R&D Department

R&D Department

R&D Department of Cryptomage is made of specialists from several fields of research:

  • Computer science
  • Mathematics
  • Telecommunications
  • Information security
  • Digital circuits

Many years of scientific research experience have helped us develop unique results-oriented methods of work. Hence, we are at the cutting edge of the industry and can effectively manage a team of scientists using modern methods of project management and the psychology of motivation. We gained experience during numerous research and development projects that led to successful implementations, as well as during internships and research visits at world’s best research centers, including Silicon Valley, California (USA).

We have ambitious research goals correlated with our customers’ needs. Finally, we can observe the results of our work under natural conditions, and not only in the laboratory.

Our offer includes new research contracts in our specialized fields and participating in interdisciplinary projects.

prof. phd eng Krzysztof Szczypiorski Chief Scientist

Napisali o nas w:

Research publications

Anomaly detection

Title:

Towards model-based anomaly detection in network communication protocols

Author:

Jędrzej Bieniasz, M.Sc., Piotr Sapiecha, M.Sc., Milosz Smolarczyk, M.Sc., prof. phd eng Krzysztof Szczypiorski

Date:

November 10 2016

Keywords:

Network Protocols, Protocol Model Inference, Model-based Verification and Validation, Model-based Testing, Anomaly Detection, Protocol Reverse Engineering

Link:

Description:

Over the last few years many techniques have been applied to find and mitigate vulnerabilities, misuses, cyber-attacks and other cyber-security flaws. One of the approaches, which we consider in this paper, is a model-based technique applied to network communication protocols. This idea is not brand new, and model-based techniques have been successfully used to verify and validate the standard models of communication protocols. However, the implementation of network protocols varies from one system to another, and in many cases they miss standards or recommendations. Attackers know these flaws very often and try to use them before everybody else finds them, what can be called “zero-day exploit of communication protocol.” To address this issue, a combination of the best features of model-based and anomaly detection techniques could be applied. (…)

Steganography in club music

Title:

StegIbiza: New Method for Information Hiding in Club Music

Author:

prof. phd eng Krzysztof Szczypiorski

Date:

August 10 2016

Keywords:

information hiding, audio steganography, musical steganography, club music, StegIbiza

Link:

Description:

In this paper a new method for information hiding in club music is introduced. The method called StegIbiza is based on using the music tempo as a carrier. The tempo is modulated by hidden messages with a 3-value coding scheme, which is an adoption of Morse code for StegIbiza. The evaluation of the system was performed for several music samples (with and without StegIbiza enabled) on a selected group of testers who had a music background. Finally, for the worst case scenario, none of them could identify any differences in the audio with a 1% margin of changed tempo.

Steganography in open social networks

Title:

StegHash: New Method for Information Hiding in Open Social Networks

Author:

prof. phd eng Krzysztof Szczypiorski

Date:

November 2 2016

Keywords:

Network Protocols, Protocol Model Inference, Model-based Verification and Validation, Model-based Testing, Anomaly Detection, Protocol Reverse Engineering

Link:

Description:

In this paper a new method for information hiding in open social networks is introduced. The method, called StegHash, is based on the use of hashtags in various open social networks to connect multimedia files (like images, movies, songs) with embedded hidden messages. The evaluation of the system was performed on two social media services (Twitter and Instagram) with a simple environment as a proof of concept. The experiments proved that the initial idea was correct, thus the proposed system could create a completely new area of threats in social networks.

Projects

The system for identification and monitoring of anomalies and risks in ICT networks

Project name:

The system for identification and monitoring of anomalies and risks in ICT networks

Beneficiary:

Cryptomage S.A.

Implementation period:

1.10.2016 - 30.09.2018

Financing:

Co-financed by European Union in the amount of EUR 1,044,534.63 from European Regional Development Fund, Operational Programme “Smart Growth”, sub-measure 1.1.1 “Industrial research and development work implemented by enterprises”.

Value:

EUR 1,407,526.46

Description:

We are developing a probe to detect cyberattacks on the basis of a totally different paradigm than the solutions currently used, which are designed to detect web anomalies. The existing solutions rely on pre-defined attack signatures. A new kind of attack has to have been discovered previously for the firewalls to be able to detect it. Our solution will allow the detection of cyberattacks, irrespective of the method used by the intruder.

Network anomaly detection platform

Project name:

Network anomaly detection platform

Beneficiary:

Cryptomage S.A.

Implementation period:

1.08.2017 - 31.07.2020

Financing:

Co-financed by the National Centre for Research and Development in the amount of EUR 1,004,397.57 from the CyberSecIdent - Cybersecurity and e-Identity programme.

Value:

EUR 1,218,265.77

Description:

The objective of the project is to create and develop a prototype version of an intelligent hardware and software solution for network attack of information leak detection. The solution utilizes a unique approach for network protocol observation from different perspectives. The solution will analyze internal network traffic focusing on network protocol behavior in real time. The system will be able to detect network steganography techniques and network attacks. An observation of network protocol behavior strictly depends on the point in which the observation is conducted thus the objective of the project is to observe a network traffic from multiple perspectives.

Cryptomage expansion

Project name:

Cryptomage

Beneficiary:

Cryptomage S.A.

