. Military Space News .
CYBER WARS
Disrupting exploitable patterns in software to make systems safer
by Staff Writers
Washington DC (SPX) Sep 24, 2021

Program pushes secure system design by developing ways to stop cyber attackers' from executing unintended computations on critical systems

While much attention is paid to detecting and remedying flaws or vulnerabilities in software, the way a system is designed can also create large opportunities for attackers. System designers primarily focus on ensuring a program is adept at executing a specific task, focusing on how a design can best support intended features and behaviors and on how they will be implemented within the design.

Attackers have also discovered that these design structures and implementation behaviors can be repurposed for their own malicious purposes. Unexpected - or emergent - behaviors that these features could exhibit are not often taken into consideration at the time of design.

As a result, attackers often find that they can generate emergent behaviors by using what's already built into a system, providing a way to exploit flaws that are several layers down. In other words, systems are unknowingly being designed in ways that support adversarial programmability and combinations of features and unprotected abstractions. These amount to embedded exploit execution engines - creating what is colloquially known as "weird machines."

"When it comes to exploits, the common thinking is that there is a flaw in the program and then there is a crafted input that can trigger the flaw resulting in the program doing something it shouldn't like crashing or granting privileges to an attacker," said Sergey Bratus, a program manager in DARPA's Information Innovation Office (I2O).

"Today, the reality is somewhat different as those existing flaws aren't immediately exposed, so an attacker needs help getting to them. This help is unwittingly provided by the system's own features and design. Attackers are able to make use of these features and force them to operate in ways they were never intended to."

This challenge becomes increasingly problematic when observing a class of systems that rely on similar features. When an attacker discovers an exploit on one system, this can give a big hint on how to find similar exploits for other systems that have been developed independently by different vendors but make use of similar mechanisms. This creates persistent exploitable patterns that can be used across a whole host of programs.

The Hardening Development Toolchains Against Emergent Execution Engines (HARDEN) program seeks to give developers a way to understand emergent behaviors and thereby create opportunity to choose abstractions and implementations that limit an attacker's ability to reuse them for malicious purposes, thus stopping the unintentional creation of weird machines.

HARDEN will explore novel theories and approaches and develop practical tools to anticipate, isolate, and mitigate emergent behaviors in computing systems throughout the entire software development lifecycle (SDLC).

Notably, the program aims to create mitigation approaches that go well beyond patching. At present, patches tend to only address a particular exploit and do not disrupt the underlying exploit execution engine residing at the design-level.

HARDEN will also focus on validating the generated approaches by applying broad theories and generic tools to concrete technological use cases of general-purpose integrated software systems. Potential evaluation systems include the Unified Extended Firmware Interface (UEFI) architecture and boot-time chain of trust, as well as integrated software systems from the Air Force and Navy domains, such as pilots' tablets.

"There are many ways to theorize about addressing these challenges, but the test of the theory is how it will apply to an actual integrated system that we base trust on, or want to base trust on. We want to ensure we're creating models that will be of actual use to critical defense systems," noted Bratus.

Interested proposers have an opportunity to learn more about the HARDEN program during a Proposers Day on September 30, 2021, from 12:00 p.m. to 4:30 p.m. ET. The session will be held via Zoom and virtual check-in begins at 11:00 a.m. ET. Advance registration is required to attend. Learn more here.


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
A 15-user quantum secure direct communication network
Beijing, China (SPX) Sep 24, 2021
Quantum communication has presented a revolutionary step in secure communication due to its high security of the quantum information, and many communication protocols have been proposed, such as the quantum secure direct communication (QSDC) protocol. QSDC based on entanglement can directly transmit confidential information. Any attack of QSDC results to only random number, and cannot obtain any useful information from it. Therefore, QSDC has simple communication steps and reduces potential securi ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Anger as US progressives object to Israeli Iron Dome funding

Missile defense booster test may pave way for 'shoot-assess-shoot' capability

SPY-7 Hybrid Defense program with Japan completes additional capability tests

Northrop Grumman supports test flight for Missile Defense Agency

CYBER WARS
South Korea: new kid on the SLBM block

South Korea fires first submarine-launched ballistic missile

South Korea fires first submarine-launched ballistic missile

Marines advancing anti-ship missile as part of force modernization plan

CYBER WARS
AFRL, Defense Innovation Unit Launch new phase Of Golden Horde Vanguard Program

Boeing's MQ-25 T1 drone refuels F-35 in third mid-air replenishment

'Armed drone' attack on Arbil airport, Iraq

US Navy sets up Gulf drone task force amid Iran tensions

CYBER WARS
Notre Dame to lead $25 million SpectrumX project; first NSF Spectrum Innovation Initiative Center

SpiderOak wins second Air Force contract for secure space communications

Next generation electronic warfare and radar interoperability demonstrated at Northern Lightning

Northrop Grumman demonstrates connectivity for long range command and control

CYBER WARS
Pentagon asks employees to report cases of strange, sudden sickness

Defense Department establishes supply chain resiliency working group

Kazakh defence minister resigns after deadly depot blasts

12 dead after blasts at Kazakhstan arms depot

CYBER WARS
Submarine row is 'wake-up call' for Europe: EU ministers

How France was blindsided by the Australia-US sub deal

Australia says 'no need to prove' affection for France

Biden asks for early Macron talks as allies try to smooth tensions

CYBER WARS
U.S. Army finishes exercises in Turkey as part of Europe-focused drill

France wins EU backing in sub row with US

UN chief urges US-China dialogue, warns of divisions

Biden hails Australia alliance in meeting with Morrison

CYBER WARS
Striking Gold: A Pathway to Stable, High-Activity Catalysts from Gold Nanoclusters

Tracking the movement of a single nanoparticle

Researchers demonstrate technique for recycling nanowires in electronics

Custom-made MIT tool probes materials at the nanoscale









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.