A simulation model of self-powered ankle prosthetics (completed)

Unlike conventional passive prosthetics, self-powered prosthetics provide positive net work to enhance strength and speed of limb movement. These are used not just in rehabilitation medicine but also as components of powered exoskeletons, a technology with numerous applications including military, manufacturing and construction industry, emergency and rescue. The extent of powered propulsion is typically determined … full description “A simulation model of self-powered ankle prosthetics (completed)”

Autonomous Cars – Evaluation of Security Countermeasures (available)

Project Description Autonomous and connected vehicles will be a part of reality in the near future. There are many development efforts currently underway to pave the way for the deployment of autonomous vehicles (self-driving cars) in public areas. These vehicles are a collection of complex and sophisticated computational architectures. Cybersecurity is among many challenges that … full description “Autonomous Cars – Evaluation of Security Countermeasures (available)”

Embedded firmware development for the Open Bot Brain project (available)

Software is a vital part of our infrastructure. You may be familiarwith software running on computers and phones. But software runs onmany more devices as part of an embedded microcontroller in thedevice, software running on embedded devices is often called firmware.Examples range from toothbrushes, to appliances, to tools, and devicesin the so called internet of … full description “Embedded firmware development for the Open Bot Brain project (available)”

Maritime Cybersecurity (available)

Project Description Connected objects in motion are developing as a significant domain. There are many traditional businesses, like logistics and maritime shipping that have legacy systems, but they are rolling out interconnectivity globally. Today’s shift towards increasing interconnectedness at sea is continuing to enable significant efficiency gains and new capabilities for maritime operations. Running in … full description “Maritime Cybersecurity (available)”

Side Channel Attacks on GPUs (completed)

Side Channel Attacks on GPUs Project Description GPUs (Graphics Processing Units) are commonly integrated in any computing paradigm, enhancing the performance of systems from gaming to scientific research. Under specific circumstances, the GPU can be shared between applications allowing a spy application to monitor side channels and attempt to infer with potential victims. For example, … full description “Side Channel Attacks on GPUs (completed)”

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)

WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications   Microarchitectural covert channels are a threat to data confidentiality in multi-tenant environments (cloud platform, mobile phone, etc.). This type of leakage channel aims at tunnelling information across isolation boundaries (sandboxing, censorship, etc.) by exploiting timing variations during program execution. Indeed, the state of microarchitectural components … full description “WebAssembly-based microarchitectural covert channel attacks: capabilities, proof-of-concept, and implications (completed)”