《CYD:2022年度校园网络安全防御报告(英文版)(75页).pdf》由会员分享,可在线阅读,更多相关《CYD:2022年度校园网络安全防御报告(英文版)(75页).pdf(75页珍藏版)》请在三个皮匠报告上搜索。
1、Cyber-Defence CampusAnnual Report 2022Table of Contents1 About the Cyber-Defence Campus 4 Research8 Demonstrators112192 Highlights9 Technologie Monitoring5 Customer and Portfolio Analysis11 Laboratory Infrastructures12 Events13 Presentations15 Communication14 Scientific Papers16 Outlook 202334334047
2、53565739501.1 Strategy Embedding and Key Tasks1.2 Partners1.3 People4.1 Projects in Cyber Security4.2 Projects in Data Science6.1 Innovation Projects Results6.2 Cyber Startup Challenge14.1 Publications14.2 Student WorksMPRINTPublisher:Cyber-Defence Campus,armasuisse,Feuerwerkerstrasse 39,CH-3602 Thu
3、n Contact:+41 58 480 59 34,cydcampusarmasuisse.ch Image reference:Where not stated differently:Source DDPS/DDPS,Pixabay,Adobe Stock6 Innovation7 Security Analysis,Penetration Testing and Security Consulting65673 CYD Talent Development1610 International Scouting and Cooperation48This annual report pr
4、ovides information about the public,unclassified activities of the CYD Campus in 2022.I hope you will enjoy reading it.Thun,31.January 2023Dr Vincent LendersDirector of the Cyber-Defence CampusThe year 2022 was a special year both in terms of security policy and technology.At the beginning of the ye
5、ar,Russia launched a military attack on Ukraine.The cyber incidents associated with the invasion highlight that the use of cyber means to support military action has become the norm.As a result of increasing international interconnectedness and interdependence,cyber attacks are likely to have cross-
6、border effects and can thus also pose a threat to Swiss facilities.According to the 2022 supplementary report to the Security Policy Report 2021,direct cyber attacks against targets in Switzerland can be expected in an escalating situation.ForewordTwo months after the invasion of Ukraine,the Swiss A
7、rmed Forces presented the General Concept Cyber.This concept shows how the Armed Forces should further develop their capabilities in the cyber domain.The Armed Forces must be able to protect themselves and actively ward off threats.The implementation of the strategy will take place gradually with th
8、e development of a cyber command in 2024 and will last until the 2030s.In December,the Federal Council decided to establish a new Federal Office for Cyber Security within the DDPS.The planned Federal Office is to provide a national reporting and point of contact for cyber attacks,disseminate informa
9、tion and warnings and raise awareness among the population for protection against attacks from the network and also protect the federal administration from cyber attacks.Cyber-Defence CampusiAnnual Report 20222022 was also a groundbreaking year for developments in the field of artificial intelligenc
10、e.The company OpenAI unveiled two AI-based systems,DALL-E 2 and ChatGPT,which are able to automatically generate images respectively texts of such high quality that they approximate human abilities.The impact for cyber defence,the CYD Campus and society in general is significant.As Federal Councillo
11、r Viola Amherd pointed out at the REAIM 2023 conference in The Hague,the use of artificial intelligence in defence can offer many opportunities,but at the same time risks and ethical aspects must be taken into account.A lot happened at the CYD Campus in 2022.Looking back,we have made significant pro
12、gress in the fourth year since the CYD Campus was founded.For example,the number of partner organisations working with the CYD Campus has increased to more than 60.I am particularly pleased that we were able to expand the number of study places.In 2022,13 students from Swiss universities had the opp
13、ortunity to conduct their research as CYD Fellows and another 39 students completed a university internship or a masters thesis as part of the talent development programme at the CYD Campus.We managed to effectively network and significantly strengthen the Swiss cyber community thanks to our events
14、such as the CYD Campus Conference in Bern,the Cyber Alp Retreat in Sachseln,the conducted hackathons,the Cyber Startup Challenge and Jam Sessions.We also succeeded in intensifying international cooperation,for example by sending one of our cyber experts to the NATO Cooperative Cyber Defence Centre o
15、f Excellence(CCDCOE)in Tallinn,Estonia,for a three-year period.In November,the new premises of the CYD Campus at Zollstrasse 62 in Zurich were inaugurated together with ETH Zurich and our industrial partners,offering us significantly more space for the joint implementation of projects and events wit
16、h our partners.In 2022 alone,over 50 projects were conducted across locations and over 30 scientific papers were published.A highlight,for example,was the establishment of a national testbed for network security,which links the three CYD Campus locations(Thun,Lausanne and Zurich)via ETH Zurichs inno
17、vative SCION technology.These encouraging developments contribute to our mission:improving cyber defence in Switzerland.As part of the APCD and the Cyber DDPS Strategy,the Cyber Defence(CYD)Campus has been developed and operated in the DDPS for four years.It is located at the Federal Office for Defe
18、nce Procurement(armasuisse).The CYD Campus offers the DDPS an anticipation and knowledge platform for identifying and assessing technological,economic and social cyber trends.In order to be able to cooperate as closely as possible with the universities,the DDPS and industry,the CYD Campus is represe
19、nted at three locations:at the main location in Thun(armasuisse Science and Technology),at the Innovation Park at the EPFL in Lausanne and,since this year,at Zollstrasse 62 in Zurich.This allows it to efficiently build up know-how and provide cyber expertise according to the needs of the Swiss Confe
20、deration.The new location in Zurich in particular allows the CYD Campus to create an ideal environment for collaboration and to provide room for new talents thanks to its larger premises.Due to the changing ecosystem and the increasing threat of cyber attacks in all spheres of life,the Swiss governm
21、ent has made cyber security a central and national security concern.The Federal Department of Defence,Civil Protection and Sport(DDPS)is increasing the allocation of resources to cyber defence and making it a strategic and operational priority.For this reason,the first Action Plan for Cyber Defence(
