<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>SOVEREIGN</title><link>https://sovereign-project.de/</link><description>Technologically sovereign security monitoring and cyber defense platform for critical and complex infrastructures</description><language>en</language><lastBuildDate>Tue, 05 May 2026 22:01:08 UTC</lastBuildDate><atom:link href="https://sovereign-project.de/" rel="self" type="application/rss+xml"/><item><title>SOVEREIGN presenting their work at the Milestone Symposium at the Cyberagentur</title><link>https://sovereign-project.de/news/cyberagentur-milestone-2026/</link><guid isPermaLink="true">https://sovereign-project.de/news/cyberagentur-milestone-2026/</guid><pubDate>Tue, 05 May 2026 17:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;From April 27th to 29th, 2026, we had the opportunity to participate in the Milestone Symposium organized by the Cyberagentur (Agency for Innovation in Cybersecurity). The event provided an excellent platform for exchange between German government agencies, the research projects they support, and the wider cybersecurity research community.&lt;/p&gt;
&lt;p&gt;We contributed with multiple presentations as well as poster sessions, and greatly valued the discussions around current solutions and the future direction of cybersecurity research in securing critical infrastructure.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;From April 27th to 29th, 2026, we had the opportunity to participate in the Milestone Symposium organized by the Cyberagentur (Agency for Innovation in Cybersecurity). The event provided an excellent platform for exchange between German government agencies, the research projects they support, and the wider cybersecurity research community.&lt;/p&gt;
&lt;p&gt;We contributed with multiple presentations as well as poster sessions, and greatly valued the discussions around current solutions and the future direction of cybersecurity research in securing critical infrastructure.&lt;/p&gt;
&lt;p&gt;You can find the list of published papers at &lt;a href="https://sovereign-project.de/publications/"&gt;https://sovereign-project.de/publications/&lt;/a&gt;.&lt;/p&gt;</content:encoded></item><item><title>Accepted Paper at SBFT Workshop at ICSE 2026</title><link>https://sovereign-project.de/publications/sbft2026/</link><guid isPermaLink="true">https://sovereign-project.de/publications/sbft2026/</guid><pubDate>Tue, 10 Mar 2026 13:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;Coverage-Guided Multi-Agent Harness Generation for Java Library Fuzzing&amp;rdquo; is accepted and will appear at The 19th International Workshop on Search-Based and Fuzz Testing in Rio de Janerio during ICSE 2026.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Coverage-Guided Multi-Agent Harness Generation for Java Library Fuzzing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Coverage-guided fuzzing has proven effective for software testing, but targeting library code requires specialized fuzz harnesses that translate fuzzer-generated inputs into valid API invocations. Manual harness creation is time-consuming and requires deep understanding of API semantics, initialization sequences, and exception handling contracts. We present a multi-agent architecture that automates fuzz harness generation for Java libraries through specialized LLM-powered agents. Five ReAct agents decompose the workflow into research, synthesis, compilation repair, coverage analysis, and refinement. Rather than preprocessing entire codebases, agents query documentation, source code, and callgraph information on demand through the Model Context Protocol, maintaining focused context while exploring complex dependencies. To enable effective refinement, we introduce method-targeted coverage that tracks coverage only during target method execution to isolate target behavior, and agent-guided termination that examines uncovered source code to distinguish productive refinement opportunities from diminishing returns. We evaluated our approach on seven target methods from six widely-deployed Java libraries totaling 115,000+ Maven dependents. Our generated harnesses achieve a median 26% improvement over OSS-Fuzz baselines and outperform Jazzer AutoFuzz by 5% in package-scope coverage. Generation costs average $3.20 and 10 minutes per harness, making the approach practical for continuous fuzzing workflows. During a 12-hour fuzzing campaign, our generated harnesses discovered 3 bugs in projects that are already integrated into OSS-Fuzz, demonstrating the effectiveness of the generated harnesses.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;Coverage-Guided Multi-Agent Harness Generation for Java Library Fuzzing&amp;rdquo; is accepted and will appear at The 19th International Workshop on Search-Based and Fuzz Testing in Rio de Janerio during ICSE 2026.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Coverage-Guided Multi-Agent Harness Generation for Java Library Fuzzing&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Coverage-guided fuzzing has proven effective for software testing, but targeting library code requires specialized fuzz harnesses that translate fuzzer-generated inputs into valid API invocations. Manual harness creation is time-consuming and requires deep understanding of API semantics, initialization sequences, and exception handling contracts. We present a multi-agent architecture that automates fuzz harness generation for Java libraries through specialized LLM-powered agents. Five ReAct agents decompose the workflow into research, synthesis, compilation repair, coverage analysis, and refinement. Rather than preprocessing entire codebases, agents query documentation, source code, and callgraph information on demand through the Model Context Protocol, maintaining focused context while exploring complex dependencies. To enable effective refinement, we introduce method-targeted coverage that tracks coverage only during target method execution to isolate target behavior, and agent-guided termination that examines uncovered source code to distinguish productive refinement opportunities from diminishing returns. We evaluated our approach on seven target methods from six widely-deployed Java libraries totaling 115,000+ Maven dependents. Our generated harnesses achieve a median 26% improvement over OSS-Fuzz baselines and outperform Jazzer AutoFuzz by 5% in package-scope coverage. Generation costs average $3.20 and 10 minutes per harness, making the approach practical for continuous fuzzing workflows. During a 12-hour fuzzing campaign, our generated harnesses discovered 3 bugs in projects that are already integrated into OSS-Fuzz, demonstrating the effectiveness of the generated harnesses.&lt;/p&gt;</content:encoded></item><item><title>Accepted Paper at DeepTest Workshop at ICSE 2026</title><link>https://sovereign-project.de/publications/deeptest2026/</link><guid isPermaLink="true">https://sovereign-project.de/publications/deeptest2026/</guid><pubDate>Tue, 10 Mar 2026 13:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;Beyond Accuracy: Characterizing Code Comprehension Capabilities in (Large) Language Models&amp;rdquo; is accepted and will appear at the Seventh International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest 2026) during ICSE 2026.