ELASTIC Project https://elasticproject.eu Mon, 16 Mar 2026 13:52:50 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 https://elasticproject.eu/wp-content/uploads/2024/04/favicon_ELASTIC-150x150.png ELASTIC Project https://elasticproject.eu 32 32 ELASTIC Participates in the “Women in ICT Standardisation” Webinar – 5th Edition https://elasticproject.eu/elastic-participates-in-the-women-in-ict-standardisation-webinar-5th-edition/ Mon, 16 Mar 2026 10:32:18 +0000 https://elasticproject.eu/?p=1916

ELASTIC Participates in the “Women in ICT Standardisation” Webinar – 5th Edition

On 20 March 2026, the “Women in ICT Standardisation” webinar – 5th edition will bring together experts, researchers, policymakers, and industry representatives to discuss how to strengthen the participation and visibility of women in the development of ICT standards.

The online event is organised within the European ICT standardisation ecosystem and aims to promote dialogue on diversity, inclusion, and equal participation in standards development.

This year, StandICT.eu joins forces with several key EU-funded initiatives, including ELASTIC, EDU4Standards, CYBERSTAND.eu, and SEEBLOCKS.eu, alongside the Women in Telecommunications and Research (WiTaR) Working Group.
Together, these initiatives are working to promote stronger engagement of women in ICT standardisation activities and to foster a more inclusive standardisation community.

ELASTIC Representation in the Webinar

The ELASTIC project will be represented by Despoina Kopanaki, who will participate as one of the speakers.

Despoina Kopanaki is a Senior Project Manager at the Technical University of Crete and an active member of the WiTaR Working Group of the 6G Infrastructure Association. Through her work in European research and innovation projects, she contributes to strengthening collaboration between research communities, industry stakeholders, and standardisation bodies.

Her participation in the webinar highlights the importance of connecting European research projects with international standardisation efforts, ensuring that innovations developed within EU-funded initiatives can contribute to shaping future digital standards.

Addressing the Gender Gap in ICT Standardisation

Technical standards are fundamental for ensuring interoperability, security, and large-scale adoption of digital technologies. They influence a wide range of areas, including connectivity, cybersecurity, cloud and edge infrastructures, artificial intelligence, and future 6G systems.

Despite their importance, women remain underrepresented in many standardisation activities. Initiatives such as the Women in ICT Standardisation webinar series aim to address this imbalance by creating a platform where experts can share experiences, discuss challenges, and promote strategies that support greater participation of women in standards development organisations.

By highlighting the contributions of women actively engaged in the field, the webinar also aims to inspire new generations of researchers and professionals to take part in shaping future digital standards.

Topics of the Webinar

The fifth edition of the webinar will focus on several key themes, including:

  • challenges affecting women’s participation in ICT standardisation

  • initiatives and actions aimed at improving gender balance in standards development

  • experiences from women actively contributing to international ICT standards

  • opportunities for researchers and professionals to engage in standardisation processes

The discussion will bring together speakers from European institutions, research organisations, and standardisation initiatives, creating an opportunity to exchange perspectives on how diversity can strengthen the quality and impact of ICT standards.

Standardisation and European Research Projects

For research and innovation initiatives such as ELASTIC, engagement with standardisation activities is essential. Standardisation helps translate research outcomes into widely adopted technologies and supports interoperability across digital infrastructures.

Encouraging broader participation in these processes, including greater representation of women, helps ensure that future standards reflect the needs of a diverse digital society.

📅 Date: 20 March 2026
💻 Format: Online webinar

More information about the event is available here:
https://standict.eu/events/webinar-women-ict-standardisation-5th-edition

Register here: 

]]>
ELASTIC Releases RP1 Results Presentation and Research Outputs https://elasticproject.eu/elastic-releases-rp1-results-presentation-and-research-outputs/ Wed, 04 Mar 2026 14:14:08 +0000 https://elasticproject.eu/?p=1899

ELASTIC Releases RP1 Results Presentation and Research Outputs

Following the publication of its mid-term success press release, the ELASTIC project is now sharing a consolidated overview of the work carried out during its first reporting period (M1–M18).

To present these results in a structured way, the consortium has released the ELASTIC RP1 Results Presentation, bringing together the main outcomes achieved during the first phase of the project. The presentation summarises progress across the project’s work packages, covering technological developments, demonstrator preparation, research outputs, and activities related to dissemination, exploitation, and standardisation.

Highlights from the First Reporting Period

Future 6G services will operate across a highly distributed cloud–edge–IoT continuum, spanning constrained IoT devices, industrial edge nodes, private infrastructures, and public clouds. Ensuring secure, portable, trustworthy, and efficient execution across such heterogeneous environments is a major challenge identified by the Smart Networks and Services Joint Undertaking (SNS JU).

The ELASTIC project addresses this challenge by introducing a framework that enables workloads to run seamlessly on-premise, at the edge, or in the cloud, without compromising security, confidentiality, or performance. By combining technologies such as WebAssembly, extended Berkeley Packet Filter (eBPF), and confidential computing, ELASTIC enables lightweight, isolated, and privacy-preserving execution, architecture-agnostic serverless orchestration, and secure IoT and edge services aligned with European 6G priorities.

During its first reporting period, the project consolidated its reference architecture, mapped 25 interoperable components to demonstrator requirements, and delivered initial implementations and prototypes supporting secure and efficient orchestration across distributed infrastructures.

Key achievements of the first phase include:

  • Development of the ELASTIC architecture and technology framework supporting orchestration across the cloud–edge continuum.
  • Progress in lightweight workload execution and serverless orchestration technologies based on WebAssembly.
  • Advances in confidential computing approaches, integrating Trusted Execution Environments (TEEs) and remote attestation mechanisms.
  • Implementation of monitoring and observability mechanisms using eBPF, enabling efficient security analysis and system monitoring.
  • Preparation of the ELASTIC demonstrators for validating technologies in real-world environments.
  • Contributions to scientific publications, open-source ecosystems, and standardisation initiatives.

Key ELASTIC Technologies Developed in RP1

During its first reporting period, ELASTIC delivered several core technologies forming the foundation of its secure orchestration framework across the cloud–edge–IoT continuum. These components demonstrate how lightweight execution environments, confidential computing, and advanced observability mechanisms can be combined to support trustworthy and efficient service deployment.

