Skip to main content

Research Repository

Advanced Search

TrueDeploy - CyberASAP Phase 1

People Involved

Project Description

The way in which we develop and supply secure, trusted software is broken. The dominance of open-source software and the interconnectedness of software between organisations has raised cybersecurity risks in the software supply chain.

The Solarwinds, Kaseya and Notpetya attacks have cost companies and nation-states billions of dollars. Each of these incidents shares the same issue, which is that the attacks were possible because a threat actor managed to infiltrate and compromise software that was being developed by a software vendor in the long chain that exists from code being written to it being distributed to a customer. This is known as a software supply chain attack.

The software supply chain relates to developing and supplying software for use across all organisations and systems. This software supply chain needs to be managed by organisations that use software due to regulatory requirements and/or market pressure to ensure that their systems are not compromised, leading to potential financial or reputational loss.

Our solution aims to bring trust and transparency to the software supply chain. We will do this by bringing together a novel combination of blockchain, credential management and access control technologies.

Project Acronym TrueDeploy - CyberASAP Phase 1
Status Project Complete
Funder(s) Innovate UK
Value £31,969.00
Project Dates Apr 1, 2022 - Jul 31, 2022



You might also like

Project Quaisten Jun 1, 2014 - Aug 1, 2015
To develop a question generator API to pull information from the web, based on defined questions types, confirming correct answers and implementing a process of question difficulty based on metrics about the individual question type and possible answ... Read More about Project Quaisten.

Fragment Finder Mar 27, 2015 - Jan 18, 2016
Fragment Finder (FF) enables a new, high-speed approach to digital forensics. It is unique in that it will build a more efficient technical architecture for the creation, storage and use of hash signatures in digital forensics. The key focus of FF is... Read More about Fragment Finder.

Onyu_Secure Apr 1, 2015 - Jul 31, 2015
The project undertaken by Onyu and ENU will concentrate around the mobile application that is under development by the team at Onyu.

Working with ENU our key objectives are:
1. Validation of our zero-knowledge encryption solutio... Read More about Onyu_Secure.