BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//7shield - ECPv5.2.1//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:7shield
X-ORIGINAL-URL:https://www.7shield.eu
X-WR-CALDESC:Events for 7shield
BEGIN:VTIMEZONE
TZID:Europe/Paris
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:20230326T010000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:20231029T010000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20230206
DTEND;VALUE=DATE:20230211
DTSTAMP:20260418T170049
CREATED:20230214T162541Z
LAST-MODIFIED:20230214T162541Z
UID:4491-1675641600-1676073599@www.7shield.eu
SUMMARY:7SHIELD activities presented at the The European Network for Cybersecurity (NeCS) PhD School
DESCRIPTION:7SHIELD was presented at this year’s edition of the European Network for Cybersecurity (NeCS) PhD School. The school was launched six years ago\, in response to the increasing need of highly qualified experts in cyber-security. The School addresses the issues of training and development of talented junior researchers\, as indicated in the European Cybersecurity strategy and highlighted in the EC’s Digital Agenda. Luigi Romano from CeRICT gave a lecture titled: “Hardware-assisted Trusted Computing: State of The Art and Emerging Use Cases”. In the lecture\, he explained that even the most secure algorithm is vulnerable\, if the computing environment where it is executed is not adequately protected and he presented the solutions which have been developed in 7SHIELD to provide such protection. In particular\, he focused on 7SHIELD protection mechanisms for data “in use” (i.e. it is loaded in the RAM or in the CPU for executing a computation) based on Trusted Execution Environment (TEE) technology. It is worth emphasizing that – while protection of data in transfer and at rest is relatively easy to achieve – protection of data in use is still\, to a large extent\, an open issue. The challenge here is that data must be also protected from attacks by privileged users (e.g. system administrators or cloud providers) and software (e.g. the operating system or the hypervisor). Protection of data in use is a number one priority in security research\, since it the enabling factor of a number of business opportunities. The talk introduced the basic concepts of hardware-assisted security and gave an overview of the current State of The Art of CPU support for Trusted Execution Environment technology. Then\, 7SHIELD use cases were presented\, where TEE technology was used to effectively improve security in real world setups.
URL:https://www.7shield.eu/event/7shield-activities-presented-at-the-the-european-network-for-cybersecurity-necs-phd-school/
LOCATION:NeCS Winter School\, Via Sommarive 9 – Italy\, Povo di Trento\, 38123\, Italy
END:VEVENT
END:VCALENDAR