Among the technologies developed within the project are:

  • Propeller Orchestrator – A unified orchestration framework for managing and deploying WebAssembly workloads across heterogeneous infrastructures, from cloud environments to edge and IoT devices.
  • Wasm-operator – A framework enabling Kubernetes operators to run as event-driven serverless functions using WebAssembly, improving portability and resource efficiency.
  • WasmHAL-Trust – A hardware abstraction layer enabling WebAssembly workloads to run securely within Trusted Execution Environments, supporting confidential computing across different platforms.
  • Reliable Enclave Migration Protocols – Mechanisms enabling secure migration of workloads between trusted environments while ensuring continuity, accountability, and trust.
  • NETTO and eBPF-based Observability Frameworks – Technologies enabling real-time monitoring and analysis of distributed workloads with minimal performance overhead.
  • AI-based Intrusion Detection System (AI-IDS) – A hardware-accelerated intrusion detection framework integrating artificial intelligence techniques with eBPF-based monitoring to detect threats in distributed infrastructures.

These technologies contribute to the ELASTIC vision of enabling secure, portable, and efficient service execution across distributed infrastructures supporting future 6G systems.

Demonstrators and Validation Scenarios

To validate its technologies in realistic environments, ELASTIC is developing two demonstrators based on concrete operational scenarios.

Smart Connected Factory of the Future

The first demonstrator focuses on a secure IoT data fabric for industrial environments, showcasing how ELASTIC technologies can support orchestration across distributed factory infrastructures.

Three complementary scenarios are explored:

  • Predictive Maintenance, where sensor data is processed at the edge to detect anomalies in real time while protecting machine data and intellectual property.
  • Cross-Factory Data Sharing, enabling collaboration between manufacturing sites through federated learning while preserving data sovereignty.
  • Real-Time Robot Control, where control logic is executed close to robots to guarantee the ultra-low latency required for safety-critical automation.

Across these scenarios, workloads are dynamically orchestrated across the edge-cloud continuum, sensitive data is protected within Trusted Execution Environments, and execution integrity is verified through remote attestation mechanisms.

Privacy-Preserving Cloud Migration

The second demonstrator validates the secure migration of sensitive enterprise services to cloud environments. The demonstrator focuses on the Badge Request Tool (BRT), which manages personal and security-critical identity data.

Within this scenario, the service runs inside Trusted Execution Environments to protect data during processing, while remote attestation verifies the trustworthiness of the cloud infrastructure.

ELASTIC RP1 Results Presentation

The ELASTIC First Reporting Period Results Presentation provides a consolidated overview of the work carried out during the first phase of the project.

The presentation includes:

  • The ELASTIC vision and reference architecture
  • Progress across the technical work packages
  • Development of core technologies and prototypes
  • Preparation of industrial demonstrators
  • Scientific publications and open-source contributions
  • Activities related to dissemination, exploitation, and standardisation

Explore ELASTIC RP1 Outputs

In addition to the results presentation, several outputs from the first phase of the project are available for the community:

  • Scientific publications presenting research results on WebAssembly security, eBPF technologies, confidential computing, and distributed orchestration.
  • Public deliverables describing the project architecture, technology design, and research findings.
  • Demonstration videos showcasing selected ELASTIC technologies and experimental results.
  • Open-source releases enabling researchers and developers to explore and build upon the technologies developed within the project.

These resources provide deeper insight into the work carried out by the ELASTIC consortium and reflect the project’s commitment to openness, collaboration, and knowledge sharing.

Looking Ahead

During its first reporting period, ELASTIC defined a consolidated architecture, identified 26 core components, and delivered initial implementations of 14 prototypes supporting secure orchestration across distributed infrastructures.

The project also established strong links with open-source ecosystems and international standardisation initiatives, including activities related to W3C/WASI and ETSI.

As the project progresses, ELASTIC will continue integrating its technologies into the demonstrators and expanding its contributions to research, open-source communities, and standardisation efforts, helping enable secure, efficient, and trustworthy 6G cloud–edge services.

]]>
ELASTIC Consortium Meeting in Lund: Advancing Integration and Demonstrator Development https://elasticproject.eu/elastic-consortium-meeting-in-lund-advancing-integration-and-demonstrator-development/ Wed, 25 Feb 2026 09:05:50 +0000 https://elasticproject.eu/?p=1889

ELASTIC Consortium Meeting in Lund: Advancing Integration and Demonstrator Development

Integration milestones, demonstrator alignment, and confidential computing developments mark an important step forward for the ELASTIC 6G research project.

The ELASTIC consortium gathered in Lund, Sweden, on 20–21 January 2026 for a two-day plenary and technical meeting hosted by Lund University. Bringing together partners from academia, research organisations, and industry, the meeting provided an opportunity to review the project’s latest developments and strengthen collaboration as ELASTIC enters a critical phase of technology integration.

With several core components reaching maturity, the focus of the consortium is now shifting from individual developments toward system-level integration and demonstrator validation. These efforts aim to ensure that the technologies developed across the project can operate together as a coherent framework enabling secure, portable, and efficient orchestration across the cloud–edge–IoT continuum, a key requirement for future 6G infrastructures.

Key Outcomes of the Lund Meeting

The meeting allowed partners to align their technical work and prepare the next steps of the project, with several important outcomes:

  • Alignment of technical components developed across ELASTIC work packages
  • Progress in integrating orchestration, security, and monitoring mechanisms
  • Consolidation of demonstrator integration workflows
  • Advancements in confidential computing and remote attestation technologies
  • Coordination of the roadmap towards upcoming milestones and validations

Progress Across ELASTIC Technical Work Packages

WP1 – Efficient, Portable and Secure Executable Isolation
WP1 partners presented progress on secure execution environments based on WebAssembly and related runtime technologies. The work focuses on enabling portable workloads that can run across heterogeneous infrastructures while maintaining strong isolation and security guarantees. Recent developments strengthen runtime extensibility and cross-platform execution, allowing ELASTIC workloads to operate consistently across IoT devices, edge systems, and cloud environments.

WP2 – Serverless Orchestration and Distributed Execution
WP2 discussions focused on the orchestration layer responsible for managing distributed services across the cloud–edge continuum. Partners presented progress on serverless orchestration frameworks, distributed supervision mechanisms, and networking technologies that support low-latency communication between services. These capabilities enable dynamic service deployment and efficient lifecycle management of workloads across heterogeneous infrastructures.

