The Airbus Group is a European multinational aerospace and defence corporation registered in the Netherlands and headquartered in Toulouse, France. The group consists of the three business divisions Airbus, Airbus Defence and Space, and Airbus Helicopters.The company was originally formed as the European Aeronautic Defence and Space Company on 10 July 2000 by the merger of Aérospatiale-Matra, DaimlerChrysler Aerospace AG , and Construcciones Aeronáuticas SA . In January 2014, EADS was reorganised as Airbus Group combining the divisions for development and marketing of civil and military aircraft, as well as communications systems, missiles, space rockets, helicopters, satellites, and related systems. Wikipedia.
Cassidian | Date: 2017-08-16
The invention relates to a method for dynamic management of at least one first level of verbosity (NCp(1) of at least one component (Cp) defined in a data network, said data network having a control centre (SUPERV), each component ((Cp)i[1;M]) allowing the execution of a set of tasks and comprising a security management configuration associating a status message, referred to as a log, with the execution of a task (Tpk) of said component, each log (LOGpk) associated with a task indicating at least one event and having a local level (NLk), the control centre (SUPERV) allowing the collection of a set of logs in order to supervise said network, said method comprising: a detection of a stimulus by a control centre (SUPERV); a determination of at least one component (Cp) associated with the stimulus detected by the control centre (SUPERV); a modification of the first level of verbosity of said component (NCp(1)) to a second level of verbosity (NCp(2)) during a first given period (T1), said modification being launched by the generation of a supervision command (MODIF(Nc)) by the control centre (SUPERV), the second level of verbosity (NCp(2)) being defined according to the stimulus.
Cassidian | Date: 2017-06-21
The present disclosure relates to a method for inspecting a host computer using a USB device, wherein the USB device is selectively operable in a mass storage mode and in a computing mode. The method comprises booting (S310; S320) an inspection operating system on the host computer from the USB device, when the USB device is operated in the mass storage mode, the inspection operating system providing one or more inspection functions for inspecting the host computer, switching (S316; S326) the USB device from the mass storage mode to the computing mode, and inspecting (S318; S328) the host computer using the one or more inspection functions of the inspection operating system, the one or more inspection functions being controlled from the USB device operated in the computing mode.
Cassidian | Date: 2016-12-19
A method for inspecting a host computer using a USB device, wherein the USB device is selectively operable in a mass storage mode and in a computing mode. The method comprises booting an inspection operating system on the host computer from the USB device, when the USB device is operated in the mass storage mode, the inspection operating system providing one or more inspection functions for inspecting the host computer, switching the USB device from the mass storage mode to the computing mode, and inspecting the host computer using the one or more inspection functions of the inspection operating system, the one or more inspection functions being controlled from the USB device operated in the computing mode.
Airbus and Cassidian | Date: 2016-12-19
A USB device for secure data loading to a system component, such as of an aircraft. The USB device is operable in a mass storage mode and in a non-mass storage mode. The USB device initially operates in the non-mass storage mode upon startup and comprises a storage for storing data to be loaded to the system component, a processor and a memory, wherein the memory contains instructions executable by the processor such that the USB device is operable to perform a security check on the data to be loaded to the system component, and switch, upon the security check, from the non-mass storage mode to the mass storage mode to provide the data for loading to the system component.
Airbus and Cassidian | Date: 2017-06-21
The present disclosure relates to a USB device for secure data loading to a system component, such as of an aircraft. The USB device is operable in a mass storage mode and in a non-mass storage mode. The USB device initially operates in the non-mass storage mode upon startup and comprises a storage for storing data to be loaded to the system component, a processor and a memory, wherein the memory contains instructions executable by the processor such that the USB device is operable to perform (S206) a security check on the data to be loaded to the system component, and switch (S208), upon the security check, from the non-mass storage mode to the mass storage mode to provide the data for loading to the system component.