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Beyond Accuracy: Characterizing Code Comprehension Capabilities in (Large) Language Models&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large Language Models (LLMs) are increasingly integrated into software engineering workflows, yet current benchmarks provide only coarse performance summaries that obscure the diverse capabilities and limitations of these models. This paper investigates whether LLMs&amp;rsquo; code-comprehension performance aligns with traditional human-centric software metrics or instead reflects distinct, non-human regularities. We introduce a diagnostic framework that reframes code understanding as a binary input-output consistency task, enabling the evaluation of classification and generative models. Using a large-scale dataset, we correlate model performance with traditional, human-centric complexity metrics, such as lexical size, control-flow complexity, and abstract syntax tree structure. Our analyses reveal minimal correlation between human-defined metrics and LLM success (AUROC 0.63), while shadow models achieve substantially higher predictive performance (AUROC 0.86), capturing complex, partially predictable patterns beyond traditional software measures. These findings suggest that LLM comprehension reflects model-specific regularities only partially accessible through either human-designed or learned features, emphasizing the need for benchmark methodologies that move beyond aggregate accuracy and toward instance-level diagnostics, while acknowledging fundamental limits in predicting correct outcomes.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;Beyond Accuracy: Characterizing Code Comprehension Capabilities in (Large) Language Models&amp;rdquo; is accepted and will appear at the Seventh International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest 2026) during ICSE 2026.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Beyond Accuracy: Characterizing Code Comprehension Capabilities in (Large) Language Models&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Large Language Models (LLMs) are increasingly integrated into software engineering workflows, yet current benchmarks provide only coarse performance summaries that obscure the diverse capabilities and limitations of these models. This paper investigates whether LLMs&amp;rsquo; code-comprehension performance aligns with traditional human-centric software metrics or instead reflects distinct, non-human regularities. We introduce a diagnostic framework that reframes code understanding as a binary input-output consistency task, enabling the evaluation of classification and generative models. Using a large-scale dataset, we correlate model performance with traditional, human-centric complexity metrics, such as lexical size, control-flow complexity, and abstract syntax tree structure. Our analyses reveal minimal correlation between human-defined metrics and LLM success (AUROC 0.63), while shadow models achieve substantially higher predictive performance (AUROC 0.86), capturing complex, partially predictable patterns beyond traditional software measures. These findings suggest that LLM comprehension reflects model-specific regularities only partially accessible through either human-designed or learned features, emphasizing the need for benchmark methodologies that move beyond aggregate accuracy and toward instance-level diagnostics, while acknowledging fundamental limits in predicting correct outcomes.&lt;/p&gt;</content:encoded></item><item><title>Accepted Paper at AsiaCCS 2026</title><link>https://sovereign-project.de/publications/asiaccs2026/</link><guid isPermaLink="true">https://sovereign-project.de/publications/asiaccs2026/</guid><pubDate>Wed, 28 Jan 2026 15:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines&amp;rdquo; is accepted and will appear at the 21st ACM ASIA Conference on Computer and Communications Security (AsiaCCS'26).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The cloud has become a popular tool for companies to host and process data. To keep this data safe from cloud providers, multiple Confidential Computing technologies have emerged. Confidential Virtual Machines protect the memory of VMs and thus all data in use. Full Disk Encryption (FDE) and Authenticated Disk Encryption (ADE) solutions are commonly used to store data at rest on a host-provided disk.
However, disk encryption does not provide replay protection, meaning an older disk version or parts of an older disk can be replayed by the host to the Confidential VM. With no countermeasures taken, this is impossible to detect and opens new attack vectors, e.g., allowing to undo critical changes made to configuration files and data.
In this paper, we solve this problem by proposing CoCoRADE, a way to store data on a disk while maintaining confidentiality, integrity and replay protection of data. In addition, we highlight how freshness is maintained across reboots. Our proof of concept demonstrates how this is easily added to existing Confidential VM offerings in the cloud without needing any additional support from the cloud provider or specialized hardware. The evaluation results show that CoCoRADE provides more security while performing comparably to, if not better than, existing ADE solutions with acceptable overheads in memory usage and remount time.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;We are happy to announce that our paper &amp;ldquo;CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines&amp;rdquo; is accepted and will appear at the 21st ACM ASIA Conference on Computer and Communications Security (AsiaCCS'26).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: CoCoRADE: Introducing Replay Protection for Data-at-Rest of Confidential Virtual Machines&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The cloud has become a popular tool for companies to host and process data. To keep this data safe from cloud providers, multiple Confidential Computing technologies have emerged. Confidential Virtual Machines protect the memory of VMs and thus all data in use. Full Disk Encryption (FDE) and Authenticated Disk Encryption (ADE) solutions are commonly used to store data at rest on a host-provided disk.
However, disk encryption does not provide replay protection, meaning an older disk version or parts of an older disk can be replayed by the host to the Confidential VM. With no countermeasures taken, this is impossible to detect and opens new attack vectors, e.g., allowing to undo critical changes made to configuration files and data.
In this paper, we solve this problem by proposing CoCoRADE, a way to store data on a disk while maintaining confidentiality, integrity and replay protection of data. In addition, we highlight how freshness is maintained across reboots. Our proof of concept demonstrates how this is easily added to existing Confidential VM offerings in the cloud without needing any additional support from the cloud provider or specialized hardware. The evaluation results show that CoCoRADE provides more security while performing comparably to, if not better than, existing ADE solutions with acceptable overheads in memory usage and remount time.&lt;/p&gt;</content:encoded></item><item><title>Internal Project Workshop at Deutsche Cyber-Sicherheitsorganisation (DCSO)</title><link>https://sovereign-project.de/news/workshop-2025-11/</link><guid isPermaLink="true">https://sovereign-project.de/news/workshop-2025-11/</guid><pubDate>Thu, 20 Nov 2025 12:00:00 +0100</pubDate><category>news</category><description>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (Agentur für Innovation in der Cybersicherheit) and coordinated by the Universität Hamburg, held its fourth internal workshop at the DCSO in Berlin on November 13-14th, 2025.&lt;/p&gt;