WP3 – Confidential Computing and Trusted Execution
Within WP3, partners reviewed developments related to Trusted Execution Environments (TEEs), remote attestation, and secure workload lifecycle management. These technologies enable privacy-preserving service execution, ensuring that sensitive data can be processed securely even in partially trusted infrastructures. The work contributes to building a strong trust layer within the ELASTIC architecture.

WP4 – Secure and Efficient Edge Workload Orchestration
The WP4 session highlighted progress in enabling secure and resource-efficient computation at the edge. Partners discussed technologies supporting machine learning at the edge, hardware-assisted security mechanisms, and lightweight protection techniques for IoT and industrial environments. These capabilities ensure that ELASTIC technologies can operate effectively in resource-constrained edge infrastructures while maintaining high performance and strong security guarantees.

WP6 – Dissemination, Standardisation and Exploitation
The consortium also reviewed dissemination activities and ecosystem engagement efforts aimed at maximising the impact of ELASTIC results. Partners continue to contribute to scientific publications, open-source communities, and relevant standardisation initiatives related to WebAssembly, edge computing, and secure service orchestration. These activities strengthen ELASTIC’s position within the broader European 6G research ecosystem.

Integration Focus: From Components to End-to-End Systems

A central focus of the Lund meeting was advancing the integration of ELASTIC technologies into complete validation environments. Dedicated workshops examined how orchestration mechanisms, runtime environments, security technologies, and monitoring tools can be combined into coherent systems capable of supporting distributed applications.

Rather than revisiting application scenarios, partners concentrated on practical integration aspects such as component interoperability, deployment workflows, and validation infrastructures. These discussions helped clarify the technical roadmap for the coming months and strengthened coordination across the consortium.

By aligning these elements, the project is moving closer to demonstrating how ELASTIC technologies can support secure and efficient service execution across distributed cloud–edge infrastructures.

Preparing the Next Phase of ELASTIC

As the project advances, the consortium will continue focusing on system integration, demonstrator validation, and ecosystem engagement. Upcoming work will concentrate on validating the ELASTIC framework in realistic environments while further strengthening collaborations with research communities, industry stakeholders, and standardisation initiatives.

The meeting also provided an opportunity for the consortium to review the feedback received during the project review, discussing the recommendations and aligning the next technical and coordination steps accordingly. These discussions helped ensure that the project continues to progress in line with its objectives while strengthening the integration and validation activities planned for the coming months.

The meeting helped align the consortium on the next phase of the project, with a clear focus on integrating the project’s technologies and preparing the demonstrators for upcoming validation activities.

As always, the technical sessions were complemented by a consortium social dinner, offering partners the opportunity to connect beyond formal discussions. These informal moments remain an important part of ELASTIC’s collaboration culture, strengthening trust and teamwork across organisations and countries.

]]>
[ELASTIC Demo Series] Demonstrator #2 MVP – Migration of a Sensitive IT Service to the Public Cloud https://elasticproject.eu/elastic-demo-series-demonstrator-2-mvp-migration-of-a-sensitive-it-service-to-the-public-cloud/ Sun, 18 Jan 2026 16:42:44 +0000 https://elasticproject.eu/?p=1860

[ELASTIC Demo Series] Demonstrator #2 MVP – Migration of a Sensitive IT Service to the Public Cloud

This new episode of the ELASTIC Demo Series presents the first milestone of ELASTIC’s work on privacy preserving cloud migration for sensitive IT services. The demo focuses on how regulated or high sensitivity workloads can be moved towards cloud infrastructures without compromising security, compliance requirements, or operational continuity.

In this MVP of Demonstrator 2, the project uses the Badge Request Tool (BRT) as a concrete example of a security critical service. The video shows how the service can be deployed in a Trusted Execution Environment (TEE), supporting confidentiality for data and processing even when running on shared or public cloud infrastructure. This provides a practical foundation for organisations that want to modernise legacy services while maintaining strong security controls.

Key messages and latest results

The carousel below summarises the main challenges, the approach implemented in the MVP, and the results achieved so far. The text in this article provides additional context and explains what the demonstrator enables in practice, without repeating the slide content.

What this demo aims to address

Many organisations would benefit from cloud migration, but sensitive services often remain on premises due to security and compliance concerns. In real deployments, this is not only a technical issue. It is also about trust. Operators need a reliable way to verify where code will run, which protections are active, and whether the execution environment can be considered trustworthy before a service is started.

At the same time, migration projects must preserve operational continuity. Services cannot be moved to the cloud if the result is increased risk, reduced oversight, or unclear responsibility boundaries. Demonstrator 2 addresses these constraints by combining confidential computing with trusted orchestration concepts, aiming for a migration path that is verifiable, controlled, and practical to operate.

What the video shows

The demo introduces the MVP capabilities through the Badge Request Tool use case. It shows how a sensitive service can be deployed so that execution happens inside a TEE, helping protect both the workload and the data it processes. The walkthrough also highlights how ELASTIC supports verified trust checks before execution and how monitoring can be integrated as part of the operational view of the service.

The demo presents the foundation for continuous security monitoring through integrated AI driven threat detection. This is shown as part of the overall direction of the demonstrator, supporting visibility and response capabilities that are important for sensitive workloads.

Finally, the video positions the MVP as a first step towards flexible and portable deployment across evolving environments. This includes scenarios where infrastructures change over time, or where services need to be moved between different operational contexts while maintaining consistent security guarantees.

Key characteristics highlighted in the demo

Confidential execution for sensitive services

A central element in the MVP is the ability to run a workload in a Trusted Execution Environment. This supports confidentiality for data and processing, even when the underlying infrastructure is shared. For many organisations, this is an important prerequisite for moving sensitive services towards cloud platforms while keeping security and sovereignty requirements in place.

Verified trust before execution

The demo highlights the need to verify trust before a service is executed. Rather than assuming the infrastructure is trustworthy, the goal is to check key conditions before deployment or execution proceeds. This supports a more controlled operational model for regulated environments, where auditability and assurance are essential.

Monitoring as part of operational continuity

The MVP also lays the groundwork for continuous security monitoring. The demo references integrated AI driven threat detection as a way to support detection and response while services are running. This aligns with a practical view of security, where deployment is not the end of the process, but part of a lifecycle that also includes monitoring, validation, and operational oversight.