22、APCD)was created in 2016.In view of the rapid further development of the cyber threat situation over the past five years,a new Cyber DDPS Strategy has been elaborated for the period 20212024,building on the Action Plan.Both the Action Plan and the new Strategy Cyber DDPS are aligned with the overarc
23、hing National Strategy for the Protection of Switzerland against Cyber Risks(NCS).Early identification of trends in the cyber sector:This includes comprehensive technology and market monitoring,international scouting of startups and the fostering of a collaboration network.Research and innovation of
24、 cyber technologies:Through collaboration with academia and industry,emerging cyber risks are identified and innovative solutions are developed to effectively counter threats in the cyber space.In addition,the CYD Campus aims to ensure and enhance the security and resilience of existing cyber system
25、s.The aim of this annual report is to provide insights into the realisation of the above-mentioned tasks in 2022 of the Cyber-Defence Campus.In doing so,a brief summary of some highlights of 2022 will be provided.Public activities in research projects,customer mandates and demonstrators will also be
26、 discussed.Furthermore,activities in 2022 related to the expansion of laboratory infrastructures are addressed and technology and market monitoring activities are described.The final chapters of this report provide an overview of events,publications,presentations and an outlook for 2023.Training of
27、cyber specialists:At the CYD Campus,talents at Master,PhD and postdoc level as well as university interns are trained for future challenges.In addition,CYD Campus experts define and supervise numerous student projects.Strategy Cyber DDPS 2021-2024Core competencies of the Cyber-Defence Campus1 About
28、the Cyber-Defence CampusCyber-Defence Campus1.1 Strategy Embedding and Key TasksConsequently,the CYD Campus acts as a nexus between industry,government administration and academia.In the orientation of the Cyber DDPS Strategy,the head of the DDPS,Federal Councillor Viola Amherd,defines the fields of
29、 action and the corresponding distribution of tasks.Today,the CYD Campus has the following three key tasks:Annual Report 202211.2 PartnersThe CYD Campus is organizationally located at armasuisse Science and Technology(DDPS).About 60 other national and international organisations from academia,indust
30、ry and the public sector contribute as partners.1.2 About CYD Campus-Partners Cyber-Defence CampusPublic Partners/FederationHigher EducationIndustrial PartnersNationalSwiss Armed ForcesBern University of Applied Sciences(BFH)AdnovumFederal Department of Foreign Affairs(FDFA)cole polytechnique fdrale
31、 deLausanne(EPFL),AnapayaFederal Office of Civil Aviation(FOCA)Center for Digital Trust(C4DT)AstrocastFederal Intelligence Service(FIS)Eidgenssische Technische HochschuleZrich(ETHZ)Brunner Elektronik AGFederal Office of Police(fedpol)Northwestern Switzerland University ofApplied Sciences and ArtsCYS
32、ECNational Cyber Security Center(NCSC)Haute cole du Paysage,dIngnierie etdArchitecture de Genve(HEPIA)DecentriqFederal Statistical Office(FSO)HES-SO Valais-WallisFLARM TechnologySwisstopoLucerne University of Applied Sciencesand Arts(HSLU)IBM ResearchSwissnexSchool of Engineering and ManagementVaud(
33、HEIG-VD)Kudelski SecurityMilitary Academy at ETH ZurichNoser EngineeringEastern Switzerland University ofApplied Sciences(OST)RUAGScuola universitaria professionale dellaSvizzera italiana(SUPSI)SwisscomUniversity of FribourgTune InsightUniversity of GenevaUniversity of LausanneUniversity of Neuchtel
34、University of St.GallenUniversity of ZurichZurich University of Applied Sciences(ZHAW)Zurich Information Security and PrivacyCenter(ZISC)InternationalFederal Office for InformationSecurity(BSI),DEKU Leuven,BELCountercraftEuropean Defence Agency EDATU Kaiserslautern,DECybExer TechnologiesKRITISIMDEA,
35、ESPONEKEYLuxembourg Armed ForcesUniversity of LuxembourgPlug and PlayNATO CCDCOEUniversidad de Murcia,ESPSero SystemsUS Department of DefenseUniversidad Rey Juan Carlos,ESPUniversity of Oxford,UKUniversity of Southern California(USC),USANortheastern University,USAList of all the Partners of the Cybe
36、r-Defence Campus in 2022Annual Report 202221.3 PeopleThe direction of the CYD Campus consists of employees of the department Cyber Security and Data Science of armasuisse S+T.CYD Campus DirectionGiorgio TresoldiHead of International Relations and ScoutingDr Alain MermoudHead of Technology and Market
37、 MonitoringDr Colin BarschelHead of Innovation and Industry CollaborationsDr Grme Bovet Head of Research Programme and Data Science GroupDr Vincent LendersDirector of the CYD Campus and Head of DepartmentStefan EngelHead of Business Development and Deputy Director of the CYD Campus1.3 About CYD Camp
38、us-People Dr Bernhard TellenbachHead of Cyberspace Research Programme and Cyber Security GroupCyber-Defence CampusAnnual Report 20223Dr Martin Strohmeier is an expert in the security of cyber-physical systems and scientific project managerPersonnel Focus Cyber SecurityDamian Pfammatter is a penteste
39、r,vulnerability researcher and scientific project managerDaniel Hulliger is a pentester,vulnerability researcher and technical project managerDr Daniel Moser is an expert in wireless communication security,a pentester and a scientific project managerLloren Roma is a pentester and scientific project
40、managerDr Roland Meier is an expert in network security and scientific project manager(joined in November 2022)Dr Miguel Keer is a scientific project managerDr Carlo Matteotti is a cryptologist and supervises students and CYD Fellows as a CYD mentorWilliam Lacube is responsible for the collaboration
41、 with the NATO CCDCOE in Estonia and is a scientific project manager1 ber den CYD Campus-Personen Jahresbericht 20221.3 About CYD Campus-PeopleCyber-Defence Campus4Personnel Focus Data ScienceDr Etienne Voutaz is a data scientist and a scientific project managerDr Ljiljana Dolamic is an expert in Na
42、tural Language Processing and a scientific project managerDr Albert Blarer is a data scientist and a scientific project managerDr Jonas Liechti is a Big Data specialist and a scientific project manager(joined in August 2022)Dr Raphael Meier is an expert in Image Processing and Machine Learning and a
43、 scientific project managerDr Hng-n Sandlin is an expert in Data Analysis and Machine Learning and a scientific project managerIvo Stragiotti is responsible for laboratory infrastructures and is a technical project manager Dr Metin Feridun is a Big Data specialist and a scientific project manager(re