&lt;p&gt;The workshop disussed current and future directions of research of the consortium partners. Detailed discussions centered on the progress of individual work packages and the continuous efforts to achieve seamless integration of the components contributed by project members. These integration activities are vital for establishing a cohesive architectural framework, which is essential for developing a comprehensive understanding of cyber threats and is critical for progressing in the attribution of threat actors. The meeting concluded with numerous open research directions and ideas on how to leverage the collected attack information within a graph-based framework to support attribution.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (Agentur für Innovation in der Cybersicherheit) and coordinated by the Universität Hamburg, held its fourth internal workshop at the DCSO in Berlin on November 13-14th, 2025.&lt;/p&gt;
&lt;p&gt;The workshop disussed current and future directions of research of the consortium partners. Detailed discussions centered on the progress of individual work packages and the continuous efforts to achieve seamless integration of the components contributed by project members. These integration activities are vital for establishing a cohesive architectural framework, which is essential for developing a comprehensive understanding of cyber threats and is critical for progressing in the attribution of threat actors. The meeting concluded with numerous open research directions and ideas on how to leverage the collected attack information within a graph-based framework to support attribution.&lt;/p&gt;</content:encoded></item><item><title>SOVEREIGN presenting at Conference on Communications and Network Security (CNS'25)</title><link>https://sovereign-project.de/news/cns-2025/</link><guid isPermaLink="true">https://sovereign-project.de/news/cns-2025/</guid><pubDate>Wed, 15 Oct 2025 16:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;The SOVEREIGN project, focusing on critical infrastructure protection, presented two research papers at the 2025 IEEE Conference on Communications and Network Security (CNS) in Avignon, France. Our first paper introduced a machine learning–based method for tagging security alerts with MITRE ATT&amp;amp;CK tactics, improving threat context and streamlining analyst workflows. The second paper proposed a real-time detection framework using kill chain state machines to identify multi-stage cyberattacks as they progressed. These contributions demonstrated SOVEREIGN’s commitment to sovereign, explainable, and operational cybersecurity solutions designed to strengthen proactive defense in critical digital environments.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;The SOVEREIGN project, focusing on critical infrastructure protection, presented two research papers at the 2025 IEEE Conference on Communications and Network Security (CNS) in Avignon, France. Our first paper introduced a machine learning–based method for tagging security alerts with MITRE ATT&amp;amp;CK tactics, improving threat context and streamlining analyst workflows. The second paper proposed a real-time detection framework using kill chain state machines to identify multi-stage cyberattacks as they progressed. These contributions demonstrated SOVEREIGN’s commitment to sovereign, explainable, and operational cybersecurity solutions designed to strengthen proactive defense in critical digital environments.&lt;/p&gt;
&lt;div class="publication-embed"&gt;
&lt;div class="publication"&gt;
&lt;i class="icon"&gt;
&lt;svg viewBox="0 0 646 907" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
&lt;g clip-path="url(#clip0_45_2)"&gt;
&lt;rect x="7.5" y="7.5" width="631" height="892" stroke="currentColor" fill="none" stroke-width="15"/&gt;
&lt;rect x="73" y="81" width="500" height="40" fill="currentColor"/&gt;
&lt;rect x="173" y="133" width="300" height="40" fill="currentColor"/&gt;
&lt;rect x="73" y="281" width="245" height="552" fill="currentColor"/&gt;
&lt;rect x="328" y="281" width="245" height="280" fill="currentColor"/&gt;
&lt;rect x="328" y="621" width="245" height="212" fill="currentColor"/&gt;
&lt;rect x="103" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="253" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="328" y="571" width="144" height="40" fill="currentColor"/&gt;
&lt;rect x="403" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;/g&gt;
&lt;defs&gt;
&lt;/defs&gt;
&lt;/svg&gt;
&lt;/i&gt;
&lt;span class="citation"&gt;&lt;a href="https://doi.org/10.1109/CNS66487.2025.11194941" &gt;
Anum Talpur, Jannik Schröder, Liliana Kistenmacher, Wolfram Wingerath, Georg Becker, Mathias Fischer. &lt;b&gt;"Tagging Alerts to Adversaries: ML-Enabled Classification Using MITRE ATT&amp;amp;CK Framework"&lt;/b&gt;. IEEE Conference on Communications and Network Security. Avignon, France. 2025.&lt;/a&gt;&lt;/span&gt;
&lt;div class="artefacts"&gt;
&lt;a class="artefact" href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=11194941"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
PDF
&lt;/a&gt;
&lt;a class="artefact" href="https://sovereign-project.de/publications/cns2025/index.bib"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
BibTeX
&lt;/a&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="publication"&gt;
&lt;i class="icon"&gt;
&lt;svg viewBox="0 0 646 907" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
&lt;g clip-path="url(#clip0_45_2)"&gt;
&lt;rect x="7.5" y="7.5" width="631" height="892" stroke="currentColor" fill="none" stroke-width="15"/&gt;
&lt;rect x="73" y="81" width="500" height="40" fill="currentColor"/&gt;
&lt;rect x="173" y="133" width="300" height="40" fill="currentColor"/&gt;
&lt;rect x="73" y="281" width="245" height="552" fill="currentColor"/&gt;
&lt;rect x="328" y="281" width="245" height="280" fill="currentColor"/&gt;
&lt;rect x="328" y="621" width="245" height="212" fill="currentColor"/&gt;
&lt;rect x="103" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="253" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="328" y="571" width="144" height="40" fill="currentColor"/&gt;
&lt;rect x="403" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;/g&gt;
&lt;defs&gt;
&lt;/defs&gt;
&lt;/svg&gt;
&lt;/i&gt;
&lt;span class="citation"&gt;&lt;a href="https://doi.org/10.1109/CNS66487.2025.11194951" &gt;
Liliana Kistenmacher, Anum Talpur, Mathias Fischer. &lt;b&gt;"Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines"&lt;/b&gt;. IEEE Conference on Communications and Network Security. Avignon, France. 2025.&lt;/a&gt;&lt;/span&gt;
&lt;div class="artefacts"&gt;
&lt;a class="artefact" href="https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&amp;amp;arnumber=11194951"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
PDF
&lt;/a&gt;
&lt;a class="artefact" href="https://sovereign-project.de/publications/cns2025/index.bib"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
BibTeX
&lt;/a&gt;
&lt;a class="artefact" href="https://github.com/UHH-ISS/rt-kcsm" &gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg viewBox="0 0 98 96" xmlns="http://www.w3.org/2000/svg"&gt;&lt;path fill-rule="evenodd" clip-rule="evenodd" d="M48.854 0C21.839 0 0 22 0 49.217c0 21.756 13.993 40.172 33.405 46.69 2.427.49 3.316-1.059 3.316-2.362 0-1.141-.08-5.052-.08-9.127-13.59 2.934-16.42-5.867-16.42-5.867-2.184-5.704-5.42-7.17-5.42-7.17-4.448-3.015.324-3.015.324-3.015 4.934.326 7.523 5.052 7.523 5.052 4.367 7.496 11.404 5.378 14.235 4.074.404-3.178 1.699-5.378 3.074-6.6-10.839-1.141-22.243-5.378-22.243-24.283 0-5.378 1.94-9.778 5.014-13.2-.485-1.222-2.184-6.275.486-13.038 0 0 4.125-1.304 13.426 5.052a46.97 46.97 0 0 1 12.214-1.63c4.125 0 8.33.571 12.213 1.63 9.302-6.356 13.427-5.052 13.427-5.052 2.67 6.763.97 11.816.485 13.038 3.155 3.422 5.015 7.822 5.015 13.2 0 18.905-11.404 23.06-22.324 24.283 1.78 1.548 3.316 4.481 3.316 9.126 0 6.6-.08 11.897-.08 13.526 0 1.304.89 2.853 3.316 2.364 19.412-6.52 33.405-24.935 33.405-46.691C97.707 22 75.788 0 48.854 0z"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
&lt;span class="name"&gt;Source Code&lt;/span&gt;
&lt;/a&gt;
