Cyberwatching webinar: shaping the future of cybersecurity

Cyberwatching.eu project hosted a webinar with talks from different EU projects. The webinar title was shaping the future of cybersecurity – priorities, challenges and funding opportunities for a more resilient Europe. The event was held online on 13 July 2021 from 10:00 to 17:00 CEST. Avikarsha Mandal presented SAPPAN in a roundtable on the cluster topic Threat Intelligence. 

The recorded video of the event is available here: https://www.youtube.com/watch?v=LGpDVtdEeEE

Click here to find out more about the event.  

SAPPAN at 63rd TF-CSIRT Meeting

SAPPAN has joined the TF-CSIRT community again at the 63rd TF-CSIRT online meeting. Having presented the project ideas and concepts almost two years ago when the project started, we could now show the SAPPAN’s host profiling and host profile visual analysis results.

We received several feedbacks that confirmed that our research aims in the right direction. We promoted the website to stay in contact with the community and provide a teaser for our next planned talk on Incident response automation at the next TF-CSIRT meeting.

TF-CSIRT is a task force that promotes collaboration and coordination between CSIRTs in Europe and neighbouring regions, whilst liaising with relevant organisations at the global level and in other regions. These facts make the TF-CSIRT’s community potential target users of the SAPPAN platform.

Deadline extended for Workshop on Next Generation Security Operations Centers (NG-SOC 2021)

The deadline for submissions for the NG-SOC 2021 workshop, jointly organized by SAPPAN and SOCCRATES in conjunction with the 16th International Conference on Availability, Reliability and Security (ARES 2021) has been extended to May 7, 2021!


The updated important dates:

– Submission Deadline May 7, 2021

– Author Notification May 31, 2021

– Proceedings Version June 13, 2021

– ARES EU Symposium August 17, 2021

– Conference August 17 – August 20, 2021


The submission guidelines valid for the workshop are the same as for the ARES conference. 

Girls Day 2021 Event

Girls’ Day 2021 took place in Germany on April 22nd 2021. The University of Stuttgart was there with a workshop offered to encourage female students to look at information technology courses of study and professions.

Franziska Becker and Robert Rapp from the SAPPAN project, therefore, wanted to convey the important content on data protection and encryption. The event “Hacked? Learn about password and secret languages!” was offered by the two. 13 schoolgirls from all over Germany took part in this online event.

The online event had an interactive structure and offered the schoolgirls a varied mix of information, discussions and games. After a short introduction, the participants were allowed to take part in a small warm-up game. As an introduction to the topic, the first mini-challenge “Who Am I” was to be carried out in three small working groups. Each team was asked to compile the information they could find about Robert on the Internet. Afterwards, Robert started with the first informal part, why data is collected on the Internet in the first place and what information can be compiled from the collected data. Afterwards, the students were shown how to find hidden trackers in their smartphone apps. With the explanation of “cookies” and the “cookie notification”, there was also a small insight into the German Data Protection Regulation (DSGVO). The next topic area also started with a small mini-challenge called “Password please”. The students tried to create the most secure password possible from the given one. In the resolution of the challenge, Robert showed an online tool for password verification. To wrap up the topic, the girls learned more about strong passwords, password managers, and two-factor authentication and were able to ask questions about them. After the lunch break, the session continued with a discussion session about “hacking”. For the students, hacking was no longer a new term and they already knew hackers from movies or even had an idea what the goal of a hack attack is. Franziska then explained the origin of the word hacking and the various forms of hackers. To ensure that the participants are better protected against hackers of all kinds in the future, Franziska showed them a quiz that can be used to raise awareness of a widespread hacking attack called “phishing”. She also presented an online tool that can be used to check files and URLs for viruses and Trojans. In the mini-challenge “A Different Kind of Secret Language”, the schoolgirls were able to playfully encrypt their own text. Working in small groups, the girls created their own encryption method and used it to encrypt the message. Afterwards, the encrypted message was passed on to another group and they tried to decode it. This revealed some really clever ideas for encrypting content, and individual words were also converted back into legible text during decryption. Afterwards, the students mentioned that this challenge in particular had been a lot of fun for them.