44、tired in October 2022)Cyber-Defence Campus1 ber den CYD Campus-Personen 1.3 About CYD Campus-PeopleAnnual Report 20225SupportMonia KhelifiHead of Administration and Event ManagementAmina BouslamiCYD Campus Lausanne Administrator(from June 2022)1.3 About CYD Campus-PeopleCyber-Defence CampusSarah Fre
45、iCommunication and Administrator CYD Campus Zurich(from April 2022)Annual Report 20227University InternsIn order to increase students cyber expertise and strengthen Switzerlands long-term resilience to cyber threats,the Cyber-Defence Campus offers university internships at all three locations in Thu
46、n,Lausanne and Zurich.In 2022,27 students were able to complete an internship with the Cyber-Defence Campus.The interns come from different universities.Cyber-Defence Campus1 ber den CYD Campus-Personen1.3 About CYD Campus-PeoplePerceval Faramaz,November 22 October 23,International Affairs,LausanneF
47、rancesco Intoci,October 22 March 23,Cyber Security,LausanneLouis Leclair,October 22 March 23,Cyber Security,LausanneAlessandro Tavazzi,September 22 February 23,Technology Monitoring,LausanneEric Jedermann,September 22 February 23,Cyber Security,Thun Lucas Crijns,September 22 February 23,Cyber Securi
48、ty,LausanneEtienne Salimbeni,September 22 February 23,Data Science,LausanneMarc Egli,September 22 February 23,Cyber Security,LausanneNicholas Sperry Grandhomme,August 22 Januar 23,Data Science,LausanneLo Meynent,August 22 January 23,Data Science,LausanneMichiel Lchinger,August 22 July 23,Communicati
49、on and International Affairs,ThunValentin Mulder,May 22 April 2023,Technology Monitoring,LausanneSarah Ismail,May 22 April 2023,Technology Monitoring,LausanneAnnual Report 20228Cyber-Defence Campus1 ber den CYD Campus-Personen1.3 About CYD Campus-PeopleJohannes Willbold,March 22 August 22,Cyber Secu
50、rity,ThunBeatrice DallOmo,March 22 August 22,Cyber Security,ThunGuillaume Follonier,March 22 August 22,Data Science,Lausanne Franois Burguet,March 22 August 22,Technology Monitoring,LausanneJacques Roitel,February 22 July 22,Technology Monitoring,LausanneCyrill Vallez,February 22 Juli 22,Data Scienc
51、e,LausanneAlexander Glavackij,February 22 December 22,Technology Monitoring,LausanneEloi Garandel,September 21 February 22,Data Science,LausanneBenjamin Killian,September 21 February 22,Cyber Security,LausanneSamad Emrys Durussel,September 21 February 22,Data Science,LausanneHuzar Marin,September 21
52、 February 22,Cyber Security,LausanneMarie Reignier Tayar,August 21 January 22,Data Science,LausanneMichael Tsesmelis,June 21 May 22,Technology Monitoring,LausanneSarah Frei,April 21-March 22,Communication,ThunAnnual Report 20229Jodok Vieli,Master Thesis Fellow,ETHZ,October 22 March 23,Project title:
53、Systemization of DNS DoS:Attack Characterization,Mitigation,and Measurement,CYD Mentor:Dr Bernhard TellenbachDr Lucianna Kiffer,Postdoc Fellow,Northeastern University,September 22 August 24,Project title:Security and Usability of Blockchain Networks,CYD Mentor:Dr Bernhard TellenbachLouis-Henri Merin
54、o,Doctoral Fellow,EPFL,June 2022 May 24,Project title:Coercion-Resistant Remote E-Voting Systems with Everlasting Privacy,CYD Mentor:Dr Bernhard TellenbachAlessandro Stolfo,Doctoral Fellow,ETHZ,January 22 December 25,Project title:Privacy-Preserving Learning of Neural Language Models,CYD Mentor:Dr L
55、jiljana DolamicIan Boschung,CYD Master Thesis Fellow,ETHZ,January 22 November 22,Project title:Analysing new security guarantees made possible by the ARMv9 Confidential Compute Architecture,CYD Mentor:Dr Bernhard TellenbachAdalsteinn Jonsson,Master Thesis Fellow,ETHZ,December 21 June 22,Project titl
56、e:Binary Similarity Techniques for Malware Detection,CYD Mentor:Dr Martin StrohmeierLina Gehri,Master Thesis Fellow,ETHZ,November 21-April 22,Project title:Analyzing and Comparing Defense Strategies in a Cyber Defense Exercise,CYD Mentor:Dr Vincent LendersCYD FellowsIn 2020,the CYD Campus launched a
57、 Cyber Defence(CYD)Fellowship Programme together with the EPFL to give students the opportunity to deepen their knowledge in cyber defence topics and to strengthen Switzerlands competences in this field.This enables students to make a research contribution to Switzerlands cyber defence while they ar
58、e still studying.The CYD Fellowship is a competitive talent programme that provides students with a CYD expert to supervise their research work.CYD Fellows are enrolled at a Swiss university and conduct their research on the premises of the CYD Campus at the EPFL Innovation Park in Lausanne,at Zolls
59、trasse in Zurich or at the headquarters in Thun.CYD Fellowships are awarded several times a year to masters students,doctoral students and postdocs and provide a living allowance.In 2022,13 fellows were active:Jan Urech,Master Thesis Fellow,ETHZ,October 21-April 22,Project title:Developing an Automa
60、ted Defender for Cyber Security Exercises,CYD Mentor:Daniel HulligerSimran Tinani,PhD Fellow,UZH,September 21-August 23,Project title:Nonabelian Groups in Cryptography,CYD Mentor:Dr Carlo Matteotti Ksandros Apostoli,Master Thesis Fellow,EPFL,September 21-February 22,Project title:Privacy-Preserving
61、Proof-of-Personhood Token,CYD Mentor:Dr Daniel MoserDr Andrei Kucharavy,Postdoc Fellow,EPFL,December 20-November 22,Project title:Evolutionary dynamics for improved GAN detection,CYD Mentorin:Dr Ljiljana DolamicDina Mahmoud,PhD Fellow,EPFL,September 20-August 24,Project title:ADHeS:Attacks and Defen
62、ses on FPGA-CPU Heterogeneous systems,CYD Mentor:Dr Vincent LendersDr Dimitri Percia David,Postdoc Fellow,UNIGE,August 20-July 22,Project title:Technology Forecasting and Market Monitoring for Cyber-Defence,CYD Mentor:Dr Alain Mermoud1 ber den CYD Campus-Personen Cyber-Defence Campus1 ber den CYD Ca
63、mpus-Personen 1.3 About CYD Campus-PeopleAnnual Report 202210StudentsLukas Baege,ETHZ,October 22 April 23,Supervisor:Dr Martin StrohmeierPascal Schrli,ETHZ,October 22 March 23,Supervisor:Dr Bernhard TellenbachSilvan Niederer,ETHZ,September 22 January 23,Supervisor:Lloren RomaPedro Miguel Sanchez San
64、chez,Universidad de Murcia,September 22 December 22,Supervisor:Dr Grme BovetEnrique Tomas Martinez Beltran,Universidad de Murcia,September 22 December 22,Supervisor:Dr Grme BovetYago Lizarribar,IMDEA Networks Institute,June 22 September 22,Supervisor:Dr Grme BovetMathis Lindner,ETHZ,February 22 Augu
