Cyber Range training

The Fraunhofer Cyber Range combines complex attack simulations with the latest findings from applied research, expert training and the presentation of innovative security tools. Companies can improve the performance of their security teams with realistic attack simulations.

 

MORE INFO

Errors and vulnerabilities in software cause damage running into billions, can ruin a company's reputation and, in the worst case, endanger the safety of people. That's why the Fraunhofer SIT developed VUSC – the code scanner. VUSC (for VUlnerability SCanner) helps companies and developers to detect vulnerabilities in code within minutes.

 

More about VUSC

App security testing tool

Most apps, be they for internet shopping, gaming or social networking, are aimed at private users. But there are hidden risks for businesses. A new test framework will help to uncover gaps in app security and detect malware.

 

LEARN MORE

Projects

ChatGPT or human author?

ChatGPT or human author?

Whether application letters, school essays or program codes - with the text AI ChatGPT, texts of all kinds can be generated automatically within seconds. Fraunhofer SIT is researching ways to help recognize texts created with ChatGPT. Among other things, our text forensic experts work with a self-developed method for authorship verification, COAV. This is used to calculate the distances between texts using similarities of text modules and typical consecutive letter strings: Is the text closer to GPT or closer to a human?

Projects

Study: IT security for electric cars in China

Study: IT security for electric cars in China

Fraunhofer Singapore and SIT published a survey of Chinese cybersecurity and data protection regulations for the electric and connected car industry: It contains an overview of laws and regulations, including the responsible institutions in China, since 2015. The study also addresses research and development facilities as well as standardization authorities.

Projects

No Patch, no Trust: iOS Data Flow Restriction Bypasses

No Patch, no Trust: iOS Data Flow Restriction Bypasses

The number of ways to bypass iOS data flow restrictions meanwhile has further increased, but Apple still does not fix them. So, the question is: How trustworthy are iOS MDM restrictions if even simple tricks to bypass them are not closed by Apple? Read about new ways to circumvent Apple's iOS MDM Dataflow restrictions and consequences for enterprises on the Appicaptor blog.

Press releases

JAB-Code becomes ISO standard

JAB-Code becomes ISO standard

JAB-Code, the color barcode of the Fraunhofer SIT, is on the way to becoming an international ISO standard. JAB-Code – Just Another Barcode – is to be brought to a full ISO standard by 2022. It uses color as a third dimension and can therefore store more information in the same space. The color code does not have to use database references and links, it simply stores the information itself.

Projects

AI against Money Laundering

AI against Money Laundering

In the new research project MaLeFiz (Machine Learning for the Identification of Conspicuous Financial Transactions), researchers are working on a solution that uses machine learning – an artificial intelligence technique – to improve the search for illegal money flows and make it more precise. In addition, the project partners are developing minimum requirements and control mechanisms for Artificial Intelligence solutions used in the financial industry.

Projects

Mechanism for Internet Security broken

Mechanism for Internet Security broken

ATHENE researchers have found a way to break one of the basic mechanisms used to secure Internet traffic. The mechanism, called RPKI, is actually designed to prevent cybercriminals from diverting traffic on the Internet. The ATHENE scientist team of Prof. Dr. Haya Shulman showed that attackers can completely bypass the security mechanism without the affected network operators being able to detect this.

Job offers

Fraunhofer SIT seeks scientific staff, partly also for management positions

You will be responsible for planning, leading, executing and representing applied R&D projects, jointly with clients and partners from industry, government agencies and academia.