After the practical exercise, the students were very curious about the presentation of different encryption methods. The principle of “end-to-end encryption” (E2EE) was explained in a small messenger comparison. After the content part, the students still had enough time to ask all kinds of questions. As a conclusion, the students received a two-part handout.

Full Agenda:
  1. (G) "Who Am I": Find information about a specific person online.
  2. (D,I): Why is data collected on the Internet in the first?
  3. (G) Find hidden trackers in smartphone apps.
  4. (I) What are cookeis and what is the GDPR?
  5. (G) "Password please": create the most secure password possible from a given password.
  6. (D,I) What are strong passwords, password managers, and two-factor authentication?
  7. (I,D) What is hacking?
  8. (G) Quiz about phishig.
  9. (G) A Different Kind of Secret Language": Working in small groups, the girls created their own encryption method and used it to encrypt the message. Afterwards, the encrypted message was passed on to another group and they tried to decode it.
  10. (I) The principle of "end-to-end encryption" (E2EE) was explained in a small messenger comparison.
  11. (D) Questions
Guide: Information (I); Discussions (D); Games (G)

SAPPAN at Leuven AI Law and Ethics Conference

Leuven AI Law and Ethics Conference (LAILEC 2021) has been held online on 25-26 March 2021. In this year’s (online) edition of the conference, the focus was on how AI and (cyber)security interplay, where they go hand in hand and where they collide. The conference aimed to discuss the role of transparency, information sharing and resilience in the data and machine learning supply chains. In particular, it explored to what extent companies would be willing to devise collaborative mitigation strategies against competing interests over valuable data assets. 


Alexey Kirichenko from F-Secure was invited as a panellist to the event. In the “AI for resilience and collaborative mitigation strategies for AI-driven response to cyber threats” session, Alexey talked about the benefits and challenges of intelligence sharing in cybersecurity and how privacy-preserving Machine Learning could alleviate some of the concerns. The SAPPAN work on data and model sharing was used as a key example of sharing approaches in the context of dynamic attack detection and response.


The talk started with historical notes on “sharing among cyber defenders”, including the issues of trust, motivation and technical means, and such challenges as sharing information about “governmental malware” and disclosing sensitive information of organizations targeted by attacks. Then the focus moved to one of the key questions in SAPPAN: since advanced attacks are often detected as anomalies via ML-based engines, how sharing can support such engines? Several forms of sharing were briefly discussed: training data, statistics, models (in particular, distributed and federated learning and ensembling approaches), sharing model predictions in the teacher-student setting. Also, options for the statistics and models sharing scope were considered, from the individual machines level to groups of machines, individual organizations, and across multiple organizations.


More information regarding this event can be found via this link.

SAPPAN at (ISC)² Chapter Switzerland

The (ISC)² Chapter Switzerland promotes the community and networks specialists for information security who are resident or working in Switzerland or who have close ties to Switzerland. The mission is to advance information security in a local community by providing our members and other security professionals with the opportunity to share knowledge, grow professionally, educate others, and collaborate on projects.


Dreamlab presented SAPPAN to an audience of information security professionals and managers in an online session of the event on the 16th of March 2021. The topics were:

  • General overview of the SAPPAN project and its goals
  • Deep dive into DGA detection and results
  • Deep dive into similarity preserving anonymization and results
  • Pitch for participation in SAPPANs End-User Committee

Call For Papers: 3rd International Workshop on Next Generation Security Operations Centers (NG-SOC 2021)


NG-SOC 2021 which is held in conjunction with the ARES 2021 Conference and takes place on August 17th, 2021 in Vienna, Austria is calling for papers.
It is organized by two H2020 projects SOCCRATES and SAPPAN.