65、st 22,Supervisor:Dr Martin StrohmeierSbastien Gillard,Universit de Fribourg,21 23,Supervisor:Dr Alain MermoudDominique Portenier,ETHZ,September 21 February 22,Supervisor:Dr Daniel MoserSilvio Geel,ETHZ,September 21 February 22,Supervisor:Dr Daniel MoserMarco di Nardo,ETHZ,September 21 February 22,Su
66、pervisor:Dr Daniel MoserFlorian Lerch,ETHZ,September 21 January 22,Supervisor:Dr Martin StrohmeierCYD Campus employees define and supervise student projects at Bachelor,Master and PhD level.The students conduct their projects on the premises of the CYD Campus at EPFL,ETHZ and at the headquaters in T
67、hun.During 2022,work from twelve students was supervised by the CYD Campus.Cyber-Defence Campus1 ber den CYD Campus-Personen 1.3 About CYD Campus-PeopleMembers of the Armed ForcesConstable Michael Bosshard(name changed),August 22-October 22,Data Science,ThunOther members of the armed forces doing th
68、eir army service at Lab 42,an innovation unit of Cyber Batallion 42,used the premises of the CYD Campus in 2022.Annual Report 202211BrokenwireCYD Campus associate Martin Strohmeier,together with research partners from Oxford University,has discovered a vulnerability called Brokenwire in the combined
69、 charging system(CCS)of electric vehicles.CCS is one of the most widely used Direct Current(DC)rapid charging technologies for electric vehicles.The attack interrupts necessary control communication between the vehicle and charger,so that the charging processes are interrupted.The attack can be cond
70、ucted wirelessly from a distance using electromagnetic interfe-rence,allowing individual vehicles or entire fleets to be disrupted simultane-ously.In addition,the attack can be mounted with off-the-shelf radio hardware and minimal technical knowledge.ICS Hackathon in ThunFrom 19 to 23 September,the
71、CYD Campus and the Cyber Battalion 42 organised a hackathon on industrial control systems(ICS)and operational technologies(OT).Among the more than 30 participants were researchers from the CYD Campus and the Swiss Armed Forces,employees of the NCSC and Swissgrid,soldiers from Cyber Battalion 42,stud
72、ents from the Lucerne University of Applied Sciences and Arts,ETH Zurich and Ruhr University Bochum,as well as experts from the private sector,such as ALSEC Cyber Security Consulting and Nozomi Networks.The participants were divided into cross-functional teams with different areas of focus in the fi
73、eld of industrial control systems.This allowed the groups to conduct targeted vulnerability analysis,examine different attack vectors and develop appropriate countermeasures.Additionally,this facilitated collaborative and intensive work in smaller groups.Vulnerability tests for ICS systems are diffi
74、cult to implement compared to information systems,as severe damage can be caused.However,in order to be able to carry them out and simulate attacks,as well as for educational and training purposes,appropriate laboratories are particularly suitable.Therefore,the CYD Campus provided two labs for the i
75、nfrastructure of the hackathon,each simulating a different industrial control system.One is the representation of a pumped storage power plant.The second is a reconstruction of a Swiss energy substation for the development of attack and defence strategies,the so-called Krinflab.With the hackathon,th
76、e CYD Campus pursued three goals:to expand the knowledge available in the DDPS within this relevant field,to network experts from industry,universities and the public administration,and to support young talents who want to deepen their expertise in the area.For more information:CYD Campus Hackathon
77、NewsDemonstration of Brokenwire.2 HighlightsCyber-Defence CampusThe researchers demonstrated the attack in a controlled laboratory and then against seven vehicles from different manufacturers and 18 DC high-power chargers.They also conducted a disclosure to industry and proposed various countermeasu
78、res that could be used to limit the impact.Brokenwire has immediate implications for many of the estimated 12 million battery powered electric vehicles on the road worldwide as well as profound implications for the new wave of electrification of vehicle fleets,both for private companies and key publ
79、ic services.In addition,Brokenwire affects electric ships,aircraft and heavy goods vehicles.For more information:Brokenwire website&publicationModel of a pumped storage power plant:CYD Campus ICS laboratory in Thun.Krinflab:Reconstruction of a Swiss energy substation for the development of attack an
80、d defence strategies.Annual Report 202212Trends in Data Protection and Encryption Technologies 2025Militaries and governments have long used encryption technologies to facilitate secret communications.Today,encryption technologies are equally crucial in protecting our economy and civil society.They
81、are key enablers for the ongoing transformation of the digital economy and online society.The study launched in Switzerland by the Cyber-Defence Campus at the beginning of 2022 provides an overview of the changing landscape of encryption and data protection technologies and their global usage trends
82、.The Swiss government mandated the CYD Campus to identify the 38 most crucial encryption and data protection technologies,intending to analyse their anticipated developments until 2025 and derive the implications for the military,civil society,and business sectors.Around fifty experts from academia,
83、the Swiss government,and industry contributed to the study.They included numerous researchers,interns and CYD Fellows from the CYD campus.This study is a reference for organisations and individuals who have to develop coherent and efficient data protection and encryption strategies in the coming yea
84、rs.The technologies are divided into five categories:Inauguration of New CYD Campus Premises in ZurichAnother highlight of the CYD Campus in 2022 was the inauguration of the new premises at Zollstrasse 62 in Zurich.The official reopening of the CYD Campus Zurich on 24 November also celebrated the la
85、unch of SCION.SCION is a novel Internet architecture developed at ETH Zurich ten years ago and made marketable in the last five years by ETH spin-off Anapaya Systems.The technology replaces the insecure internet routing protocol with a more secure and efficient protocol.The DDPS is interested in usi
86、ng this technology for Swiss cyber defence and is testing this technology at the CYD Campus together with Swiss industrial partners.For this purpose,the three CYD Campus locations in Thun,Lausanne and Zurich were equipped with SCION network connections from the companies Swisscom,Sunrise and SWITCH
