Research Projects

Project name Field Ordering party
Secure station for special purposes (BSDZS) The goal of the project was to develop a secure station for special purposes by integrating currently available virtualisation technologies (both hardware and software). Formal methods were used for ensuring and controlling the confidentiality and integrity of data processing. The methods used included cryptography for securing hard and removable drives (both at the secure system platform and virtual machine level) and user authentication measures. NCRD
Platform For Effective Password Decryption And Large Data Volume Decryption/Encryption Based On A Heterogeneous CPU/GPU Cluster (HP) The goal of the project was to develop the software and a demonstrator for effective password decryption and decrypting/encrypting large sets of data using the full computational power of a cluster comprising CPUs and programmable GPUs. Ministry of Science and Higher Education
Applications of biometrics and PKI in modern identity documents and protecting IT systems (BIOPKI) The main goal was the development of PKI and biometric techniques for applications in modern identity documents and information systems protection. National Centre for Research and Development
Secure Information Sharing Sensor Delivery Event Network (SISSDEN) The goal of the project is to develop the tools necessary to acquire, store, analyse and share large-scale data and correlate them with data from other sources – for this purpose, we partnered with ShadowServer, national CERTs, ISPs and other major external subjects. The heart of the project is a global sensor network designed and implemented by the participants. Our researchers developed innovative architecture for the global sensor network (212 sensors in 53 countries, which makes it possible to monitor a total of nearly 900 addresses), contributing to the creation of a UX-optimised database containing the largest number of carefully selected, information-rich data needed to identify malicious software and behaviours. This system architecture allows for long-term, thorough analyses (lasting months, even years, unlike regular short-term analyses) of selected threats, offering deeper insights into attacker infrastructure, long-term targeting and potential relations between incidents. European Commission
New Method Of Maintaining Mobile Ad Hoc Network Connectivity For Environmental Monitoring Purposes Controlling the nodes of a mobile ad hoc network for use in monitoring the environment in such crisis situations as earthquakes, uncontrollable heavy gas leaks or search and rescue missions after a hurricane.
Mobile application supporting field search and rescue missions (SmartGroup@NET) The purpose of the project was to develop a mobile application for smartphones, tablets etc. Its primary purpose is to facilitate search and rescue mission (taking place in forests and difficult to reach areas, for example) coordination and management. NASK
Handtherm Studying individual heat distribution data, determining the stability of the biometric modality of hand temperature, as well as implementing a method of biometric identification based on thermal imaging. NASK
Financial sector protection systems (BotSense) The purpose of the system is real-time detection of attempts at account hacking and unauthorised financial transactions caused by malicious software which tampers with the browsers of bank customers using electronic banking services. NASK product
National template for IT product and system security and privacy assessment and certification compliant with Common Criteria (KSO3C) The purpose of the project is the development of methods and techniques for evaluating security and privacy with a high level of certainty, based on an innovative approach to the assessment of vulnerabilities related to advanced attacks, both non-invasive threats such as side-channel attacks and reverse engineering, as well as such invasive threats as perturbation attacks. NCRD
Detecting Slow-Rate Application Layer Attacks (GANEF) A series of experiments confirming the effectiveness of a detection method with the use of virtualisation to increase the number of attackers and limit the scope of simulated attacks to the virtual environment. NASK

Select Pages