&lt;a class="artefact" href="https://codeocean.com/capsule/2288451/tree" &gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 128 128"&gt;&lt;path d="M39.77,77.65A13.85,13.85,0,0,1,25.66,64.06v-.12A13.93,13.93,0,0,1,39.77,50.23a14.5,14.5,0,0,1,9.83,3.92l9.64-9.36a28.09,28.09,0,0,0-19.47-7.72A27.24,27.24,0,0,0,12,63.74v.2a27.38,27.38,0,0,0,27.77,27A28,28,0,0,0,59.24,83.2l-9.63-9.36A14.41,14.41,0,0,1,39.77,77.65Z" fill="#000" /&gt;&lt;path d="M87.91,37a28.52,28.52,0,0,0-19.6,7.83l-.11.11-19.59,19L68.31,83.1l.11.11A28.06,28.06,0,0,0,88,91a27.39,27.39,0,0,0,27.77-27h0A27.58,27.58,0,0,0,87.91,37Zm0,40.7A14.29,14.29,0,0,1,78,73.74l-10-9.8,10-9.79a14.51,14.51,0,0,1,9.84-3.92A13.85,13.85,0,0,1,102,63.79v.15A13.85,13.85,0,0,1,88,77.66Z" fill="#000"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
&lt;span class="name"&gt;Reproducible Experiments&lt;/span&gt;
&lt;/a&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content:encoded></item><item><title>Internal Project Workshop at University of Lübeck</title><link>https://sovereign-project.de/news/workshop-2025-07/</link><guid isPermaLink="true">https://sovereign-project.de/news/workshop-2025-07/</guid><pubDate>Fri, 11 Jul 2025 16:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (Agentur für Innovation in der Cybersicherheit) and coordinated by the Universität Hamburg, held its third internal workshop at the Institute for IT-Security of the University of Lübeck on July 10-11th, 2025.&lt;/p&gt;
&lt;p&gt;Hosted in a collaborative setting, the workshop brought together all project partners to assess current progress and align on key objectives. In-depth discussions focused on the status of individual work packages and the ongoing efforts to ensure the tight integration of project members’ components. These integration activities are crucial for enabling a holistic view of attacks and wave the path towards attribution of cyber threats. The meeting concluded with a clear definition of interfaces between project partners.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (Agentur für Innovation in der Cybersicherheit) and coordinated by the Universität Hamburg, held its third internal workshop at the Institute for IT-Security of the University of Lübeck on July 10-11th, 2025.&lt;/p&gt;
&lt;p&gt;Hosted in a collaborative setting, the workshop brought together all project partners to assess current progress and align on key objectives. In-depth discussions focused on the status of individual work packages and the ongoing efforts to ensure the tight integration of project members’ components. These integration activities are crucial for enabling a holistic view of attacks and wave the path towards attribution of cyber threats. The meeting concluded with a clear definition of interfaces between project partners.&lt;/p&gt;</content:encoded></item><item><title>Accepted Paper at the Informatik Festival 2025 Workshop</title><link>https://sovereign-project.de/publications/ocsf2025/</link><guid isPermaLink="true">https://sovereign-project.de/publications/ocsf2025/</guid><pubDate>Fri, 11 Jul 2025 15:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;We are happy to announce that our paper &lt;em&gt;&amp;ldquo;From Logs to Language: Making OCSF the Open API for Security Data with Tenzir&amp;rdquo;&lt;/em&gt; has been accepted at the Informatik Festival 2025 Workshop for &lt;a href="https://informatik2025.gi.de"&gt;Cybersecurity: Prävention, Detektion und Reaktion mit Open Source-Perspektiven&lt;/a&gt;.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;We are happy to announce that our paper &lt;em&gt;&amp;ldquo;From Logs to Language: Making OCSF the Open API for Security Data with Tenzir&amp;rdquo;&lt;/em&gt; has been accepted at the Informatik Festival 2025 Workshop for &lt;a href="https://informatik2025.gi.de"&gt;Cybersecurity: Prävention, Detektion und Reaktion mit Open Source-Perspektiven&lt;/a&gt;.&lt;/p&gt;</content:encoded></item><item><title>Accepted Papers at CNS'25</title><link>https://sovereign-project.de/publications/cns2025/</link><guid isPermaLink="true">https://sovereign-project.de/publications/cns2025/</guid><pubDate>Thu, 10 Jul 2025 10:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;Double tap at the IEEE Conference on Communications and Network Security (CNS 2025)!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Tagging Alerts to Adversaries: ML-Enabled Classification Using MITRE ATT&amp;amp;CK Framework&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An intrusion detection system (IDS) in an enterprise network plays an important role in identifying and alerting suspicious activity. The triggered alerts are generated along with false alarms where a legitimate activity is mistakenly classified as malicious and results in alerts fatigue. Too many alerts that are not integrated and lack related context and correlation can burden security analytics and make prioritization of threats more challenging. For security operations centers (SOCs) in an enterprise, it can result in critical alerts being overlooked or undetected, which can lead to dire attacks not being identified on time. Therefore, an automated tagging of alerts for prioritization of high-risk events is important. To overcome this challenge, we use machine learning (ML) to enrich the alerts of IDS with the real-world adversary information of the MITRE ATT&amp;amp;CK framework. In particular, we leverage the knowledge of the MITRE ATT&amp;amp;CK matrix for enterprise and apply multi-layer perceptron (MLP) and transformer-based learning in a novel way to uncover the possible correlation of alerts to known adversarial behaviors (or tactics). We evaluate our models over the recent security logs of the real enterprise network and demonstrate an accuracy of up to 95% with our automated alert classification. Extensive experiments are performed with publicly available datasets as well to demonstrate the performance of the transformer model and verify its effectiveness against different IDS setups.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;Double tap at the IEEE Conference on Communications and Network Security (CNS 2025)!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Tagging Alerts to Adversaries: ML-Enabled Classification Using MITRE ATT&amp;amp;CK Framework&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An intrusion detection system (IDS) in an enterprise network plays an important role in identifying and alerting suspicious activity. The triggered alerts are generated along with false alarms where a legitimate activity is mistakenly classified as malicious and results in alerts fatigue. Too many alerts that are not integrated and lack related context and correlation can burden security analytics and make prioritization of threats more challenging. For security operations centers (SOCs) in an enterprise, it can result in critical alerts being overlooked or undetected, which can lead to dire attacks not being identified on time. Therefore, an automated tagging of alerts for prioritization of high-risk events is important. To overcome this challenge, we use machine learning (ML) to enrich the alerts of IDS with the real-world adversary information of the MITRE ATT&amp;amp;CK framework. In particular, we leverage the knowledge of the MITRE ATT&amp;amp;CK matrix for enterprise and apply multi-layer perceptron (MLP) and transformer-based learning in a novel way to uncover the possible correlation of alerts to known adversarial behaviors (or tactics). We evaluate our models over the recent security logs of the real enterprise network and demonstrate an accuracy of up to 95% with our automated alert classification. Extensive experiments are performed with publicly available datasets as well to demonstrate the performance of the transformer model and verify its effectiveness against different IDS setups.