87、and made available for three years as a national test infrastructure for the armed forces and security authorities.2 Highlights Cyber-Defence CampusInauguration of new CYD Campus premises in Zurich.Alain Mermoud and Valentin Mulder present the study at the CYD Campus Conference.1.Encryption foundati
88、ons technologies are used to create other encryption applications;2.Low-level applications:Focus on basic functionalities;3.High-level applications:Focus on more complex functionalities;4.Data protection technologies:Data protection without encryption;5.Use cases:Concrete ways how technologies can b
89、e used together to create a solution that works.The study was presented at the CYD Campus Conference 2022 and will be published in book form in summer 2023.Annual Report 202213Cyber Startup Challenge 2022The Cyber Startup Challenge was launched in June 2022 for the third year in a row.Within this ch
90、allenge,36 startups from various countries presented their innovative technologies in the field of network detection and security of IoT devices.After evaluation by cyber experts from the Federal Department of Defence,Civil Protection and Sport(DDPS),the three finalists ONEKEY,Narrowin and Sepio wer
91、e eventually invited to the CYD Campus Conference.Each of the finalists was allowed to give a pitch at the Conference,where the startup ONEKEY was ultimately able to convince the DDPS jury.ONEKEY has developed a technology that automatically identifies security vulnerabilities.Using the Software Bil
92、l of Materials(SBOM)and automatically generated Digital Twins,ONEKEY checks operational software for critical security vulnerabilities and compliance infringements.On the one hand,the SBOM provides a detailed overview of all components of a software package.On the other hand,a Digital Twin is a virt
93、ual image of a system and allows its examination in the lab without the source code,the network or physical access to the devices.For more Information:Finalists 2022&Press Release Cyber Startup ChallengeCyber-Defence Campus ConferenceA central task of the CYD Campus is the networking of academia,ind
94、ustry and state actors in the field of cyber defence.For this purpose,the CYD Campus regularly organises events on defence and security-related cyber topics.An important annual event is the CYD Campus Conference,which attracts more than 300 participants.The CYD Campus Conference 2022 took place on 2
95、6 October in the Kursaal in Bern.During the event,experts from public administra-tion,academia and industry spoke on key topics in the area of securing future digital infrastructures.In addition to presentations on developments in the area of communication networks(5G+),the global financial system,t
96、he dissemination of(dis)information and cryptography,the series of talks was rounded off with an insight into the conception and implementation of realistic cyber defence trai-ning such as Locked Shields.2 Highlights Cyber-Defence CampusPanel discussion Study Data Protection and Encryption Technolog
97、ies 2025.Colin Barschel,Head of Innovation CYD Campus and Florian Lukavsky,Co-Founder and CTO of ONEKEY.Annual Report 202214The CCDCOE organised the Locked Shields Cyber Defence exercise in April 2022,which has been held annually since 2010.One of the ways in which the CYD Campus directly participat
98、es in the organisation of the exercise is by sending experts to the Green and Red Teams.These two teams are responsible for the organisation and implementation of the exercise and are composed of experts from all participating states.The Swiss Armed Forces regularly participate with their own Blue T
99、eam or together with other countries to train their experts in cyber defence.During the exercise,the Red Teams operate as attackers against the Blue Teams,which perform as cyber rapid reaction teams defending the national IT systems and critical infrastructures of the fictitious island state of Bery
100、lia against large-scale cyber attacks.In total,more than 2000 participants from 32 nations took part in the event.In addition to protecting numerous complex cyber-physical systems,the teams formed from member states and partners are required to make strategic and tactical decisions,report incidents
101、and deal with challenges in the areas of forensics,law,media relations and information warfare.The aim of the exercise was to improve participants skills and knowledge in the field of cyber defence and to promote cooperation between the different nations and organisations.Due to the numerous attacks
102、 and the complexity of the exercise,Locked Shields is also an ideal environment to test cyber defence products.Chapter 6.1 Innovation project results elaborates on the cooperation between the Cyber-Defence Campus and industry in this context.Representation of Switzerland at the NATO CCDCOECYD Campus
103、 associate William Blonay took up his position as Switzerlands representative at the NATO Cooperative Cyber Defence Centre of Excellence(CCDCOE)in Tallinn,Estonia,in February 2022 and will serve for three years.The CCDCOE is a NATO accredited cyber centre of excellence that aims to strengthen resear
104、ch and training cooperation in the field of cyber defence internationally.The centre achieves this by organising joint exercises and conducting research projects,technical training and conferences.The flagships of the CCDCOE include the annual international conference on cyber conflicts(CyCon),the T
105、allinn Manual and Locked Shields,one of the worlds largest cyber defence exercises(more information in the next highlight),in which William Blonay also participated in the Red and Green Team in 2022.Since joining as a Contributing Nation in 2019,Switzerland has benefited from the exchange of informa
106、tion and knowledge as well as from the various joint research and training activities of the CCDCOE.This cooperation also contributes to the implementation of the National Strategy for the Protection of Switzerland against Cyber Risks(NCS)and the Cyber DDPS Strategy 20212024.Against the backdrop of
107、the changed global political situation,Switzerland is particularly keen to consolidate international cooperation,particularly in the area of defence.Each CCDCOE member state sends one or two experts as representatives to Tallinn.These experts are active in various areas of competence such as technol
108、ogy,strategy,operations,support,education and training,and law.Switzerland is currently represented at the CCDCOE by two delegates:In addition to William Blonay,who belongs to the technology competence area,Lisa Schauss,a member of the Armed Forces Command Support Organisation(FUB)and part of the ed
