper entitled: “Clinical trajectories estimated from bulk tumoral molecular proles using elastic principal trees”
Paper published in the International Joint Conference on Neural Networks-2021 (IJCNN2021)
D4.1 Building of cancer type-specific multi-layered molecular and patient similarity networks
iPC uses network inference techniques and applies a selection of pediatric patient cohorts at different omic levels. Networks will be generated, for example, for the generation of molecular patient networks to be used in downstream project activities involving the use of networks.
D4.1 Building of cancer type-specific multi-layered molecular and patient similarity networks
D2.2 “Initial infrastructure framework”
An initial demonstrator of the iPC infrastructure is reviewed. The platform’s architecture is based on modules, which allow parallel developments and integration of different open source-based software components. This allows us to leverage other efforts and contribute towards its sustainability and maintainability. The release of a minimum viable platform is allowing us to capture early feedback from researchers at iPC.
D2.2 “Initial infrastructure framework”















