
MAChiaVelli Methodology for Assessing Components Vulnerabilities in SMI2G 2022
Explore the comprehensive MAChiaVelli methodology for assessing vulnerabilities in IT components at SMI2G 2022 conference in Brussels. This methodology includes run-time and design-time methods, fuzzy testing, symbolic execution, and more to enhance cybersecurity practices and mitigate risks effectively. Join the proposed coordinator, Graziano GIORGI, and key partners TECOMS, Defence Research Institute, Rome Hospital, and others to delve into supply chain issues, vulnerability assessments, and best practices aligned with the EU Cybersecurity Act.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
MAChiaVelli Methodology for Assessing Components Vulnerabilities SMI2G 2022, 16-17 May 2022, Brussels Graziano GIORGI graziano.giorgi@zanasi-alessandro.eu Role: Proposed coordinator Proposal activity: HORIZON-CL3-2022-CS-01-02 1 Graziano GIORGI (graziano.giorgi@zanasi-alessandro.eu)
Proposal idea SMI2G 2022, 16-17 May 2022, Brussels A methodology components vulnerabilities, including: for the assessment of IT A gap analysis to produce updated best practices; Both design-time and run-time methods to discover vulnerabilities; Supply chains issues to investigate the availability of critical components. 2 Graziano GIORGI (graziano.giorgi@zanasi-alessandro.eu)
The MAChiaVelli's methodology SMI2G 2022, 16-17 May 2022, Brussels Run-time methods Design-time methods Fuzzy testing Symbolic Execution Cyber ranges/Digital Twins Supporting tools for CI/CD pipeline Etc. Best practices aligned with the EU Cybersecurity Act IDE s warnings and plug-in modules UML and class diagrams Etc. IT components Firmwares, Communications protocols, Operating Systems, APIs, drivers, etc. Supply chain issues evaluation (availability, replacement, trustworthiness, maintenance, etc. of IT components) Vulnerability assessment List of vulnerabilities Recommendations to mitigate them Risk score 3 Graziano GIORGI (graziano.giorgi@zanasi-alessandro.eu)
Project participants Coordinator (TBC): Zanasi & Partners (IT) SMI2G 2022, 16-17 May 2022, Brussels Partners / Other participants: TECOMS (IT) Defence Research Institute (FR) Rome Hospital (IT) EU LEAs Secured communication partner (UK, TBC) Looking for: Sensors, HW and IoT experts System integrators A research center/large industry acting as a coordinator 4 Graziano GIORGI (graziano.giorgi@zanasi-alessandro.eu)