109、ucation and training competence area,represents Switzerland at the CCDCOE.To learn more about Williams experience at the CCDCOE,read the interview in the December 2022 issue of armafolio.2 Highlights Cyber-Defence CampusCyber Defence Exercise Locked ShieldsWilliam Blonay on his first day representin
110、g Switzerland at the CCDCOE.Part of the exercise Locked Shields im April 2022.Annual Report 202215Cyber security is a hot topic.As we have seen on the news,multiple data breaches have occurred in recent years.This triggered my curiosity and ignited the desire to learn more about the field of cyber s
111、ecurity.I am also fascinated by the world of research and would like to develop my skills in this field.Cyber-Defence CampusJahresbericht 20223 CYD Talent DevelopmentSpecialists in cyber security and data science are scarce in Switzerland as well as in many other countries.The promotion and training
112、 of new cyber talents is therefore a major challenge and one of the three key tasks of the CYD Campus.The CYD Campus pursues different approaches in order to enhance students cyber expertise.On the one hand,the CYD Campus offers university internships at all three locations in Thun,Lausanne and Zric
113、h.In addition,student projects at Bachelor,Master and PhD level are defined and supervised by CYD Campus researchers.These students are enrolled at a university and are supervised by a CYD Campus Mentor.In addition,the CYD Campus,together with EPFL,laun-ched the CYD Fellowship programme in 2020 to m
114、otivate students and provide them with the opportunity to strengthen their skills in the field of cyber defence.In 2022,27 university interns were employed and twelve student projects were supervised by CYD Campus researchers.Furthermore,13 CYD Fellows were active.The aim is to promote a new generat
115、ion of cyber-talents in this way.Thus,the CYD Campus makes a substantial contribution to combating the shortage of skilled workers in the highly specialised cyber field with the long-term goal of ensuring the necessary cyber skills for government,academia and business in Switzerland.Since 2022,parti
116、cipants in the Cyber Training Course also have the opportunity to complete their internship at the Cyber-Defence Campus.The Cyber Training Course was first launched as a pilot project during the 2018 recruit school(RS)and aims to strengthen the cyber defence skills of the Swiss Armed Forces militia.
117、The course is aimed at EFZ IT specialists,school-leavers and university students.In 2022,the first recruit of the Cyber Training Course had the opportunity to complete an internship at the CYD Campus.To gain more insight into the activities of the CYD Fellows,the university interns and the members o
118、f the armed forces(AdA),interviews were conducted for this annual report.Interview with Sarah Ismail,University intern in Lausanne in the field of Technology MonitoringWhat is the research topic you have been working on during your time at CYD Campus?How have the CYD Campuss knowledge and resources
119、helped you in your research?On the one hand,I learned new technical skills,such as programming in a programming language I had not previously mastered.On the other hand,I was able to work with highly specialised and competent people in their field.This made it easier to learn and share knowledge.Fin
120、ally,the CYD Campus provides many tools to help you conduct your research in a pleasant and suitable environment.If you could give one piece of general advice to future interns for their time at the CYD Campus,what would it be?What was your motivation for doing an internship at the Cyber-Defence Cam
121、pus?My research focuses on data protection and encryption technologies.The goal is to predict current trends in these technologies based on public attention via Wikipedia page views.Using data from other sources such as arXiv,Google Trends and OpenAlex,this study determines,measures and analyses the
122、 time-varying public attention given to each technology.I would say that you should not hesitate to communicate with your colleagues and ask them questions,it reinforces collaboration,the exchange of ideas and above all it promotes creativity.Where do you see yourself in 10 years?Ideally,in ten year
123、s time,I would have gained solid professional experience as a business analyst,possibly in the field of cyber security,and I would also like a position with responsibility where I can work on a variety of projects.Cyber-Defence CampusAnnual Report 202216Cyber-Defence CampusJahresbericht 2022Intervie
124、w with Luca Crijns,University intern in Lausanne in the field of Cyber SecurityWhat is the research topic you have been working on during your time at CYD Campus?How have the CYD Campuss knowledge and resources helped you in your research?In addition to my supervisor,I have a technical supervisor wh
125、o is able to help me when I have technical issues with the hardware and software.He has proven invaluable when I have issues or want to talk something through.If you could give one piece of general advice to future interns for their time at the CYD Campus,what would it be?What was your motivation fo
126、r doing an internship at the Cyber-Defence Campus?My motivation was to learn something new.I come from a mathematics background and I previously had no experience with networking whatsoever.Thats why I chose this internship to expand my knowledge and horizons.I wasnt sure if I could see myself worki
127、ng in a field that is closely related to mathematics.I am working on a network filter that is able to extract flows from network traffic with speeds of 100 Gbps based on configurable rules.Filtering by IP addresses and ports is very common and can be done by many hardware solutions.However,deep pack
128、et inspection and filtering based on packet payload are mostly done using software.I tested several hardware solutions combined with appropriate software to do exactly that.For me it proved useful to send out a weekly update on the project at the end of the week.By doing this,you automatically ensur
129、e that you have made progress at the end of every week.In addition to that,remember that your supervisor is there to help and you can usually drop in for a chat if you are stuck.Theres no point staring at the screen for long periods of time wondering what to do.Where do you see yourself in 10 years?
