We will augment unmanned aerial vehicles (UAV) with SoC-based devices and technologies for hardware-based security, utilizing Trusted Execution Environment (TEE) technologies such as ARM TrustZone and RISC-V analogues. We are interested in their access control and Trusted Application (TA) features. We then build lightweight cryptographic protocols that will allow constrained devices (including UAVs, drones) to communicate securely over possibly insecure channels. Finally, we investigate ways of leveraging the power of secure hardware such as TEEs in order to design and develop protocols and TAs that will allow data processing (both in encrypted and unencrypted form) in a privacy-preserving manner.



The vision of ASCLEPIOS is to maximize and fortify the trust of users on cloud-based healthcare services by developing mechanisms for protecting both corporate and personal sensitive data. While researchers have developed many theoretical models that could enhance the security level of healthcare services, only a rudimentary set of techniques are currently in use. ASCLEPIOS is addressing these limitations by utilizing several modern cryptographic approaches to build a cloud-based eHealth framework that protects users’ privacy and prevents both internal and external attacks.

  • Full Title: Advanced Secure Cloud Encrypted Platform for Internationally Orchestrated Solutions in Healthcare (ASCLEPIOS)
  • Duration & Grant: Research funding for 3.5 years (4,840,000€, 10 Partners)
  • Website:
  • Project Type: Research & Innovation
  • Status: Active
  • Contact: Antonis Michalas

CYBELE (H2020)

H2020 CYBELE Logo

CYBELE generates innovation and creates value in the domain of agri-food, and its verticals in the sub-domains of PA and PLF in specific, as demonstrated by the defined real-life industrial cases, empowering capacity building within the industrial and research community. Since agriculture is a high-volume business with low operational efficiency, CYBELE aspires at demonstrating how the convergence of HPC, Big Data, Cloud Computing, and the IoT can revolutionize farming, reduce scarcity and increase food supply, bringing social, economic, and environmental benefits. CYBELE intends to safeguard that stakeholders have integrated, unmediated access to a vast amount of large scale datasets of diverse types from a variety of sources, and they are capable of generating value and extracting insights, by providing secure and unmediated access to large-scale HPC infrastructures supporting data discovery, processing, combination and visualization services, solving challenges modeled as mathematical algorithms requiring high computing power.

  • Full Title: Fostering Precision Agriculture and Livestock Farming Through Secure Access to Large-Scale HPC-Enabled Virtual Industrial Experimentation Environment Empowering Scalable Big Data Analytics (CYBELE)
  • Duration & Grant: Research funding for 3.5 years (12,407,673€, 31 Partners)
  • Website:
  • Project Type: Research & Innovation
  • Status: Active
  • Contact: Antonis Michalas


Side-Channel Analysis (SCA) is an offensive security technique that targets secrets in implementations of security-critical devices. Examples of existing side-channels include power consumption, electro-magnetic radiation, timing, and acoustic emanations. At a high level, SCARE will discover new side-channels, utilize them to develop attacks on real-world devices and protocols, and mitigate the attacks with a regression testing approach.

  • Full Title: Side-Channel Aware Engineering (SCARE)
  • Duration & Grant: Research funding for 5 years (1,500,000€)
  • Website:
  • Project Type: ERC Starting Grant 804476
  • Status: Active
  • Contact: Billy Brumley


The main goal of KYBERTURVAAJA (CYBERKEEPER) is to prepare and offer security education for work life. This is based on already existing study modules and infrastucture. Participating companies are from each local region, focused on SME companies. The aim is to utilize the entire network of participating universities.

D4Value (Business Finland)

D4V LogoThe D4Value program, co-ordinated by DIMECC, focuses on autonomous supply chain for maritime logistics as well as manufacturing’s cases. It attempts to disrupt supply chain ecosystems by featuring novel value creation and attractive value sharing through introducing ecosystem level business models and digital platforms that enable scalable, replicable, digitalized, and autonomous door to door supply chain processes. D4Value targets to a create the basis and strategies for business ecosystem formation around disrupting supply chain and thereby create new business models with promising value creation which motivates partners to join the ecosystem. In order to do so, D4Value will develop and test key technologies to develop the basis for open, scalable, secure, trusted and desirable platform, that enables a platform-based business in autonomous value chain.

  • Full Title: Design 4 Value
  • Duration & Grant: Research funding for 2 years (€12 million, 20 Partners)
  • Website: DIMECC D4Value
  • Project Type: DIMECC Programme
  • Status: Completed April 2019
  • Contact: Bilhanan Silverajan

ACTIVE (EIT Digital)

ACTIVE logoThe ACTIVE programme aims at accelerating the creation of applications & services by providing a unified approach for developers and industry to support the widespread growth in IoT. ACTIVE addresses the Internet-of-Things market, which currently is in its early stages, and dominated by domain-specific platforms, proprietary architectures and vertically divided technology silos. ACTIVE enables crossing these divisions by offering a unified approach consisting of end-to-end components and solutions.

A special focus is set on connectivity, middleware, device management and privacy & security, which are provided as a set of Application Programming Interfaces (APIs).

  • Full Title: Advanced Connectivity Platform for Vertical Segments
  • Duration & Grant: Research funding for 3.5 years (€9 million, 14 Partners)
  • Website: EIT Digital ACTIVE
  • Project Type: High Impact Initiative
  • Status: Completed December 2018
  • Contact: Bilhanan Silverajan

ATHENA (Academy of Finland)

As opposed to a traditional block cipher that only provides confidentiality, Authenticated Encryption (AE) is a cryptographic primitive achieving confidentiality, integrity, and authenticity in a single function. AE is a fundamental concept in e.g. TLS, with several cipher suites utilizing AES Galois Counter Mode (GCM). Briefly, a TLS Cipher Suite is a combination of cryptographic algorithms to achieve a number of high level security goals. In ATHENA, we scrutinize one of those goals in particular: authentication. Furthermore, in the context of real-world systems and protocols, TLS being the focus and OpenSSL the most popular open source implementation.

  • Full Title: Authenticated Encryption Analysis (ATHENA)
  • Duration & Grant: Research funding for 2 years (241,746€)
  • Website:
  • Project Type: Strategic Research Council 303814
  • Status: Completed September 2018
  • Contact: Billy Brumley