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract: Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cyber threats present an ongoing challenge for organisations worldwide. Attackers range from cyber criminals to state-funded groups that have a specialised skill set to execute complex attacks and present an Advanced Persistent Threat(APT). Therefore, organisations use security monitoring as a second line of defence to detect attacks based on signatures that raise alarms when an Indicator of Compromise (IoC) is observed. However, current Intrusion Detection Systems (IDS) generate many false positives, leading to alert fatigue. The raised alerts also do not show the whole attack as they need to be dissected individually. Our work presents a simplified approach that enables efficient and real-time construction of attacks by correlating alerts. Tests with different network datasets suggest that our prioritisation mechanisms can reduce the number of false-positive alerts by 99%. Our performance evaluation indicates that we can detect multi-stage attacks in real time with a low memory footprint and short execution time.&lt;/p&gt;</content:encoded></item><item><title>SOVEREIGN presenting at SIC 2025 Symposium</title><link>https://sovereign-project.de/news/cyberagentur-sic-2025/</link><guid isPermaLink="true">https://sovereign-project.de/news/cyberagentur-sic-2025/</guid><pubDate>Mon, 26 May 2025 18:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;From May 14th to 15th, 2025, we had the opportunity to present our work at the SIC 2025 Symposium in Halle (Saale), Germany. The event, hosted by the &lt;a href="https://www.cyberagentur.de/"&gt;Cyberagentur (Agency for Innovation in Cybersecurity)&lt;/a&gt;, served as a valuable platform for connecting German government agencies with the research projects they fund, as well as with the broader cybersecurity research community. We were excited to present our work and engage in discussion about the future of cyber security.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;From May 14th to 15th, 2025, we had the opportunity to present our work at the SIC 2025 Symposium in Halle (Saale), Germany. The event, hosted by the &lt;a href="https://www.cyberagentur.de/"&gt;Cyberagentur (Agency for Innovation in Cybersecurity)&lt;/a&gt;, served as a valuable platform for connecting German government agencies with the research projects they fund, as well as with the broader cybersecurity research community. We were excited to present our work and engage in discussion about the future of cyber security.&lt;/p&gt;</content:encoded></item><item><title>Accepted Paper at DSN 2025</title><link>https://sovereign-project.de/publications/dsn2025/</link><guid isPermaLink="true">https://sovereign-project.de/publications/dsn2025/</guid><pubDate>Thu, 15 May 2025 00:00:00 +0200</pubDate><category>publications</category><description/><content:encoded/></item><item><title>Accepted Paper at ARES 2025</title><link>https://sovereign-project.de/publications/ares2025/</link><guid isPermaLink="true">https://sovereign-project.de/publications/ares2025/</guid><pubDate>Thu, 15 May 2025 00:00:00 +0200</pubDate><category>publications</category><description/><content:encoded/></item><item><title>Accepted Paper at the ACNS</title><link>https://sovereign-project.de/publications/ocean/</link><guid isPermaLink="true">https://sovereign-project.de/publications/ocean/</guid><pubDate>Thu, 08 May 2025 10:00:00 +0200</pubDate><category>publications</category><description>
&lt;p&gt;Our paper was accepted at the 23rd International Conference on Applied Cryptography and Network Security (ACNS'25).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In an era where cyberattacks increasingly target the software supply chain, the ability to accurately attribute code authorship in binary files is critical to improving cybersecurity measures. We propose OCEAN, a contrastive learning-based system for function-level authorship attribution. OCEAN is the first framework to explore code authorship attribution on compiled binaries in an open-world and extreme scenario, where two code samples from unknown authors are compared to determine if they are developed by the same author. To evaluate OCEAN, we introduce new realistic datasets: CONAN, to improve the performance of authorship attribution systems in real-world use cases, and SNOOPY, to increase the robustness of the evaluation of such systems. We use CONAN to train our model and evaluate on SNOOPY, a fully unseen dataset, resulting in an AUROC score of 0.86 even when using high compiler optimizations. We further show that CONAN improves performance by 7% compared to the previously used Google Code Jam dataset. Additionally, OCEAN outperforms previous methods in their settings, achieving a 10% improvement over state-of-the-art SCS-Gan in scenarios analyzing source code. Furthermore, OCEAN can detect code injections from an unknown author in a software update, underscoring its value for securing software supply chains.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;Our paper was accepted at the 23rd International Conference on Applied Cryptography and Network Security (ACNS'25).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Abstract:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In an era where cyberattacks increasingly target the software supply chain, the ability to accurately attribute code authorship in binary files is critical to improving cybersecurity measures. We propose OCEAN, a contrastive learning-based system for function-level authorship attribution. OCEAN is the first framework to explore code authorship attribution on compiled binaries in an open-world and extreme scenario, where two code samples from unknown authors are compared to determine if they are developed by the same author. To evaluate OCEAN, we introduce new realistic datasets: CONAN, to improve the performance of authorship attribution systems in real-world use cases, and SNOOPY, to increase the robustness of the evaluation of such systems. We use CONAN to train our model and evaluate on SNOOPY, a fully unseen dataset, resulting in an AUROC score of 0.86 even when using high compiler optimizations. We further show that CONAN improves performance by 7% compared to the previously used Google Code Jam dataset. Additionally, OCEAN outperforms previous methods in their settings, achieving a 10% improvement over state-of-the-art SCS-Gan in scenarios analyzing source code. Furthermore, OCEAN can detect code injections from an unknown author in a software update, underscoring its value for securing software supply chains.&lt;/p&gt;</content:encoded></item><item><title>Internal Project Workshop at Fraunhofer AISEC</title><link>https://sovereign-project.de/news/workshop-2025-03/</link><guid isPermaLink="true">https://sovereign-project.de/news/workshop-2025-03/</guid><pubDate>Tue, 01 Apr 2025 12:00:00 +0100</pubDate><category>news</category><description>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (der Agentur für Innovation in der Cybersicherheit) and led by the Universität Hamburg, organized their third internal workshop that was held at the Fraunhofer Institute for Applied and Integrated Security (AISEC) Munich on 25-26th March 2025.&lt;/p&gt;
&lt;p&gt;At the workshop, all partners reviewed the objectives and the ongoing project work. The discussion covered key topics such as project status updates, work package progress, and integration efforts, ensuring alignment with the project&amp;rsquo;s objectives. The workshop concluded with a clear roadmap for the next steps and a dedication to advancing the project.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;The SOVEREIGN project, funded by the Cyberagentur (der Agentur für Innovation in der Cybersicherheit) and led by the Universität Hamburg, organized their third internal workshop that was held at the Fraunhofer Institute for Applied and Integrated Security (AISEC) Munich on 25-26th March 2025.&lt;/p&gt;