130、Honestly,I havent a clue.As I like the work I do at the CYD Campus,I probably want to do something similar.Its a bit of a simple answer,but at this point I cant provide any more details.3 CYD Talent Development Cyber-Defence CampusInterview with Sergeant Michael Bosshard(Cyber Training Course,name c
131、hanged)What was the research topic you worked on during your time at CYD Campus?How did the CYD Campuss knowledge and resources help you in your research?The CYD Campus was able to provide me with a solid environment where on the one hand I was given enough support to pursue my research goals,and on
132、 the other hand also offered scientific challenges.If you could give one piece of general advice to future interns for their time at the CYD Campus,what would it be?What was your motivation for doing an internship at the Cyber-Defence Campus?My main motivation for my internship was to use my data sc
133、ience skills in order to make an impact in the world of cyber security and asset protection.Coming from a purely scientific background(mathematics),I found it very interesting to apply and develop my knowledge through on use cases.During my time at CYD Campus I worked mostly on Deep Learning Methods
134、 on Graphs.Deep Learning Methods on Graphs is a relatively young field of research which is growing fast.In particular,I studied classification tasks using conventional convolutions as well as more modern methods such as EdgePooling and Variational Graph Autoencoders.The end goal was to streamline g
135、raph-level tasks that would take much more time using static methods.The main piece of advice I would give is that its worth getting to know the environment and the surroundings of the CYD Campus as there are many facilities and structures to support you during your research.Where do you see yoursel
136、f in 10 years?In 10 years time,I hope to have developed into a more experienced data scientist and be able to draw on to a wide variety of different methods and approaches.I cannot tell if I will be working in the public or the private sector,but I am confident that the tasks I will take on will sti
137、ll be challenging and motivating.Annual Report 202217Cyber-Defence CampusJahresbericht 2022Cyber-Defence CampusInterview with Lina Gehri,Master Thesis CYD Fellow in ZurichWhat was the research topic you worked on during your time at CYD Campus?The biggest advantage was that I received a lot of suppo
138、rt from different people at the CYD Campus.If I had a question or needed some assistance,their combined experience and knowledge helped me a lot and many new ideas came up during discussions about my thesis.If you could give one piece of general advice to future CYD fellows for their time at the CYD
139、 Campus,what would it be?What was your motivation for doing a fellowship at the Cyber-Defence Campus?I had already decided to do my master thesis in collaboration with the CYD when my supervisor told me about the fellowships and encouraged me to apply.It seemed like a great opportunity to get to kno
140、w and work with like-minded people,so I decided to give it a shotI created machine-learning models to detect Command and Control attacks.My goal was to generalise the models in such a way that they are able to detect Command and Control traffic in various and unfamiliar network environments.To train
141、 and test them,I used network traffic that was captured during the extensive cyber defence exercise Locked Shields.Make use of the opportunity,go to the office to talk to the people there about what you are doing,whether its about your thesis or your latest interests.Where do you see yourself in 10
142、yearsHopefully still learning new things and still excited about the work I do.If you want specifics,ask me again in 9 and a half years.3 CYD Talent Development Annual Report 2022How did the CYD Campuss knowledge and resources help you in your research?184 ResearchMobile devices(smartphones)are esse
143、ntial for efficient work,yet their mobility and connectivity offer many opportunities for attack.The protection of confidential and classified information is therefore particularly difficult.The aim is to use a commercially available mobile device to share sensitive information and applications.This
144、 device allows information to be exchanged,whether in a call,a message or via an app,up to the level of confidential.The main challenge is to find the best architecture for a secure mobile operating system that balances security,feasibility and user friendliness.Secure Mobile Operating SystemsSmartp
145、hones are at the heart of many peoples digital lives.However,they do not offer the same flexibility as PCs,on which users can install and run any software they like.The vendors of the major operating systems such as iOS and Android can dictate which apps can run,how they run and which phone resource
146、s they can access.This is not desirable,as users have to entrust their security and privacy to OS vendors and accept the functionality restrictions they impose.Given the widespread use of Android and iOS,immediately leaving these ecosystems is not a practical solution.As an alternative,the developme
147、nt of a new smartphone architecture is proposed that gives control back to the users while ensuring compatibility with current smartphone ecosystems.Such a design is proposed and analysed on the basis of advances in trusted execution environments for ARM and RISC-V.4.1 Cyber Security ProjectsSoverei
148、gn Smartphone Architecture Two approaches are pursued to protect sensitive data:The first approach involves compartmentalisation of risks.This means that the area of attack on the system is nested to minimise the impact of an attack.To achieve this,two architectures for a secure mobile operating sys
149、tem were developed,along with a risk analysis.The cyber security not only includes the mobile operating system,but also the hardware,cryptographic components,and boot chain hardening(signatures).The second approach seeks to separate the execution of an application from the operating system and the m