Agency: European Commission | Branch: FP7 | Program: CP-IP | Phase: SEC-2013.5.1-2 | Award Amount: 15.13M | Year: 2014
SIIP is a break-through Suspect Identification solution based on a novel Speaker-Identification (SID) engine fusing multiple speech analytic algorithms (e.g. voiceprints recognition, Gender/Age/Language/Accent ID, Keyword/ Taxonomy spotting and Voice cloning detection). This Fused Speaker Identification will result in significantly higher true-positive speaker identification, reduced False-Positives/Negatives while increasing reliability & confidence. SIIP analyzes rich metadata from voice samples and social media. SIIP provides judicial admissible evidence for identifying crime/terror suspects as well as for mapping/tracing the suspect terror/crime network. SIIP is crucial when individuals use Internet-based applications (e.g. VoIP or social media) to plan a crime or terrorist attack. SIIPs results can easily be shared with relevant authorities based on a sustainable SIIP Info Sharing Center (SISC) located at INTERPOL. SISC guarantees an increased reliability of the identification results through advanced technologies and through voice samples checked against a large centralized database of samples collected by INTERPOLs 190 members (based on standard operating/data privacy procedures). SIIP multiplies and increases the information sharing and cooperation in the LEA community and speeds up the use of Speaker Identification by LEAs in Europe not only for individual identification but also for authentication. SIIP runs on all speech sources (e.g. Internet, PSTN, Cellular and SATCOM) and uses the latest OSINT data mining applications to obtain and corroborate voice samples. The SIIP consortium consists of 17 partners bringing together end-users, SMEs, industrial and academic partners from a variety of fields including Speech analytics, Social Media Analytics and Integration. To maximize its impact, SIIP will be designed, developed and tested with INTERPOL and police forces in the UK and Portugal, taking into account the various EU legal/ethical aspects and Interpol regulations.
Agency: European Commission | Branch: FP7 | Program: JTI-CP-ARTEMIS | Phase: SP1-JTI-ARTEMIS-2013-ASP3 | Award Amount: 39.61M | Year: 2014
DEWI (dependable embedded wireless infrastructure) envisions to significantly foster Europes leading position in embedded wireless systems and smart (mobile) environments such as vehicles, railway cars, airplanes and buildings. These environments comprise wireless sensor networks and wireless applications for citizens and professional users. Therefore the consortium introduces the concept of a sensor & communication bubble featuring: - locally confined wireless internal and external access - secure and dependable wireless communication and safe operation - fast, easy and stress-free access to smart environments - flexible self-organization, re-configuration, resiliency and adaptability - open solutions and standards for cross-domain reusability and interoperability DEWI identifies and implements an integrated dependable communication architecture using wireless technology capable of replacing the traditional heavy wiring between computers / devices / sensors, and therefore makes possible less expensive and more flexible maintenance and re-configuration. Citizens will gain easier, more comfortable, more transparent and safer access to information provided by the sensor &communication bubble. DEWI will provide a platform and toolset containing methods, algorithms, prototypes, and living labs solutions for cross-domain reusability, scalability and open interface standards, and will contribute to the ARTEMIS repository by connecting to other ASP and AIPP initiatives to ensure long-term sustainability and impact towards society. Key results of DEWI will be demonstrated in exemplary show cases, displaying high relevance to societal issues and cross-domain applicability. Regarding interoperability, DEWI will also contribute to establishing a standard for wireless systems engineering in a certification and security context, which entails conformity to both domain-specific standards and international domain-independent standards. TA approved by ARTEMIS-JU on 17/12/2013 Amendment 1 changes approved by ECSEL-JU on 18/03/2015 Note: SPICER OFF- HIGHWAY appears with short name DANA after its mother company DANA BELBIUM NV in anticipation of a follow-up amendment for UTRO
Agency: European Commission | Branch: FP7 | Program: CP-IP | Phase: SEC-2013.2.5-3 | Award Amount: 13.20M | Year: 2014
The protection of critical infrastructures increasingly demands solutions which support incident detection and management at the levels of individual CI, across CIs which are depending on each other, and across borders. An approach is required which really integrates functionalities across all these levels. Cooperation of privately operated CIs and public bodies (governments and EU) is difficult but mandatory. After about 10 years of analysis and research on partial effects in CIP and for individual infrastructure sectors, ECOSSIAN is supposed to be the first attempt to develop this holistic system in the sense portrayed above. A prototype system will be developed which facilitates preventive functions like threat monitoring, early indicator and real threat detection, alerting, support of threat mitigation and disaster management. In the technical architecture with an operations centre and the interfaces to legacy systems (e.g., SCADA), advanced technologies need to be integrated, including fast data aggregation and fusion, visualization of the situation, planning and decision support, and flexible networks for information sharing and coordination support, and the connection of local operations centres. This system will only be successful, if the technical solutions will be complemented by an effective and agreed organizational concept and the implementation of novel rules and regulations. And finally, the large spectrum of economically intangible factors will have significant influence on the quality and acceptance of the system. These factors of societal perception and appreciation, the existing and required legal framework, questions of information security and implications on privacy will be analyzed, assessed and regarded in the concept. The system will be tested, demonstrated and evaluated in realistic use cases. They will be developed with the community of stakeholders and cover the sectors energy, transportation and finance, and the ubiquitous sector of ICT.