&lt;p&gt;At the workshop, all partners reviewed the objectives and the ongoing project work. The discussion covered key topics such as project status updates, work package progress, and integration efforts, ensuring alignment with the project&amp;rsquo;s objectives. The workshop concluded with a clear roadmap for the next steps and a dedication to advancing the project.&lt;/p&gt;</content:encoded></item><item><title>GI-WebTalk #3: Sicherheitskonzepte und Geopolitik</title><link>https://sovereign-project.de/news/webtalk-3/</link><guid isPermaLink="true">https://sovereign-project.de/news/webtalk-3/</guid><pubDate>Fri, 01 Nov 2024 14:00:00 +0100</pubDate><category>news</category><description>
&lt;p&gt;Im dritten WebTalk unserer Reihe „Cybersicherheit und technologische Souveränität“ widmen wir uns zunächst den völkerrechtlichen Aspekten der Cybersicherheit und analysieren, wie internationale Normen und Verträge den Schutz kritischer Infrastrukturen und die staatliche Handlungsfähigkeit im Cyberraum sicherstellen. Der zweite Vortrag wird Ansätze zur Attribution von geheimen Nachrichten im Cyberraum vorstellen und einige die Herausforderungen darstellen, die mit der Identifikation von Verantwortlichen für Cyberangriffe einhergehen. Diskutieren Sie mit Expertinnen und Experten über die rechtlichen Rahmenbedingungen und ethischen Implikationen, die eine souveräne digitale Zukunft maßgeblich beeinflussen.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;Im dritten WebTalk unserer Reihe „Cybersicherheit und technologische Souveränität“ widmen wir uns zunächst den völkerrechtlichen Aspekten der Cybersicherheit und analysieren, wie internationale Normen und Verträge den Schutz kritischer Infrastrukturen und die staatliche Handlungsfähigkeit im Cyberraum sicherstellen. Der zweite Vortrag wird Ansätze zur Attribution von geheimen Nachrichten im Cyberraum vorstellen und einige die Herausforderungen darstellen, die mit der Identifikation von Verantwortlichen für Cyberangriffe einhergehen. Diskutieren Sie mit Expertinnen und Experten über die rechtlichen Rahmenbedingungen und ethischen Implikationen, die eine souveräne digitale Zukunft maßgeblich beeinflussen.&lt;/p&gt;
&lt;p&gt;Ziel der ELSI-Webtalks (Ethics, Legal and Social Implications) ist der wissenschaftlich getriebene Diskurs zu diesen Fragen. Die Webtalks werden von der Gesellschaft für Informatik (GI) e.V. in Kooperation mit dem Forschungsprojekt SOVEREIGN durchgeführt, das seit 2023 mit Bundesmitteln durch die Cyberagentur gefördert wird.&lt;/p&gt;
&lt;div class="embed"&gt;
&lt;iframe data-src="https://www.youtube.com/embed/Mg8xC4a4ns8?autoplay=true" class="frame" allowfullscreen="" title="YouTube"&gt;&lt;/iframe&gt;
&lt;div class="allow"&gt;
&lt;div class="content"&gt;
&lt;button class="button"&gt;Load external content from YouTube&lt;/button&gt;
&lt;p&gt;&lt;small&gt;
By loading external content you agree to the privacy policy of YouTube.
&lt;/small&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content:encoded></item><item><title>Cyberagentur extends funding for phase 3</title><link>https://sovereign-project.de/news/funding-extended-phase-3/</link><guid isPermaLink="true">https://sovereign-project.de/news/funding-extended-phase-3/</guid><pubDate>Thu, 05 Sep 2024 00:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;On August 20, we presented our results of the second phase of the Cyberagentur&amp;rsquo;s &lt;a href="https://www.cyberagentur.de/hsk/"&gt;HSK call&lt;/a&gt;. We received a lot of positive feedback and got attention from other government agencies. We are happy to announce that we made it to the next phase and will receive 10 million in funding over the next three years to pave the way for securing critical infrastructures. We are thrilled, excited, and humbled to have made it through despite the intense competition in this call. We also want to acknowledge that we are deeply grateful for the support of all contributors who have been instrumental in our success.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;On August 20, we presented our results of the second phase of the Cyberagentur&amp;rsquo;s &lt;a href="https://www.cyberagentur.de/hsk/"&gt;HSK call&lt;/a&gt;. We received a lot of positive feedback and got attention from other government agencies. We are happy to announce that we made it to the next phase and will receive 10 million in funding over the next three years to pave the way for securing critical infrastructures. We are thrilled, excited, and humbled to have made it through despite the intense competition in this call. We also want to acknowledge that we are deeply grateful for the support of all contributors who have been instrumental in our success.&lt;/p&gt;
&lt;p&gt;Our project aims to increase the resilience and sovereignty of critical infrastructures through open hardware, confidential computing, and the consequent use of as well as contribution to open-source software. The goal is to bring a holistic approach to cyber security so that attacks can be detected and prevented early on.&lt;/p&gt;</content:encoded></item><item><title>GI-WebTalk #2: Strategien und Attribution im Cyberraum</title><link>https://sovereign-project.de/news/webtalk-2/</link><guid isPermaLink="true">https://sovereign-project.de/news/webtalk-2/</guid><pubDate>Fri, 16 Aug 2024 13:50:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;Der zweite Webtalk der Reihe „Cybersicherheit und technologische Souveränität“ widmet sich der Analyse aktueller Angriffsstrategien sowie der Attribution von Cyberangriffen aus sicherheitspolitischer Perspektive. In den Fachvorträgen werden sowohl die technischen Möglichkeiten zur Detektion und Abwehr von Cyberbedrohungen als auch die Herausforderungen diskutiert, die mit der Identifizierung der Angreifer verbunden sind. Besondere Beachtung finden Fragen der technologischen Souveränität und deren Bedeutung für die Entwicklung effektiver Abwehrmechanismen.&lt;/p&gt;
&lt;p&gt;Ziel der ELSI-Webtalks (Ethics, Legal and Social Implications) ist der wissenschaftlich getriebene Diskurs zu diesen Fragen. Die Webtalks werden von der Gesellschaft für Informatik (GI) e.V. in Kooperation mit dem Forschungsprojekt SOVEREIGN durchgeführt, das seit 2023 mit Bundesmitteln durch die Cyberagentur gefördert wird.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;Der zweite Webtalk der Reihe „Cybersicherheit und technologische Souveränität“ widmet sich der Analyse aktueller Angriffsstrategien sowie der Attribution von Cyberangriffen aus sicherheitspolitischer Perspektive. In den Fachvorträgen werden sowohl die technischen Möglichkeiten zur Detektion und Abwehr von Cyberbedrohungen als auch die Herausforderungen diskutiert, die mit der Identifizierung der Angreifer verbunden sind. Besondere Beachtung finden Fragen der technologischen Souveränität und deren Bedeutung für die Entwicklung effektiver Abwehrmechanismen.&lt;/p&gt;
&lt;p&gt;Ziel der ELSI-Webtalks (Ethics, Legal and Social Implications) ist der wissenschaftlich getriebene Diskurs zu diesen Fragen. Die Webtalks werden von der Gesellschaft für Informatik (GI) e.V. in Kooperation mit dem Forschungsprojekt SOVEREIGN durchgeführt, das seit 2023 mit Bundesmitteln durch die Cyberagentur gefördert wird.&lt;/p&gt;
&lt;div class="embed"&gt;
&lt;iframe data-src="https://www.youtube.com/embed/KZyZ6e3qe9Y?autoplay=true" class="frame" allowfullscreen="" title="YouTube"&gt;&lt;/iframe&gt;
&lt;div class="allow"&gt;
&lt;div class="content"&gt;
&lt;button class="button"&gt;Load external content from YouTube&lt;/button&gt;
&lt;p&gt;&lt;small&gt;
By loading external content you agree to the privacy policy of YouTube.