Deadline: April 30, 2021 May 7, 2021

Author Notification: May 31, 2021
Proceedings Version: June 13, 2021

ARES EU Symposium: August 17, 2021

Conference: August 17 – August 20, 2021

Organisations in Europe face the difficult task of detecting and responding to increasing numbers of cyber-attacks and threats, given that their own ICT infrastructures are complex, constantly changing (e.g. by the introduction of new technologies) and there is a shortage of qualified cybersecurity experts. There is a great need to drastically reduce the time to detect and respond to cyber-attacks. A key means for organizations to stay ahead of the threat is through the establishment of a Security Operations Center (SOC). The primary purpose of a SOC is to monitor, assess and defend the information assets of an enterprise, both on a technical and organizational level. 

The aim of this workshop is to create a forum for researchers and practitioners to discuss the challenges associated with SOC operations and focus on research contributions that can be applied to address these challenges.

We welcome submissions addressing the important challenges associated with tasks performed at SOCs.

Topics of interest include, but are not limited to:

  1. Collaborative Incident Response and Recovery
  2. Machine Learning for Security and Privacy
  3. Intrusion Detection
  4. Network Security
  5. Standardization and Sharing of Cybersecurity Knowledge
  6. Endpoint Security
  7. Privacy Aspects of Sharing in Cybersecurity 
  8. Cyber Threat Intelligence Utilization
  9. Situation Awareness and Decision Support Tools for SOC
  10. Novel Visualization Tools and Approaches for SOC
  11. Security of Machine Learning 
  12. Attacks against Deep Learning (e.g. Adversarial Examples)
  13. Malware Identification and Analysis
  14. Vulnerability Discovery
  15. Digital Forensics and Attack Attribution
  16. Natural Language Processing (NLP) for Security
  17. Threat Trend Modelling and Prediction
  18. Attack and Defence Modelling
  19. Host Behaviour Profiling 
  20. User Behaviour Analytics (UBA)
  21. Advanced Persistent Threat Detection and Analysis
  22. Security Event Fusion, Correlation and Severity Analysis

 

Submission Guidelines

 

The submission guidelines are the same as for the ARES conference. They can be found at here.
We are soliciting 6-8 page workshop papers.

 

ARES 2021 (including workshops) is published by the International Conference Proceedings Series published by ACM (ACM ICPS).
Authors of selected papers that are accepted by and presented at the ARES Conference
(including workshops) will be invited to submit an extended version to special issues of international journals.
 


Workshop Organisers

 

Irina Chiscop, TNO, Netherlands 

Tomas Jirsik, Masaryk University, Brno, Czech Republic 

Avikarsha Mandal, Fraunhofer FIT, Aachen, Germany 

Ewa Piatkowska, AIT Austrian Institute of Technology, Austria

Interview with a SAPPAN member for International Women’s Day

A new SAPPAN researcher Ili Ko is a member of the Research and Innovation Group at the Institute of Computer Science at Masaryk University in the Czech Republic. More specific, she is a member of the cybersecurity team. Her PhD research focused on using machine learning for cyber-attack mitigation, which makes her an excellent addition to our team.
To learn more about Ili Ko and some of her opinions, check out her interview for International Women’s Day 2021.

Joint Standardisation Workshop of Dynamic Countering of Cyber-Attacks Projects

The 22nd January 2021, a joint virtual workshop entitled Joint Standardisation Workshop of Dynamic Countering of Cyber-Attacks Projects organised by CyberSANE will take place.

This workshop will unite all projects funded under the SU-ICT-01-2018 H2020 call. The objective of this event is to permit the exchange of knowledge and the elaboration of future collaborative standardisation and dissemination activities. Click here to view the workshop agenda.

A total of seven projects will participate in this workshop:
Read more about each project on their respective website.   

Protecting organizations and people from phishing threats

The latest attack landscape study (Attack Landscape H1 2021) performed by F-Secure found an increase in spam and phishing emails. One factor contributing to the increase is the global pandemic, because some of the attacks are exploiting the fear and confusion in the public.
Thus, it is more relevant than ever to protect against these kinds of attacks.
Therefore, one of the key objectives in SAPPAN is to protect organizations and people from these phishing threats.

Generally, the idea is to build and test machine learning models that try to identify phishing URLS and public-key certificates used by known malicious parties.
To learn more specifics, visit the F-secure website.