Agency: European Commission | Branch: H2020 | Program: Shift2Rail-RIA | Phase: S2R-OC-IP2-01-2015 | Award Amount: 1.50M | Year: 2016
Railway infrastructures are moving towards more intelligent, connected, user-centric and collaborative systems. While it brings many advantages for the industry and users, it also poses new opportunities for cyber-criminals and terrorists. CYRail aims to deliver tailored specifications and recommendations for secure modern rail systems design and operation. The challenges are multiple: wide and distributed geographical display of rail systems limit the traditional cyber-protection and cyber-defence tools & practices; the heterogeneous nature of rail systems make them vulnerable to blended attacks; the collaboration with other transportation infrastructures increase the number of points for attack; new passenger-centric services may expose rail systems to threats known in the IoT; last but not least, ICT supporting these trends are not necessarily trusted for critical applications. CYRail will address those challenges through a methodical diagnosis and specification process, enforced at each step of the cyber-security chain: operational context and scenarios will be defined, followed by a security assessments of railway systems. An analysis of threats targeting those infrastructures will be developed as well as innovative, attack detection and alerting techniques. Adapted mitigation plans and countermeasures will be defined, taking into account their potential impact on operations. Protection Profiles for railway control and signalling applications will be delivered to ensure security by design of new rail infrastructures. The CYRail consortium intends to take advantage of developments in other industries (aeronautics, automotive and energy) and bring them into the railway sector, taking similarities and specificities into account. The Consortium is comprised of a well-balanced group of 6 partners from 5 European countries with complementary skills. An Advisory Board is foreseen, to bring on board the expertise from stakeholders within the railway value chain.
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: DS-01-2016 | Award Amount: 3.82M | Year: 2017
The assurance of security, privacy, reliability and safety features is key-point to unlock the enormous potential that the connected vehicles systems paradigm i.e., the dynamic Cyberphysical system of highly-equipped infrastructure-connected vehicles with numerous third-party components, can offer towards safer transportation. The emerging systems expose a variety of wireless-communication and hardware interfaces which result in a large attack surface; thus, attempts to assess the degree of confidence that security needs are satisfied come with prohibited cost for automotive stakeholders and OEMs. SAFERtec project will leverage a highly-skilled consortium to first model the varying exposure of a prototype connected vehicle system to numerous threats appearing under two generic instances of the increasingly pervasive V2I setting. One relates to road-side unit communication while the other involves the interaction with cloud application and passengers smart devices. Then, adopting a systematic vertical approach SAFERtec will obtain an in-depth look of the possible vulnerabilities performing penetration-testing on individual hardware components and upper-layer V2I applications. Considering the available security mechanisms a third party provider already applies to each module, SAFERtec will determine a corresponding protection profile as a summary of the identified risks. An innovative framework appropriately designed for unified and thus, cost-effective use across all modules will employ statistical tools and security metrics to quantify the involved security assurance levels and also feed the incomplete automotive standards. Research on dependability methods will then allow the frameworks transition from individual modules to the connected vehicle system. All above results will be incorporated and made available through an open-access toolkit that will pave the way towards the cost-effective identification of security assurance levels for connected vehicle systems.