Portable deployment across changing environments

The demo points toward flexible service deployment across evolving IT and OT environments. This matters because migration is rarely a one time move. Organisations often need to adapt deployments as infrastructure, policies, or operational constraints change. Building portability into the model helps support longer term adoption and reduces future migration effort.

Why it matters for ELASTIC

ELASTIC focuses on technologies that enable distributed service execution with strong security and trust properties, while remaining practical to deploy and operate. Demonstrator 2 contributes to this by addressing a concrete barrier to adoption: the challenge of migrating sensitive services to the cloud without losing control over confidentiality, compliance, and operational assurance.

This MVP also highlights the practical business value of the project. It supports confident cloud adoption for regulated use cases, with the aim of reducing infrastructure costs and accelerating cloud strategies while maintaining security and sovereignty requirements.

What comes next

This demo presents an early showcase of Demonstrator 2. The final version will extend these capabilities toward a full end to end migration flow. Building on the MVP, future work will focus on completing the end to end process and strengthening the supporting mechanisms needed for real world deployment, including broader integration and operational refinement.

]]>
PRESS RELEASE: ELASTIC Mid-Term Success https://elasticproject.eu/press-release-elastic-mid-term-success/ Wed, 10 Dec 2025 10:10:54 +0000 https://elasticproject.eu/?p=1849

PRESS RELEASE: ELASTIC Mid-Term Success

Advancing secure, efficient, and portable orchestration of 6G edge–cloud services through WebAssembly, eBPF, and Confidential Computing.

The Horizon Europe project ELASTIC – Efficient, portabLe And Secure orchesTration for reliable servICes, funded by the Smart Networks and Services Joint Undertaking (SNS JU), has successfully completed its mid-term reporting period. The European Commission confirmed that ELASTIC delivered strong scientific, technical, and industrial progress, proving the feasibility of secure, portable, and confidential workload execution across edge, cloud, and 6G infrastructure.

At the midpoint of the project, ELASTIC has already demonstrated that future services can be executed anywhere — on-premise, at the edge, or in the cloud — without losing control over security, confidentiality, or performance.

Mid-Term Achievements at a Glance

During RP1, ELASTIC built the scientific, technological, and ecosystem foundations required to demonstrate secure edge–cloud orchestration at scale.

Technical and architectural progress

The consortium delivered a reference architecture, aligning all technical work packages. ELASTIC defined 26 software components, implemented first working versions of 14 prototypes, and derived 40+ functional and non-functional requirements directly from demonstrator needs. The project contributed to 7 major open-source ecosystems (LLVM, WASI, kube-rs, etc.), reinforcing technology transfer and adoption beyond the project.

Demonstrators and validation setup

Two demonstrators — Smart Connected Factory of the Future (D1) and Migration of a Sensitive IT Service from On-Premise to Public Cloud (D2) — were fully defined.

Three test environments were prepared across partner sites, and two MVPs were delivered to guide integration. More than 40 validation KPIs were defined to guarantee measurable impact.

Strategic and ecosystem engagement

ELASTIC established the External Expert Advisory Board (EEAB) and held its first meeting, providing validation and steering from leading European experts. The project engaged in collaboration with four clustering projects (CONFIDENTIAL6G, HARPOCRATES, RIGOUROUS, PREDICT-6G) and connected with five global innovation ecosystems, including the Confidential Computing Consortium (CCC), CNCF, eBPF Foundation, OSF, and OECG. These engagements strengthen alignment with SNS JU priorities: trust, efficiency, and interoperability.

ELASTIC also contributes to SNS JU and 6G-IA strategic work, with participation in 2 programme boards (Steering and Technical), 1 Communication Task Force, and 9 SNS working groups covering security, architecture, hardware technologies, TMV, pre-standardisation, and software networking.

Dissemination, communication, and scientific visibility

The ELASTIC website attracted 2K+ unique visitors and 4.3K total visits, supported by active social media (590 followers) and the publication of 8 public deliverables, newsletters, videos, and press releases.

The consortium published 16 scientific papers, participated in 30+ events, organised a webinar with 125 participants, and distributed 1,700+ communication materials.

Exploitation and standardisation impact

ELASTIC completed the first phased exploitation plan, analysed exploitation potential for 26 components, and prioritised 5 Key Exploitable Results (KERs) for industrial uptake. The project contributes to standardisation through W3C/WASI, ETSI, 3GPP, ENISA, FIRST.org, and is already collaborating with 34+ external organisations, with 15 expressing interest in testing ELASTIC outputs.

Work Package Achievements

WP1 — Efficient, Portable and Secure Executable Isolation

During RP1, WP1 established the technical foundation of ELASTIC by analysing the state of the art in WebAssembly and eBPF sandboxing and using the findings to define the project’s component architecture (submitted as Deliverable D1.1). Building on this analysis, WP1 introduced new techniques to strengthen WebAssembly sandbox security, improving memory safety and enabling secure and portable execution both in traditional environments and in distributed deployments. WP1 also contributed to early confidential computing validation, demonstrating that WebAssembly workloads can be combined with secure enclave technologies such as Intel TDX and AMD SEV-SNP, ensuring portability and orchestration security across heterogeneous infrastructures.

In parallel, WP1 delivered tangible technical advances through innovative tooling and hardware acceleration. The team developed Pretty Verifier, a new eBPF static analysis tool that improves usability and vulnerability detection, and introduced an FPGA-accelerated intrusion detection system (IDS), already showing more than 25% performance improvement compared to software-based IDS. WP1 also contributed to open-source through early releases of WASI interfaces, the wasm-operator interface, and the ELASTIC HAL. Initial work explored portable packaging for WebAssembly components and feasibility of component models for eBPF—supporting future attestation, deployment, and integration into ELASTIC demonstrators.

In RP2, WP1 will focus on performing extensive analyses and memory-safety research. WP1 will expand the wacky static analysis tool to support the broader WASI component model, implement WASI-SPI hardware abstraction, and integrate enclave migration protocols into other ELASTIC components. Work will continue on modular Wasm/eBPF applications, including contributions to a joint WP6 whitepaper on standardisation gaps and recommendations.