&lt;/small&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content:encoded></item><item><title>Presentation of paper at ARES PCSCI Workshop</title><link>https://sovereign-project.de/news/ares-pcsci-workshop-2024/</link><guid isPermaLink="true">https://sovereign-project.de/news/ares-pcsci-workshop-2024/</guid><pubDate>Mon, 05 Aug 2024 13:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;On July 30, 2024, at the International Workshop on Physical and Cyber Security in Interdependent Critical Infrastructures (PCSCI), which is an EU Projects Symposium Workshop held with the 19th ARES Conference 2024 in Vienna, Austria, our team member, Dr. Anum Talpur, presented the vision of our project SOVEREIGN.&lt;/p&gt;
&lt;p&gt;The event gathered many researchers and experts from around the world who work in computer and information security. The PCSCI workshop, where we presented our project concept, was aimed at bringing security experts together to discuss potential solutions for tackling critical infrastructure protection. As part of our talk, we presented a novel and holistic concept of our SOVEREIGN platform that widely addresses the problem of securing critical infrastructures.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;On July 30, 2024, at the International Workshop on Physical and Cyber Security in Interdependent Critical Infrastructures (PCSCI), which is an EU Projects Symposium Workshop held with the 19th ARES Conference 2024 in Vienna, Austria, our team member, Dr. Anum Talpur, presented the vision of our project SOVEREIGN.&lt;/p&gt;
&lt;p&gt;The event gathered many researchers and experts from around the world who work in computer and information security. The PCSCI workshop, where we presented our project concept, was aimed at bringing security experts together to discuss potential solutions for tackling critical infrastructure protection. As part of our talk, we presented a novel and holistic concept of our SOVEREIGN platform that widely addresses the problem of securing critical infrastructures.&lt;/p&gt;
&lt;p&gt;The workshop gathered a significant audience working on protecting critical infrastructures who expressed very positive feedback regarding our project, particularly highlighting the comprehensive concept and broad team of experts from industry, academia, and research institutes we have to accomplish our goals.&lt;/p&gt;
&lt;div class="publication-embed"&gt;
&lt;div class="publication"&gt;
&lt;i class="icon"&gt;
&lt;svg viewBox="0 0 646 907" fill="none" xmlns="http://www.w3.org/2000/svg"&gt;
&lt;g clip-path="url(#clip0_45_2)"&gt;
&lt;rect x="7.5" y="7.5" width="631" height="892" stroke="currentColor" fill="none" stroke-width="15"/&gt;
&lt;rect x="73" y="81" width="500" height="40" fill="currentColor"/&gt;
&lt;rect x="173" y="133" width="300" height="40" fill="currentColor"/&gt;
&lt;rect x="73" y="281" width="245" height="552" fill="currentColor"/&gt;
&lt;rect x="328" y="281" width="245" height="280" fill="currentColor"/&gt;
&lt;rect x="328" y="621" width="245" height="212" fill="currentColor"/&gt;
&lt;rect x="103" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="253" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;rect x="328" y="571" width="144" height="40" fill="currentColor"/&gt;
&lt;rect x="403" y="201" width="140" height="40" fill="currentColor"/&gt;
&lt;/g&gt;
&lt;defs&gt;
&lt;/defs&gt;
&lt;/svg&gt;
&lt;/i&gt;
&lt;span class="citation"&gt;&lt;a href="https://doi.org/10.1145/3664476.3671410" &gt;
Georg Becker, Thomas Eisenbarth, Hannes Federrath, Mathias Fischer, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin. &lt;b&gt;"SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure Protection"&lt;/b&gt;. International Workshop on Physical and Cyber Security in Interdependent Critical Infrastructures (PCSCI). Vienna, Austria. 2024.&lt;/a&gt;&lt;/span&gt;
&lt;div class="artefacts"&gt;
&lt;a class="artefact" href="https://dl.acm.org/doi/pdf/10.1145/3664476.3671410"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
PDF
&lt;/a&gt;
&lt;a class="artefact" href="https://sovereign-project.de/publications/sovereign-towards-a-holistic-approach/index.bib"&gt;
&lt;span class="icon"&gt;&lt;i class="icon"&gt;
&lt;svg xmlns="http://www.w3.org/2000/svg" alt="document" role="img" aria-label="document" class="ionicon" viewBox="0 0 512 512"&gt;&lt;path d="M416 221.25V416a48 48 0 01-48 48H144a48 48 0 01-48-48V96a48 48 0 0148-48h98.75a32 32 0 0122.62 9.37l141.26 141.26a32 32 0 019.37 22.62z" fill="none" stroke="currentColor" stroke-linejoin="round" stroke-width="32"/&gt;&lt;path d="M256 56v120a32 32 0 0032 32h120M176 288h160M176 368h160" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="32"/&gt;&lt;/svg&gt;
&lt;/i&gt;&lt;/span&gt;
BibTeX
&lt;/a&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content:encoded></item><item><title>Cyberagentur visiting SOVEREIGN in Hamburg</title><link>https://sovereign-project.de/news/cyberagentur-visiting-sovereign-2024/</link><guid isPermaLink="true">https://sovereign-project.de/news/cyberagentur-visiting-sovereign-2024/</guid><pubDate>Fri, 19 Jul 2024 11:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;On July 16, 2024, Prof. Dr. Christian Hummert, head of the Agentur für Innovation in der Cybersicherheit (&lt;a href="https://www.cyberagentur.de/"&gt;Cyberagentur&lt;/a&gt;), with Dr. Gerald Walther and Dr. André Müller visited the Universität Hamburg to meet up with the SOVEREIGN project members to get a hold of the current state of the project. The members presented a coherent modular architecture to detect and defend against advanced cyber threats.&lt;/p&gt;
&lt;figure class="figure"&gt;
&lt;div class="image"&gt;
&lt;img class="zoom-in-image" loading="lazy" src="https://sovereign-project.de/img/news/cyberagentur-visiting-sovereign-2024-hardware_hu_ee4b12a8c06ca611.webp" alt='SOVEREIGN’s low-latency FPGA firewall allows malicious traffic to be filtered in legacy KRITIS infrastructure.' sizes="50vw" srcset=""&gt;
&lt;/div&gt;
&lt;figcaption id="fig:1"&gt;&lt;b&gt;Figure 1&lt;/b&gt;: SOVEREIGN&amp;rsquo;s low-latency FPGA firewall allows malicious traffic to be filtered in legacy KRITIS infrastructure.&lt;/figcaption&gt;
