{"id":2035,"date":"2023-06-23T22:33:00","date_gmt":"2023-06-23T20:33:00","guid":{"rendered":"http:\/\/10.0.1.197\/?p=2035"},"modified":"2024-06-07T22:52:52","modified_gmt":"2024-06-07T20:52:52","slug":"cest-confidential-evaluation-of-software-trustworthiness-project-finished","status":"publish","type":"post","link":"http:\/\/192.168.0.78\/cest-confidential-evaluation-of-software-trustworthiness-project-finished\/","title":{"rendered":"CEST (Confidential Evaluation of Software Trustworthiness) project finished"},"content":{"rendered":"\n
\"\"<\/figure>\n\n\n\n

Following the news published in early 2022<\/a>, atsec would like to proudly announce a successful completion of the CEST (Confidential Evaluation of Software Trustworthiness) project – a Swedish research project funded by Vinnova<\/a>.

The CEST project provides a confidential software security assurance environment enabling software supply chains to be compliant with regulations, standards, and corporate assurance requirements. It would possibly allow independent third-party evaluators to conduct software security analysis of vendor proprietary software while preserving the confidentiality of the analysed software.

The proposed solution is based on Confidential Computing, which allows for confidential software analysis using a Trusted Execution Environment (TEE), a security technology that protects the execution of code and the confidentiality and integrity of data. The TEE ensures that the analysis is performed in a secure environment and that the results are trustworthy. This means that analysis tools used for software assurance can run inside a TEE, thus protecting the vendor\u2019s sensitive Intellectual Property (IP). The CEST prototype is implemented as a SaaS platform, with software vendors having control over their sensitive IP in the form of source code, executables and CEST-generated reports.\u00a0

The project consortium was formed by four strong partners with individual backgrounds: Ericsson \u2013 a multinational networking and telecommunications company as the need owner, Hyker Security \u2013 an expert in confidential computing development, RISE (Research Institutes of Sweden) \u2013 a Swedish state-owned research institute with a cybersecurity focus, and atsec \u2013 an independent information security assessment, testing, and evaluation facility with more than 20 years of experience.

The project partners Ericsson, Hyker, and RISE were the developers of the CEST prototype, while atsec complemented the team by providing testing and usability analysis of the CEST prototype to perform security evaluations of confidential software.

For more information about the CEST, please refer to the
CEST project website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Following the news published in early 2022, atsec would […]<\/p>\n","protected":false},"author":2,"featured_media":2036,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[9,1],"tags":[],"_links":{"self":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2035"}],"collection":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/comments?post=2035"}],"version-history":[{"count":2,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2035\/revisions"}],"predecessor-version":[{"id":2052,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/posts\/2035\/revisions\/2052"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media\/2036"}],"wp:attachment":[{"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/media?parent=2035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/categories?post=2035"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/192.168.0.78\/wp-json\/wp\/v2\/tags?post=2035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}