150、anufacturer to ensure sovereignty over the application and to increase security.Research at the CYD Campus is a long-term investment in securing the required expert knowledge and scientific-technical skills for the tasks and activities of the Confederation in the field of cyber defence.As an integra
151、l part of technology management,it also forms the basis for a solid roadmapping of future technologies and for innovation projects of the DDPS.It therefore contributes both to the development of operational cyber defence capabilities that will be required in the future,as well as to the scientific-t
152、echnical support of planning and procurement in the DDPS.Research projects are implemented in collaboration with universities and industrial partners.Cyber-Defence CampusAnnual Report 202219Detection of Software and Device Vulnerabilities:Microsoft Windows ApplicationsNowadays,the Linux kernel is th
153、e basis for various operating systems,which in turn are used on a variety of devices(desktop PCs,server systems,mobile or small electronic devices,etc.).A viable approach to identifying potential security problems in the Linux kernel is to use a so-called kernel fuzzer,which is designed to detect po
154、ssible abnormal behaviour in the kernel based on unanticipated input.Probably the best known of these fuzzers for the Linux kernel is syzkaller.For the current kernel version,a public instance of syzkaller lists more than 1000 such types of abnormal behaviour,but it is unclear whether they are actua
155、lly exploitable,i.e.whether they are genuine vulnerabilities.This research project is working on an automated procedure to assess this exploitability.This is essential in order to be able to classify the criticality of identified instances of abnormal behaviour and to be able to address them in a pr
156、ioritised manner.Detection of Software and Device Vulnerabilities:Linux KernelVulnerability research in the area of Windows-based systems and applications aims to uncover any unknown security gaps.By focusing on software that is used by stakeholders(organisations within the DDPS,but also the rest of
157、 the Federal Administration),a directly measurable benefit for the IT security of the Federal Administration is created in addition to the research activity.Besides the development of competencies for detecting and exploiting vulnerabilities,several security gaps,some of which were critical,have bee
158、n discovered in the past year and communicated to the stakeholders in the form of advisories.Affected vendors were informed about the vulnerabilities in detail and encouraged to fix them as quickly as possible by providing fully functional proof-of-concept exploits.Detection of Software and Device V
159、ulnerabilities:IoT DevicesNowadays,connected devices,often referred to as the Internet of Things(IoT),are omnipresent,yet their applications are often critical with respect to security.Therefore,detecting potential vulnerabilities in such devices is crucial,but often challenging.One particular issue
160、 is that an analyst typically does not have access to the source code of the programs running on the device,which consequently exist only as machine-executable binary code.In contrast to the source code,which is easier for humans to understand,many abstractions(e.g.function names)are no longer prese
161、nt in binary code,thus making analysis much more difficult.Moreover,the binary code depends on the processor architecture used,which often differs more for IoT devices(e.g.ARM,MIPS)than for conventional computers(often x86).In this research project,techniques for the(semi-)automated analysis of IoT
162、binaries are tested and their feasibility is demonstrated with corresponding proof-of-concept tools.4.1 Research-Cyber SecurityCyber-Defence CampusAnnual Report 202220Controllable Routing on the InternetTraditional Internet technologies do not provide end-users with transparency or control over the
163、path of data traffic to its destination.In particular,the lack of information about network devices reduces the trustworthiness of the forwarding path and prevents end-user appli-cations that require certain router functions from reaching their full potential.Furthermore,the loss of control results
164、in applications com-municating via undesirable routes,while alternative paths with more desirable properties remain unusable.Within this project,CYD Campus researchers developed a system that allows applications to flexibly forward traffic,potentially over multiple paths,according to user-defined pr
165、eference policies,with information about routers exposed and trans-parently attested by autonomous systems.The granularity of this infor-4 Forschung-Cyber Sicherheit Cyber-Defence CampusNetwork Programmability Recent advances in programmable network devices make it possible to run custom programs bo
166、th on the control and data level.In this project,we explore how these new possibilities can improve network security.In particular,we focus on network obfuscation,a technique to hide sensitive information that is not protected by traditional security measures such as encryption.In 2022,we focused on
广州视源电子科技股份有限公司2018年年度报告(248页).PDF
广州视源电子科技股份有限公司2020年年度报告(238页).PDF
杭州海康威视数字技术股份有限公司2017年年度报告(英文版)(234页).PDF
惠州亿纬锂能股份有限公司2019年年度报告(223页).PDF
广州视源电子科技股份有限公司2021年年度报告(255页).PDF
杭州海康威视数字技术股份有限公司2018年环境、社会及管治报告(英文版)(101页).PDF
立讯精密工业股份有限公司2017年年度报告(198页).PDF
广州视源电子科技股份有限公司2021年社会责任报告(英文版)(35页).PDF
杭州海康威视数字技术股份有限公司2018年年度报告(英文版)(275页).PDF
思科(Cisco):网络安全报告-防御关键威胁(英文版)(28页).pdf
Check Point Research:2022年网络安全报告(英文版)(75页).pdf
BlackBerry:2022年度网络安全威胁报告(英文版)(73页).pdf
欧盟网络安全局:2022年网络安全威胁形势报告(英文版)(150页).pdf
Dealroom:2022年英国网络安全报告(英文版)(35页).pdf
思科:2020年网络安全报告:20个网络安全建议(英文版)(25页).pdf
Gartner:2022年主要网络安全趋势报告(英文版)(25页).pdf
Infoblox:2022年全球网络安全态势报告(英文版)(16页).pdf
东芝(TOSHIBA):2022年网络安全报告(英文版)(43页).pdf
ISACA: 2022年网络安全状况报告(英文版)(41页).pdf
蜜雪冰城招股说明书-连锁茶饮第一股(724页).pdf
麦肯锡:2023中国消费者报告:韧性时代(33页).pdf
线上健身第一股-keep招股说明书(463页).pdf
罗振宇2023“时间的朋友”跨年演讲完整PDF.pdf
QuestMobile:2022新中产人群洞察报告(37页).pdf
小红书:2023年度生活趋势报告(34页).pdf
QuestMobile:2022年中国短视频直播电商发展洞察报告(30页).pdf
工业4.0俱乐部:ChatGPT认知白皮书(151页).pdf
町芒:2022现制茶饮行业研究报告(47页).pdf
哈尔滨工业大学:ChatGPT调研报告(94页).pdf