&lt;/figure&gt;&lt;p&gt;One discussed topic is the attribution of threat actors based on software binaries. Additionally, the project also presented specialized hardware that allows it to be integrated into the existing legacy infrastructure of KRITIS to dynamically assess the risk and take action. Another addressed topic is the enrichment and correlation of existing alerts from Intrusion Detection Systems (IDS) to aid the detection of multi-stage attacks. The project members also addressed potential attack vectors of the SOVEREIGN architecture by enrolling attestation to all software components, thus detecting tampering attempts. The project outcomes enable KRITIS organizations to better protect their IT and Operational Technology (OT) from attacks.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;On July 16, 2024, Prof. Dr. Christian Hummert, head of the Agentur für Innovation in der Cybersicherheit (&lt;a href="https://www.cyberagentur.de/"&gt;Cyberagentur&lt;/a&gt;), with Dr. Gerald Walther and Dr. André Müller visited the Universität Hamburg to meet up with the SOVEREIGN project members to get a hold of the current state of the project. The members presented a coherent modular architecture to detect and defend against advanced cyber threats.&lt;/p&gt;
&lt;figure class="figure"&gt;
&lt;div class="image"&gt;
&lt;img class="zoom-in-image" loading="lazy" src="https://sovereign-project.de/img/news/cyberagentur-visiting-sovereign-2024-hardware_hu_ee4b12a8c06ca611.webp" alt='SOVEREIGN’s low-latency FPGA firewall allows malicious traffic to be filtered in legacy KRITIS infrastructure.' sizes="50vw" srcset=""&gt;
&lt;/div&gt;
&lt;figcaption id="fig:1"&gt;&lt;b&gt;Figure 1&lt;/b&gt;: SOVEREIGN&amp;rsquo;s low-latency FPGA firewall allows malicious traffic to be filtered in legacy KRITIS infrastructure.&lt;/figcaption&gt;
&lt;/figure&gt;&lt;p&gt;One discussed topic is the attribution of threat actors based on software binaries. Additionally, the project also presented specialized hardware that allows it to be integrated into the existing legacy infrastructure of KRITIS to dynamically assess the risk and take action. Another addressed topic is the enrichment and correlation of existing alerts from Intrusion Detection Systems (IDS) to aid the detection of multi-stage attacks. The project members also addressed potential attack vectors of the SOVEREIGN architecture by enrolling attestation to all software components, thus detecting tampering attempts. The project outcomes enable KRITIS organizations to better protect their IT and Operational Technology (OT) from attacks.&lt;/p&gt;</content:encoded></item><item><title>GI-WebTalk #1: Fehlinformation im Netz und Attribution von Cyberangriffen</title><link>https://sovereign-project.de/news/webtalk/</link><guid isPermaLink="true">https://sovereign-project.de/news/webtalk/</guid><pubDate>Wed, 17 Jul 2024 16:00:00 +0200</pubDate><category>news</category><description>
&lt;p&gt;Research results in the field of cyber security can usually be used for both civilian and military purposes, which obviously results in a dual-use problem. In addition, the increasing use of AI systems also raises ethical questions in the field of cyber security and in the security sector in general. The use of published research results and open source technologies for criminal and terrorist purposes cannot be ruled out either. For example, knowledge of state-of-the-art protection technologies could be used by adversaries to develop new strategies to circumvent them, and the protection options themselves could be further developed without making them available to the general public.&lt;/p&gt;</description><content:encoded>
&lt;p&gt;Research results in the field of cyber security can usually be used for both civilian and military purposes, which obviously results in a dual-use problem. In addition, the increasing use of AI systems also raises ethical questions in the field of cyber security and in the security sector in general. The use of published research results and open source technologies for criminal and terrorist purposes cannot be ruled out either. For example, knowledge of state-of-the-art protection technologies could be used by adversaries to develop new strategies to circumvent them, and the protection options themselves could be further developed without making them available to the general public.&lt;/p&gt;
&lt;p&gt;The aim of the ELSI Webtalks (Ethics, Legal and Social Implications) is a scientifically driven discourse on these issues. The webtalks are organised by the Gesellschaft für Informatik (GI) e.V. in cooperation with the SOVEREIGN research project, which has been funded by the Federal Cyber Agency since 2023.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The first GI webinar&lt;/strong&gt; focussed on the topics of misinformation on the internet and attribution of cyber attacks. These are important topics that we are addressing as part of our SOVEREIGN research project. Many thanks to our great speakers Prof. Dr. Judith Simon and Marit Hansen for their contributions, to Nikolas Becker from the Gesellschaft für Informatik (GI) for moderating and to Dr. André Müller from the Agentur für Innovation in der Cybersicherheit GmbH (Cyberagentur) for the introductory words.&lt;/p&gt;
&lt;figure class="figure"&gt;
&lt;div class="image"&gt;
&lt;img class="zoom-in-image" loading="lazy" src="https://sovereign-project.de/img/news/webinar-banner-3_hu_eff0a54d55b02efa.webp" alt='First webinar on 17 July 2024 on the topic of misinformation on the internet and attribution of cyber attacks.' sizes="50vw" srcset=""&gt;
&lt;/div&gt;
&lt;figcaption id="fig:1"&gt;&lt;b&gt;Figure 1&lt;/b&gt;: First webinar on 17 July 2024 on the topic of misinformation on the internet and attribution of cyber attacks.&lt;/figcaption&gt;
&lt;/figure&gt;
&lt;div class="embed"&gt;
&lt;iframe data-src="https://www.youtube.com/embed/iBqsl3uQnQw?autoplay=true" class="frame" allowfullscreen="" title="YouTube"&gt;&lt;/iframe&gt;
&lt;div class="allow"&gt;
&lt;div class="content"&gt;
&lt;button class="button"&gt;Load external content from YouTube&lt;/button&gt;
&lt;p&gt;&lt;small&gt;
By loading external content you agree to the privacy policy of YouTube.
&lt;/small&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;</content:encoded></item></channel></rss>