WP2 — Portable orchestration through WebAssembly-based FaaS

During RP1, WP2 delivered the core serverless FaaS orchestration results captured in D2.1 and D2.2. The team released the Propeller orchestrator (open-source) and a wasm-operator PoC enabling event-driven, low-footprint orchestration from cloud to RTOS and microcontroller nodes, and published CoCoS, an open-source confidential AI framework that runs ML inside TEEs. WP2 also produced Cyber-Physical WASI interfaces (i2c, usb, gpio prototypes), performed a large-scale security analysis of 2,758 serverless components (ESORICS 2025), demonstrated eBPF/XDP-accelerated communication (up to 2× throughput and large latency reductions), implemented eBPF state synchronization prototypes, and delivered initial observability tooling for Wasm FaaS.

In RP2, WP2 will harden and integrate these components for demonstrator validation: Propeller will be extended and integrated with Kubernetes and Zephyr RTOS, the wasm-operator will be productionised, and eBPF/XDP and RDMA-based communication acceleration and state-sync will be matured and benchmarked. Work will also focus on improving non-intrusive observability for serverless Wasm, finalising lightweight ABAC/capability-based access control for secure orchestration, advancing Cyber-Physical WASI specs (including SPI) and preparing scientific publications on confidential Wasm workload fingerprinting.



WP3 — Confidential Computing and secure execution inside TEEs

WP3 achieved a milestone rarely reached in European R&I projects: executing WebAssembly workloads inside Trusted Execution Environments (TEEs). Through Deliverable D3.1, the team developed the TEE Hardware Abstraction Layer (HAL) and a minimal Linux HAL for confidential containers, enabling Wasm workloads to run unmodified on different confidential computing platforms. Initial support for remote attestation across multiple platforms was achieved, and a Proof of Concept showcased collective attestation for distributed workloads — an essential step toward secure orchestration across federated cloud and edge environments.

In RP2, WP3 will focus on optimisation and industrialisation. Partners will reduce TEE execution overheads, complete the multi-tenant orchestration agent, and finalise support for confidential container lifecycle management aligned with OCI standards. The team will also complete attestation integration into Wasm runtimes, enabling “zero-trust by default” deployment of workloads in Demonstrators.


WP4 — Secure AI, data protection, and edge learning

WP4 advanced secure edge intelligence by developing AutoML-based defences against poisoning attacks on mobility datasets and validating them on real-world and simulated data. The team deployed Wasm runtimes on constrained edge devices and prepared the confidential computing infrastructure, demonstrating fast bootstrap and portability. Initial architecture was defined for secure data-at-rest using TEEs and embedded secure elements, contributing to KPIs on orchestration security, portability, and data protection (Deliverable D4.1).

During RP2, WP4 will integrate Federated / Split Learning with Trusted Execution Environments to enable secure distributed training across IoT and cloud. The work will incorporate remote attestation and secure element–based key storage, and extend testing to Wasm + hardware acceleration (GPU/FPGA). WP4 will complete secure data-at-rest protection using PKCS#11 and finalise integration of eBPF + AI-IDS into edge nodes for industrial demonstrators.


WP5 — Demonstrators and MVP integration (where the research becomes real)

WP5 is where all ELASTIC technologies meet reality — transforming research into Minimum Viable Products (MVPs) deployed in real industrial environments.

During RP1, WP5 defined the technical and business requirements of both demonstrators, mapped ELASTIC components to use case needs, and developed the validation and KPI framework. Infrastructure was provisioned across both pilot sites, and integration touchpoints with WP1–WP4 technologies were finalised. (Deliverable 5.1)

The project is validating its innovations through two demonstrators:

  • Demonstrator 1 — Smart Connected Factory of the Future (Industry 4.0 / ERF lead): D1 deploys an IoT Data Fabric across edge–fog–cloud to support predictive maintenance, real-time robot control and cross-factory data sharing. Using WebAssembly, TEEs, and eBPF/XDP, workloads run securely and with low latency on heterogeneous industrial devices.
  • Demonstrator 2 — Privacy-preserving Cloud Migration (Enterprise IT / THD lead): D2 validates that sensitive IT services can be migrated to the public cloud without losing control, confidentiality, or data sovereignty. Using WebAssembly, TEEs, and Remote Attestation, ELASTIC ensures that workloads run securely inside Confidential Computing environments and that trust is verified before execution.

By the end of RP1, both demonstrators had already integrated first MVP components, proving interoperability of ELASTIC technologies and confirming the feasibility of the full integration planned for RP2.

In other words: ELASTIC is not just research — it already runs on real industrial infrastructure.


WP6 — Dissemination, standardisation, and exploitation

In RP1, WP6 implemented the dissemination and communications strategy, resulting in strong visibility across online channels, the ELASTIC website, newsletters, and webinars. WP6 produced 16 scientific publications, multiple public deliverables, and contributed to open-source and standardisation bodies (ETSI, W3C/WASI, 3GPP, IETF/IRTF, ENISA, OASIS, CCC, CNCF, eBPF Foundation, etc.). Through Deliverable D6.2, WP6 defined the first standardisation and exploitation roadmap and identified the Key Exploitable Results (KERs), enabling structured innovation management during RP2.

In RP2, WP6 will intensify contributions to standardisation and mature the exploitation strategy into partner-specific business plans. Focus will be on strengthening the innovation ecosystem, increasing adoption opportunities, and preparing sustainability actions beyond the project.


WP7 — Coordination, delivery, risks, and quality

WP7 ensured efficient management of the project, guaranteeing delivery of all RP1 deliverables with high quality and full compliance to SNS JU requirements. It oversaw planning, KPI tracking, risk mitigation, and ensured ethical and legal compliance across partners, including security and data-protection aspects.

In RP2, WP7 will continue to guide cross-WP integration, monitor the delivery of demonstrator milestones, and coordinate the exploitation and standardisation strategy to ensure ELASTIC achieves maximum impact at project closure.

A project with momentum

With breakthroughs in secure sandboxing, orchestration, confidential computing and applied AI security, and with demonstrators already running early MVPs, ELASTIC enters RP2 with strong momentum.

