{"id":3047,"date":"2023-05-12T11:34:07","date_gmt":"2023-05-12T09:34:07","guid":{"rendered":"https:\/\/www.cyberagentur.de\/projects\/robust-and-secure-machine-learning-for-security-and-defence-relevant-systems-rsml\/"},"modified":"2026-04-28T11:07:41","modified_gmt":"2026-04-28T09:07:41","slug":"rsml","status":"publish","type":"project","link":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/","title":{"rendered":"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML)"},"content":{"rendered":"  <ol class='ce-item-info property-list property-list--small'>\n    <li class='property'>\n    <span class='property__name'>Status:<\/span>\n    <span class='property__value'>Project phase<\/span>\n<\/li>\n  <\/ol>\n<h3 class=\"wp-block-heading has-text-align-left\">Background<\/h3>\n\n<p>Neural artificial intelligence mechanisms (e.g. deep learning) are increasingly being used in applications by internal and external security organizations, for example in the context of drone-based reconnaissance, detection of disinformation and tactical situational awareness applications. At the same time, there is increasing knowledge of specific vulnerabilities that occur specifically in machine learning (ML) and in addition to classic IT vulnerabilities (e.g. &#8220;poisoned&#8221; data, forced misclassification, indirect command execution in large language models, targeted extraction of training data). In the status quo, there are no guarantees that AI-specific attack vectors cannot also be exploited in the context of high-security AI applications.<\/p>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Aim<\/h3>\n\n<p>The aim of the project is to research and support the development of highly resilient, robust and demonstrably safe ML components in safety-relevant environments. In the context of the AI applications under consideration, the model and system behavior in terms of desired outputs (predictions, recommendations, actions) must move within defined limits even under adverse and potentially hostile conditions (e.g. poor visibility, no connectivity). Participating research consortia can develop their robustness and security approaches for a broad spectrum of potential ML applications relevant to the requirements of internal and external security.<\/p>\n\n<p>Thematically, the program is divided into the following main research areas:<\/p>\n\n<ul class=\"wp-block-list\">\n<li>Verification over the entire life cycle<\/li>\n\n\n\n<li>Automated data quality assurance<\/li>\n\n\n\n<li>Hybrid models from neural and symbolic AI systems<\/li>\n\n\n\n<li>Formal verification of ML models<\/li>\n\n\n\n<li>Secure system embedding<\/li>\n<\/ul>\n\n<h3 class=\"wp-block-heading has-text-align-left\">Disruptive Risk Research<\/h3>\n\n<p>According to the current state of research, behavioral proofs for ML models and systems, including desirable safety and robustness properties, are not or only insufficiently realized at the formal level. In order to counter all threats and attack vectors in the future &#8211; including previously unknown ones &#8211; fundamental contributions to the creation and improvement of ML security and robustness as an inherent quality dimension must be made in the long term, in addition to AI risk management measures and adversarial training. A verifiably secure AI system thus creates the basic prerequisites for use in a high-security and defense context. In the status quo, however, it is uncertain whether and to what extent the aims &#8211; i.e. approaches to solving fundamental security problems of ML models &#8211; can be achieved at all.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background Neural artificial intelligence mechanisms (e.g. deep learning) are increasingly being used in applications by internal and external security organizations, for example in the context of drone-based reconnaissance, detection of disinformation and tactical situational awareness applications. At the same time, there is increasing knowledge of specific vulnerabilities that occur specifically in machine learning (ML) and [&hellip;]<\/p>\n","protected":false},"featured_media":2958,"template":"","class_list":["post-3047","project","type-project","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"Background Neural artificial intelligence mechanisms (e.g. deep learning) are increasingly being used in applications by internal and external security organizations, for example in the context of drone-based reconnaissance, detection of disinformation and tactical situational awareness applications. At the same time, there is increasing knowledge of specific vulnerabilities that occur specifically in machine learning (ML) and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T09:07:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/RSML.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2304\" \/>\n\t<meta property=\"og:image:height\" content=\"1792\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/\",\"name\":\"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/RSML.jpg\",\"datePublished\":\"2023-05-12T09:34:07+00:00\",\"dateModified\":\"2026-04-28T09:07:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/RSML.jpg\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/RSML.jpg\",\"width\":2304,\"height\":1792,\"caption\":\"RSML\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/programs\\\/rsml\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/","og_locale":"en_GB","og_type":"article","og_title":"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur","og_description":"Background Neural artificial intelligence mechanisms (e.g. deep learning) are increasingly being used in applications by internal and external security organizations, for example in the context of drone-based reconnaissance, detection of disinformation and tactical situational awareness applications. At the same time, there is increasing knowledge of specific vulnerabilities that occur specifically in machine learning (ML) and [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/","og_site_name":"Cyberagentur","article_modified_time":"2026-04-28T09:07:41+00:00","og_image":[{"width":2304,"height":1792,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2024\/08\/RSML.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/","url":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/","name":"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML) - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2024\/08\/RSML.jpg","datePublished":"2023-05-12T09:34:07+00:00","dateModified":"2026-04-28T09:07:41+00:00","breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/#primaryimage","url":"\/wp-content\/uploads\/2024\/08\/RSML.jpg","contentUrl":"\/wp-content\/uploads\/2024\/08\/RSML.jpg","width":2304,"height":1792,"caption":"RSML"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/programs\/rsml\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"Robust and Secure Machine Learning for Security and Defense-Relevant Systems (RSML)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/project"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3047\/revisions"}],"predecessor-version":[{"id":6521,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/programme\/3047\/revisions\/6521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/2958"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=3047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}