Space Industry and Business News
CYBER WARS
The key to securing legacy computing systems
Older ships were susceptible to sinking from a single shot at the water line. To resolve this problem, modern ships such as the one depicted are now equipped with compartments for added security. DARPA's Compartmentalization and Privilege Management program aims to apply this concept to legacy software.
The key to securing legacy computing systems
by Staff Writers
Washington DC (SPX) Apr 11, 2023

DARPA wants to overhaul legacy software to stop cyber-attackers in their tracks when they penetrate a system.

For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds' development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Early sailing ships were similarly vulnerable because they were built without watertight compartments and a single leak had the potential to compromise the entire vessel. Eventually, watertight compartment technology became the norm in ship building, preventing a single leak from spreading throughout the ship. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system's speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages.

Through its new Compartmentalization and Privilege Management (CPM) program, the agency is seeking proposals to develop tools that can automatically restructure a software system into many small "compartments," each with a specific function and operating with the least privilege necessary to achieve its goals. Systems running software with least privilege compartments would be much more resistant to cyber attackers.

"Legacy systems over their lifetimes tend to become more unstructured and consequently less compartmentalized," said Dr. Howard Shrobe, DARPA's CPM program manager in the Information Innovation Office. "Our goal is to transform existing systems into resilient ones that prevent most cyber-attack campaigns from succeeding even if an adversary gains a foothold."

Shrobe explained that while there is growing commercial interest in compartmentalization, fine-grained compartmentalization has been limited in application to non-critical, low volume systems due to the high cost and risk of introducing novel technologies to large-scale, high-volume systems.

"Successful CPM research will demonstrate the analysis and enforcement technologies necessary for compartmentalization of large-scale systems with high confidence and low development effort," said Shrobe. "This work should create sufficient confidence for commercial entities to make the investments necessary for large-scale adoption."

Though CPM will focus on securing the vulnerable legacy code base, resulting solutions should also apply to new software.

CPM is a four-year program with two phases. Phase 1 will focus on technology development, specifically using the Linux operating system as the test and evaluation suite. Phase 2 will focus on demonstrating scalable capabilities on open-source systems representative of classes of computation important to the Department of Defense.

A Broad Agency Announcement solicitation with all program details and instructions for submitting proposals is available on SAM.gov here

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Australian finance company refuses hackers' ransom demand
Sydney (AFP) April 11, 2023
Australian firm Latitude Financial said Tuesday it refused to pay a ransom to hackers who stole millions of records in one of the country's biggest data heists. The consumer lending company, which offers loans and credit cards, said last month that hackers had stolen the personal records of around 14 million Australian and New Zealand customers. Latitude Financial said it had recently received a ransom threat from the group behind the cyber attack, which it was ignoring in line with government ... read more

CYBER WARS
SatixFy and Presto Engineering test rad-hard space-grade ASICs

Satixfy tests new antenna with OneWeb and Air Force Research Lab

Viasat real-time Earth antennas integrated on Microsoft Azure Orbital

LeoLabs and ClearSpace partner to advance a safer, more sustainable space environment

CYBER WARS
AFRL conducts first flight experiments for communications in terahertz band

Spire Global awarded National Reconnaissance Office contract for radio frequency data

Northrop Grumman demonstrates platform agnostic in-flight connectivity for USAF

Silvus Technologies unveils Spectrum Dominance

CYBER WARS
CYBER WARS
Telit Cinterion adds Dual-Band GNSS Positioning to AIROHA AG3335 Chipsets

Monogoto teams with Skylo and SODAQ to deliver NB-IoT satellite asset tracking

Quectel announces CC200A-LB satellite module for IoT

Topcon further expands MC-X Platform with all-new GNSS Option

CYBER WARS
F-16 electronic warfare suite counters RF threats during USAF testing

UK slams Etihad Airways ads over green claims

X-59 gets its tail in Quesst for super quiet super fast planes

Airbus says to sell 50 helicopters to Chinese firm

CYBER WARS
Researchers reveal stability origin of Dion-Jacobson 2D perovskites

DMI allows magnon-magnon coupling in hybrid perovskites

China calls for WTO review of US-led chip export restrictions

Chinese FM says Japanese chip curbs to drive Beijing's self-reliance

CYBER WARS
Metaspectral to bring SkyFi satellite imagery to its Fusion Platform

L3Harris to build geostationary weather satellite sensors for Japan

Sniff test: Japan declares war on hayfever woes

Scientists discover a way Earth's atmosphere cleans itself

CYBER WARS
'This week, no one': hazardous Thai pollution deters tourists

The hidden culprit behind nitrogen dioxide emissions

Thousands evacuated as fire rages at US plastics facility

US EPA moves to reduce exposure to carcinogenic sterilizer

Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.