“The vision is clear: portable, confidential execution as the default model for future networks. ELASTIC is proving that Europe can lead this transformation.”Prof. Sotiris Ioannidis, Technical University of Crete (TUC), ELASTIC Project Coordinator

ELASTIC has made a significant breakthrough in lightweight and secure workload orchestration technologies within the edge cloud continuum. This positive momentum confirms the project’s potential to drive innovation in 6G security technologies, and the team is motivated to build on these results to drive the European research community towards a secure digital cognitive continuum”  — Dr. Dhouha Ayed, Thales SIX (THS), ELASTIC Scientific & Technical Manager

“ELASTIC’s mid-term success proves that top-tier research can become deployable technology in real industrial environments. Our focus now is to accelerate integration into the demonstrators, deliver measurable performance gains, and drive standardisation and exploitation so that ELASTIC technologies are adopted across the 6G ecosystem.”Despina Kopanaki, Technical University of Crete (TUC), ELASTIC Project Manager

Funding acknowledgement

The ELASTIC project has received funding from the Smart Networks and Services Joint Undertaking (SNS JU) under the European Union’s Horizon Europe research and innovation programme under Grant Agreement No. 101139067.

]]>
[ELASTIC Demo Series] Propeller – Lightweight Orchestration Beyond Kubernetes https://elasticproject.eu/elastic-demo-series-propeller-lightweight-orchestration-beyond-kubernetes/ Thu, 20 Nov 2025 08:35:56 +0000 https://elasticproject.eu/?p=1828

[ELASTIC Demo Series] Propeller – Lightweight Orchestration Beyond Kubernetes

This episode of the ELASTIC Demo Series presents Propeller, a WebAssembly-based orchestrator that supports running application logic from cloud systems down to small edge and IoT devices. The demo walks through how Propeller deploys WebAssembly modules, manages events and executes workloads in a lightweight and consistent way across different environments.

Propeller is built on top of SuperMQ, a message distribution layer that enables devices, services and applications to communicate through a publish–subscribe model. This foundation allows Propeller to distribute Wasm workloads reliably across systems with very different resource capacities. The project has been partly supported by the ELASTIC initiative.

What Propeller aims to solve

Deploying application logic on distributed systems often requires separate tools for cloud, edge and embedded devices. These environments vary in compute power, memory limits and operating systems. Traditional container-based orchestration works well in a data-centre but becomes heavy on constrained devices.
Propeller takes a different approach. It uses WebAssembly modules as deployable units. These modules are small, predictable and portable, and can run on servers, gateways, micro-nodes and even microcontrollers when supported.

What the demo shows

The demo explains how a user prepares an application as a Wasm module, registers it in Propeller and deploys it through the system. It also shows how Propeller:

  • uses SuperMQ channels to deliver messages and trigger logic

  • loads Wasm modules when needed and applies defined rules

  • evaluates conditions and executes functions on demand

  • keeps the runtime small and predictable on devices

  • distributes logic without the need for containers or large runtimes

The video highlights how rules and workflows are expressed, how they react to events and how state can be passed between components. This provides a practical view of how Propeller behaves in real conditions.

Core characteristics of Propeller

WebAssembly execution model

Propeller runs user-defined functions packaged as Wasm modules. These modules remain portable across different CPU architectures and operating systems, as long as a compatible Wasm runtime is available.

Event-based orchestration

Logic is not executed continuously. Instead, Propeller reacts to messages published through SuperMQ or other triggers. This helps avoid unnecessary resource use and suits distributed systems where activity is irregular.

Cloud-to-edge consistency

The same Wasm module can be deployed on a server, an edge gateway or a smaller device, creating a uniform execution model. Developers do not need to create separate builds or manage different deployment paths.

Lightweight footprint

Because WebAssembly modules are small and runtimes are compact compared to container stacks, Propeller is suitable for constrained hardware. This supports use-cases where memory, CPU or power must be conserved.

Rules engine

Propeller includes a rules engine that allows developers to define how messages, conditions and modules relate. This provides a clean way to build flows and decision logic without writing custom orchestration code.

Why it matters for ELASTIC

ELASTIC is focused on technologies that support distributed, efficient, multi-tier execution across future 6G-ready infrastructures. Propeller fits into this vision by showing how application logic can run closer to devices, reduce overhead and maintain consistency without depending on heavy container runtimes.

The demo illustrates how such tools can help future systems offload tasks to nearby nodes, respond faster to events and reduce cloud back-and-forth communication.

How to try Propeller

Users interested in experimenting with Propeller can:

  • review the open-source code on GitHub (https://github.com/absmach/propeller)

  • build a sample WebAssembly module using the supported toolchain

  • publish messages through SuperMQ and observe how Propeller reacts

  • deploy modules on different hardware to compare behaviour

  • explore the rules engine to define conditions and reactions

This helps demonstrate how Propeller behaves in both cloud and edge environments and how Wasm workloads can be coordinated without traditional container pipelines.

Future work

The Propeller team is continuing to expand runtime support, improve documentation, and broaden compatibility with more Wasm environments, including runtimes suited for microcontrollers and very small devices.
Additional work is also planned around monitoring, rule validation and deployment tooling to make the orchestrator easier to integrate into existing platforms.

]]>
Demonstrator 1: Smart Connected Factory of the future https://elasticproject.eu/demonstrator-1-smart-connected-factory-of-the-future/ Thu, 06 Nov 2025 12:01:45 +0000 https://elasticproject.eu/?p=1800

Demonstrator 1: Smart Connected Factory of the future

 

Demonstrator 1 showcases how the ELASTIC project deploys a secure and scalable IoT Data Fabric in an industrial manufacturing environment. It connects edge, fog, and cloud layers into a unified system that supports predictive maintenance, real-time robotic control, and cross-site data sharing. The goal is to validate latency performance, data trustworthiness, orchestration efficiency, and scalability under real-world conditions.

Why an IoT Data Fabric for Manufacturing

Manufacturing sites generate large volumes of diverse machine and sensor data. Solely cloud-based systems can cause latency and bandwidth issues, while fully decentralized solutions can lead to operational silos. The IoT Data Fabric offers a balanced architecture:

  • It processes time-critical data at the edge.

  • It enables aggregated insights and model updates in the cloud.

  • It supports secure collaboration without compromising data ownership or privacy.

This approach reduces downtime, improves decision-making, and enhances factory-wide visibility.

Core Components

Demonstrator 1 integrates several key technologies to establish a flexible and trustworthy compute layer:

  • WebAssembly (Wasm): Provides portable, sandboxed modules for real-time industrial analytics.

  • Trusted Execution Environments (TEEs): Protect sensitive data and code during execution on untrusted devices.