Implementation period:

27.04.2018 - 31.12.2020

Financing:

Co-financed by European Union in the amount of EUR 369,152.13 from European Regional Development Fund, Operational Programme “Smart Growth”, sub-measure 1.3.1 “Aid for research and development projects in preseed phase”.

Value:

EUR 461,440.64

Description:

Cryptomage expansion by product development and commercialization.

Cryptomage brand development through export

Project name:

Cryptomage brand development through export

Beneficiary:

Cryptomage S.A.

Implementation period:

01.01.2017 - 31.12.2018

Financing:

Co-financed by European Union in the amount of EUR 57,160.28 from European Regional Development Fund, Operational Programme „Smarth Growth”, sub-measure 3.3.3 „Support for SMEs to promote product brands - Go to Brand”.

Value:

EUR 69,027.82

Description:

Participation in industry promotion programs to promote product brands that have a chance to become recognizable brands on foreign markets, and promotion of brand of the Polish Economy. The project consists of participation in prestigious international events as an exhibitor, organizing an individual economic mission and purchasing additional services.

Export expansion to new markets

Project name:

Export expansion to new markets, including CRM brand development

Beneficiary:

Cryptomage Services Sp. z o.o.

Implementation period:

01.06.2017 - 31.12.2018

Financing:

Co-financed by European Union in the amount of EUR 156,640.55 from European Regional Development Fund, Operational Programme „Smarth Growth”, sub-measure 3.3.3 „Support for SMEs to promote product brands - Go to Brand”.

Value:

EUR 156,640.55

Description:

Similar to previous one, the project consists of participation in prestigious international events as an exhibitor with different product, organizing an individual economic mission and purchasing additional services. It uses participation in industry promotion programs to promote product brands that have a chance to become recognizable brands on foreign markets, and promotion of brand of the Polish Economy.

ICS security solution

Project name:

ICS security solution

Beneficiary:

Cryptomage S.A.

Implementation period:

1.10.2019 - 30.09.2022

Financing:

Co-financed by European Union in the amount of EUR 1,072,193.52 from European Regional Development Fund, Operational Programme “Smart Growth”, sub-measure 1.1.1 “Industrial research and development work implemented by enterprises”.

Value:

EUR 1,415,884.27

Description:

The subject of the project is to create a system utilizing artificial intelligence methods to detect attacks on infrastructure using ICS industrial networks, critical infrastructure in particular. The system will be designed to monitor messages transmitted between individual elements in the industrial network, in particular control messages, to detect anomalies in occurring processes and rapid response in the event that anomalies are identified as a potential attack on the monitored infrastructure.

Cryptomage Cyber Eye brand development and export expansion

Project name:

Cryptomage Cyber Eye brand development and export expansion

Beneficiary:

Cryptomage S.A.

Implementation period:

1.08.2020 - 31.12.2021

Financing:

Project co-financed by the European Union in the amount of PLN 359,023.00 from European Regional Development Fund, Operational Programme „Smarth Growth”, sub-measure 3.3.3 „Support for SMEs to promote product brands - Go to Brand”.

Value:

422 380 zł

Description:

The aim of the project is to promote and expand the activities of the Cryptomage Cyber Eye brand on foreign markets, resulting in increased revenues from the sale of the product.

A Solution for Detection and Visualization of APT Attacks

Project name:

A Solution for Detection and Visualization of APT Attacks

Beneficiary:

Cryptomage S.A.

Implementation period:

1.03.2021 - 28.02.2024

Financing:

Co-financed by the National Centre for Research and Development in the amount of PLN 9,600,432 from the CyberSecIdent - Cybersecurity and e-Identity programme.

Value:

12 715 528 zł

Description:

The project will develop an innovative, integrated, analytical system to detect, prevent and respond to APT (Advanced Persistence Threat) attacks that may remain undetected for many months or years. Scientifically, the project will be based on applicants’ own concepts for mapping types of security events in relation to the APT model. Specifying algorithms for assigning security events to these phases will allow to effectively visualize the severity of the attack, to identify predicted, probable actions of criminals and will facilitate to identify actions necessary to stop the attack, according to the kill chain method.

An innovative SaaS service using the Gartner's Visibility Triad concept

Project name:

An innovative SaaS service using the Gartner visibility triad concept

Beneficiary:

Atende S.A., Cryptomage S.A.

Implementation period:

1.12.2022 - 31.12.2023

Financing:

The project is co-financed by the European Union for PLN 5,763,312.50. The subsidy comes from the European Regional Development Fund of the Smart Growth Operational Program, sub-measure 1.1.1, "Industrial research and development work carried out by enterprises."

Value:

8 600 625 zł

Description:

The project implemented by Atende and Cryptomage aims to develop a SaaS system that will integrate data from distributed security systems, automate incident investigation, and provide IT support thanks to intelligent threat assessment algorithms. The system will be built with natively interconnected EDR, NDR, and SIEM cybersecurity solutions, ensuring complete threat visibility across the entire IT environment. Thanks to the use of artificial intelligence and machine learning algorithms, the platform will allow for assessing and predicting events and ensuring appropriate responses. The integrated platform will offer a multi-layered and holistic approach to the security of computers, servers, and networks.

X