Cyber Range training

The Fraunhofer Cyber Range combines complex attack simulations with the latest findings from applied research, expert training and the presentation of innovative security tools. Companies can improve the performance of their security teams with realistic attack simulations.

 

MORE INFO

Errors and vulnerabilities in software cause damage running into billions, can ruin a company's reputation and, in the worst case, endanger the safety of people. That's why the Fraunhofer SIT developed VUSC – the code scanner. VUSC (for VUlnerability SCanner) helps companies and developers to detect vulnerabilities in code within minutes.

 

More about VUSC

App security testing tool

Most apps, be they for internet shopping, gaming or social networking, are aimed at private users. But there are hidden risks for businesses. A new test framework will help to uncover gaps in app security and detect malware.

 

LEARN MORE

Encryption for everyone

End-to-end encryption ensures that only sender and recipient are able to read messages in plain text. Fraunhofer SIT’s Volksverschlüsselung simplifies the distribution of cryptographic codes in such a way that even a layman is able to manage it easily.

 

MORE INFO

Projects

ChatGPT or human author?

ChatGPT or human author?

Whether application letters, school essays or program codes - with the text AI ChatGPT, texts of all kinds can be generated automatically within seconds. Fraunhofer SIT is researching ways to help recognize texts created with ChatGPT. Among other things, our text forensic experts work with a self-developed method for authorship verification, COAV. This is used to calculate the distances between texts using similarities of text modules and typical consecutive letter strings: Is the text closer to GPT or closer to a human?

Projects

LOEWE professorship for Shulman

LOEWE professorship for Shulman

Our cybersecurity specialist Dr. Haya Shulman has accepted a professorship at the Institute of Computer Science at Goethe University Frankfurt, and thus also has taken up a LOEWE top professorship. The LOEWE research funding program of the state of Hesse is providing around 2.18 million euros over a period of five years to endow the professorship.

Projects

AI against Money Laundering

AI against Money Laundering

In the new research project MaLeFiz (Machine Learning for the Identification of Conspicuous Financial Transactions), researchers are working on a solution that uses machine learning – an artificial intelligence technique – to improve the search for illegal money flows and make it more precise. In addition, the project partners are developing minimum requirements and control mechanisms for AI solutions used in the financial industry.

Press releases

JAB-Code becomes ISO standard

JAB-Code becomes ISO standard

JAB-Code, the color barcode of the Fraunhofer SIT, is on the way to becoming an international ISO standard. JAB-Code – Just Another Barcode – is to be brought to a full ISO standard by 2022. It uses color as a third dimension and can therefore store more information in the same space. The color code does not have to use database references and links, it simply stores the information itself.

Projects

Study: IT security for electric cars in China

Study: IT security for electric cars in China

Fraunhofer Singapore and SIT published a survey of Chinese cybersecurity and data protection regulations for the electric and connected car industry: It contains an overview of laws and regulations, including the responsible institutions in China, since 2015. The study also addresses research and development facilities as well as standardization authorities.

Projects

Mechanism for Internet Security broken

Mechanism for Internet Security broken

ATHENE researchers have found a way to break one of the basic mechanisms used to secure Internet traffic. The mechanism, called RPKI, is actually designed to prevent cybercriminals from diverting traffic on the Internet. The ATHENE scientist team of Prof. Dr. Haya Shulman showed that attackers can completely bypass the security mechanism without the affected network operators being able to detect this.