  • Federated Learning: Trains models locally and shares updates without moving raw data.

  • eBPF and XDP: Improve networking efficiency and reduce latency for control and monitoring.

  • Function-as-a-Service (FaaS): Orchestrates resource-efficient workload scaling and dynamic deployment across layers.

These technologies work together to create a secure, adaptable compute fabric for industrial use.

Security and Trust Mechanisms

Industrial environments demand robust security. In Demonstrator 1, this is achieved through:

  • A zero-trust architecture across edge and cloud components.

  • Remote attestation to verify device integrity before execution.

  • Fine-grained access control policies that govern data movement and user permissions.

  • Secure enclaves (TEEs) to isolate critical operations, reducing the attack surface.

These measures protect both the data and logic that drive industrial processes.

Orchestration Across Edge, Fog, and Cloud

Manufacturing environments are dynamic. Resource availability, latency requirements, and workloads can change quickly. The orchestration framework in Demonstrator 1 manages this by:

  • Placing tasks where they can meet latency and reliability requirements.

  • Scaling services in response to processing load.

  • Shifting non-urgent workloads to energy-efficient tiers during off-peak times.

  • Continuously monitoring performance to adapt workload placement and maintain service-level objectives.

This ensures smooth operations and resilience as conditions evolve.

Validation Scenarios

Predictive Maintenance

Machine data streams are processed at the edge for near-real-time anomaly detection. Wasm modules perform the analysis, and TEEs provide secure execution to protect proprietary data and models.

Cross-Factory Knowledge Exchange

Each factory site trains machine learning models locally and shares parameters via federated learning. This enables model improvement without exposing raw industrial data, aligning with data protection and compliance needs.

Real-Time Robot Control

Robotic control systems require low-latency feedback loops. By running control logic close to factory robots and optimizing network behavior with eBPF, the system achieves consistent response times. TEEs secure command integrity and confidentiality.

Expected Outcomes and Metrics

Demonstrator 1 aims to measure:

  • Improved responsiveness in control systems.

  • Lower bandwidth consumption between factory and cloud.

  • Greater energy efficiency through smart workload distribution.

  • Proven scalability across multiple industrial locations.

  • Enforced end-to-end trust and data security.

Results will contribute to a 6G-ready reference architecture tailored for industrial environments.

Conclusion

Demonstrator 1 illustrates how a unified IoT Data Fabric can deliver secure, real-time, and scalable performance in industrial settings. Combining WebAssembly, TEEs, federated learning, and modern orchestration enables flexible and secure deployment of applications across edge and cloud infrastructure.

]]>
[ELASTIC Demo Series] Wasm-operator – Efficient Kubernetes Orchestration with WebAssembly https://elasticproject.eu/elastic-demo-series-wasm-operator-efficient-kubernetes-orchestration-with-webassembly/ Tue, 04 Nov 2025 09:27:42 +0000 https://elasticproject.eu/?p=1774

[ELASTIC Demo Series] Wasm-operator – Efficient Kubernetes Orchestration with WebAssembly

Kubernetes operators have become a fundamental building block for automating lifecycle management of cloud-native applications. They enable users to extend the Kubernetes control plane with custom logic, but the traditional way of building operators as containerized microservices comes with limitations that become especially pronounced in resource-constrained or latency-sensitive environments, such as edge nodes or 6G multi-access edge deployments.

To address these challenges, imec has developed a new approach: the Wasm-operator, a Kubernetes operator platform built using WebAssembly (Wasm) instead of Docker containers. This novel architecture, designed and further developed as part of the ELASTIC Project, brings substantial gains in memory efficiency, security, and scalability, and is now publicly available as an open source prototype.

Why Containers Aren’t Always Good Enough for Operators

Kubernetes operators work by continuously reconciling desired state with actual cluster state. In the container-based model:

  • Every operator is deployed as one or more long-running pods

  • Even when idle, a container consumes RAM, CPU, and storage

  • Scaling the number of operators increases overhead significantly

This model works in large data centers, but in edge setups where many operators may be managing independent workloads, simply deploying everything as persistent containers becomes impractical or inefficient.

This is where WebAssembly offers a compelling alternative.

Why WebAssembly for Operators

WebAssembly (Wasm) is a portable, sandboxed execution format initially designed for the web, but now expanding into cloud, edge, and serverless environments. Compared to containers, Wasm components offer:

  • Smaller runtime footprint: Minimal memory usage, with fast startup times

  • Strong isolation: Secure sandboxing without requiring heavy virtualization

  • Dynamic loading/unloading: Wasm modules can be swapped in and out of memory based on demand

  • Language flexibility: Write operators in Rust, Go, C/C++, and other supported languages

  • Cross-platform portability: Run consistently across CPU architectures and environments

In short, Wasm enables a “sleep until needed” execution model that makes it ideal for Kubernetes operators that respond to events rather than run continuously.

The Wasm-Operator Architecture

The Wasm-operator introduces a fundamentally different approach to operator execution:

✅ Operators as Wasm Components

Each operator is compiled into a Wasm module and loaded into a shared Wasm runtime, instead of running in separate containers.

✅ Event-Based Execution

The runtime wakes up each operator only when a relevant watch or reconciliation event is triggered. No background loops and no constant CPU usage.

✅ Rust + Wasmtime Technology Stack

Operators are developed in Rust and executed using the Wasmtime runtime, balancing high performance, memory safety, and a reduced attack surface.

✅ Swapping Idle Operators to Disk

When operators are idle, they are swapped to disk to recover memory. They can be reloaded instantly when needed, reducing runtime overhead.

✅ Shared Runtime for Multiple Operators

Instead of each operator having its own container, the Wasm-operator allows multiple operators to coexist inside a single runtime environment, drastically reducing resource consumption.

What the Demo Shows

The demo video illustrates:

  • How Wasm-based operators are deployed on a Kubernetes cluster

  • Reactive, just-in-time loading and execution of operators

  • Swapping inactive operators to disk in order to free memory

  • Efficient reconciliation without continuous resource use

This highlights the core insight: operators do not need to stay in memory or consume CPU constantly. They can exist as lightweight Wasm components, activated only when necessary.

Why This Matters for Edge and 6G Systems

The Wasm-operator is well-suited for modern edge-native and 6G scenarios, where:

  • Devices have strict power and memory constraints

  • Nodes may be disconnected or battery-powered

  • Real-time or near-real-time decisions require local automation

  • Large numbers of fine-grained workloads must be orchestrated

By removing the need for persistent containers and enabling instant-on operators, this approach improves:

  • Operator density per device

  • System responsiveness

  • Memory and energy efficiency

  • Manageability and multi-tenancy

Try It Yourself

To install and experiment with the Wasm-operator on your own Kubernetes cluster, follow the official guides from the repository:

• Installation guide: https://github.com/idlab-discover/wasm-operator/blob/main/docs/setup.md
• Usage examples: https://github.com/idlab-discover/wasm-operator/blob/main/docs/usage.md

What’s Next?

Work is ongoing to expand the Wasm-operator’s capabilities, including:

  • Better integration with the Go-based Kubernetes SDK.
  • Support for operators that contact external non-Kubernetes services for things like metrics.

Contributions and feedback are welcome.

]]>
ELASTIC Consortium Meets in Chania for Review Preparation https://elasticproject.eu/elastic-consortium-meets-in-chania-for-review-preparation/ Mon, 20 Oct 2025 10:49:46 +0000 https://elasticproject.eu/?p=1755

ELASTIC Consortium Meets in Chania for Review Preparation

 

The ELASTIC consortium gathered in Chania, Crete, on 22–23 September 2025 for a two-day Review Preparation Meeting, hosted by the Technical University of Crete (TUC). Partners from academia, research, and industry met onsite and online to prepare for the upcoming project review and align on the next steps across technical, scientific, and strategic areas.

The meeting focused on consolidating results from the first reporting period, assessing achievements, and ensuring coherence across the project’s core research lines. The consortium reviewed progress on executable isolation, serverless orchestration, confidential computing, and edge workload orchestration—key technologies that define ELASTIC’s approach to efficient, portable, and secure orchestration for reliable 6G services.

Two major demonstrators were presented:

  • Smart Connected Factory of the future (ERF), enabling dynamic orchestration and privacy-preserving data processing across distributed infrastructures.
  • Migration of a sensitive IT service from on-premise to public cloud– led by Thales DIS (THD), showcasing secure migration of sensitive on-premise services to cloud environments.

Partners also presented a series of component-level demonstrations, including tools for observability, attestation, TEE lifecycle management, orchestration, AI-driven intrusion detection, Wasm and eBPF-based analysis, and secure workload migration. These demos showcased how ELASTIC’s research is advancing toward validated, interoperable, and industry-relevant solutions.

Beyond the technical focus, discussions highlighted dissemination, standardisation, and exploitation activities, which play a central role in ensuring the project’s long-term impact. Partners reviewed communication outcomes, standardisation contributions, open-source collaborations, and exploitation strategies to translate ELASTIC’s innovations into tangible technological and business outcomes within the evolving 6G ecosystem.

The Chania meeting marked an important milestone in aligning the consortium’s technical, strategic, and exploitation objectives—strengthening readiness for the upcoming review and paving the way for the next stage of work toward advancing secure, efficient, and privacy-preserving orchestration across the 6G continuum.

]]>
Static eBPF Code Security Analyser: ELASTIC at IEEE CSR 2025 https://elasticproject.eu/static-ebpf-code-security-analyser-elastic-at-ieee-csr-2025/ Tue, 09 Sep 2025 10:01:08 +0000 https://elasticproject.eu/?p=1719

Static eBPF Code Security Analyser: ELASTIC at IEEE CSR 2025

 

On 6 August 2025, Rosario Rizza from Politecnico di Torino (POLITO) presented the paper Design and implementation of a tool to improve error reporting for eBPF code at the IEEE Cyber Security and Resilience (CSR) Conference in Chania, Greece. This work introduced the Static eBPF Code Security Analyser, developed within the ELASTIC project, which enhances developer experience and security by making eBPF error diagnostics clearer and easier to use.

About the IEEE CSR 2025 Conference

The IEEE CSR Conference is a leading international event focused on security, privacy, trust, and resilience of digital systems. The 2025 edition, hosted in Crete, brought together researchers, practitioners, and policymakers to discuss novel approaches for mitigating advanced cyber threats and improving the resilience of modern infrastructures.

ELASTIC’s presence at this venue ensured that its results reached a global audience of cybersecurity experts, strengthening collaboration opportunities and increasing visibility of its innovations.

The Static eBPF Code Security Analyser

Extended Berkeley Packet Filter (eBPF) technology enables safe execution of sandboxed programs within the Linux kernel, supporting advanced observability and monitoring. However, developers often face challenges when interpreting the verifier’s complex error messages, which slows down development and increases risks of misconfigurations.

The Static eBPF Code Security Analyser directly addresses this issue. It performs static analysis that maps verifier errors back to the corresponding C source lines. This greatly improves readability, shortens debugging cycles, and helps identify vulnerabilities earlier in the development process. By simplifying the developer experience, the tool makes it easier to use eBPF securely and effectively in large-scale deployments.

Why It Matters

The impact of this work extends beyond technical improvements:

  • Increased developer productivity – Simplified diagnostics reduce time spent on debugging.

  • Early vulnerability detection – Static analysis ensures issues are addressed before deployment.

  • Greater system resilience – Stronger eBPF security enhances the reliability of monitoring and observability across distributed systems.

  • Contribution to ELASTIC’s vision – The analyser strengthens ELASTIC’s approach to real-time, elastic, and secure service orchestration in next-generation networks.

This tool is directly linked to the Monitoring & Detection block of ELASTIC’s architecture. By improving the clarity and usability of eBPF diagnostics, it advances the project’s aim of continuous threat detection and observability across cloud, fog, and edge environments.

It also complements other ELASTIC innovations, such as WebAssembly execution, trusted execution environments, and AI-driven intrusion detection. Together, these components support ELASTIC’s overall objectives of building a secure, flexible, and efficient foundation for 6G services.


Looking Ahead

The presentation at IEEE CSR 2025 highlights how ELASTIC’s research translates into practical tools that benefit both the developer community and the security ecosystem. Sharing this work at a global forum fosters collaboration with other initiatives and reinforces ELASTIC’s role in shaping secure and resilient digital infrastructures.

As the project progresses, the Static eBPF Code Security Analyser will continue to serve as a building block for safer development practices, contributing to the robustness of future cloud-edge-fog systems and the 6G landscape.

]]>