Military Space News
CYBER WARS
The key to securing legacy computing systems
Older ships were susceptible to sinking from a single shot at the water line. To resolve this problem, modern ships such as the one depicted are now equipped with compartments for added security. DARPA's Compartmentalization and Privilege Management program aims to apply this concept to legacy software.
The key to securing legacy computing systems
by Staff Writers
Washington DC (SPX) Apr 11, 2023

DARPA wants to overhaul legacy software to stop cyber-attackers in their tracks when they penetrate a system.

For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds' development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Early sailing ships were similarly vulnerable because they were built without watertight compartments and a single leak had the potential to compromise the entire vessel. Eventually, watertight compartment technology became the norm in ship building, preventing a single leak from spreading throughout the ship. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system's speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages.

Through its new Compartmentalization and Privilege Management (CPM) program, the agency is seeking proposals to develop tools that can automatically restructure a software system into many small "compartments," each with a specific function and operating with the least privilege necessary to achieve its goals. Systems running software with least privilege compartments would be much more resistant to cyber attackers.

"Legacy systems over their lifetimes tend to become more unstructured and consequently less compartmentalized," said Dr. Howard Shrobe, DARPA's CPM program manager in the Information Innovation Office. "Our goal is to transform existing systems into resilient ones that prevent most cyber-attack campaigns from succeeding even if an adversary gains a foothold."

Shrobe explained that while there is growing commercial interest in compartmentalization, fine-grained compartmentalization has been limited in application to non-critical, low volume systems due to the high cost and risk of introducing novel technologies to large-scale, high-volume systems.

"Successful CPM research will demonstrate the analysis and enforcement technologies necessary for compartmentalization of large-scale systems with high confidence and low development effort," said Shrobe. "This work should create sufficient confidence for commercial entities to make the investments necessary for large-scale adoption."

Though CPM will focus on securing the vulnerable legacy code base, resulting solutions should also apply to new software.

CPM is a four-year program with two phases. Phase 1 will focus on technology development, specifically using the Linux operating system as the test and evaluation suite. Phase 2 will focus on demonstrating scalable capabilities on open-source systems representative of classes of computation important to the Department of Defense.

A Broad Agency Announcement solicitation with all program details and instructions for submitting proposals is available on SAM.gov here

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Australian finance company refuses hackers' ransom demand
Sydney (AFP) April 11, 2023
Australian firm Latitude Financial said Tuesday it refused to pay a ransom to hackers who stole millions of records in one of the country's biggest data heists. The consumer lending company, which offers loans and credit cards, said last month that hackers had stolen the personal records of around 14 million Australian and New Zealand customers. Latitude Financial said it had recently received a ransom threat from the group behind the cyber attack, which it was ignoring in line with government ... read more

CYBER WARS
Raytheon to provide Patriot air defense system to Switzerland

Aegis Combat System intercepts target during flight test

Ukraine forces complete Patriot training in US: Pentagon

PAC-3 flight test paves the way for new Patriot software release

CYBER WARS
Raytheon Technologies selected by US Navy for anti-ship strike weapon

Partnering and integration speeds delivery of a hypersonic missile

Russia says fired anti-ship missiles at mock target in Sea of Japan

Lockheed Martin Developing Long Range Maneuverable Fires Missile For US Army

CYBER WARS
Turkey unveils its first drone carrier

New algorithm keeps drones from colliding in midair

US Army selects Northrop Grumman and Shield AI team for tactical UAV prototype

Airbus achieves in-flight autonomous guidance and control of a drone from a tanker aircraft

CYBER WARS
AFRL conducts first flight experiments for communications in terahertz band

Spire Global awarded National Reconnaissance Office contract for radio frequency data

Northrop Grumman demonstrates platform agnostic in-flight connectivity for USAF

Silvus Technologies unveils Spectrum Dominance

CYBER WARS
Boeing signs joint weapons development deal with South Korea

Xi says China must strengthen training for 'actual combat'

Kyiv orders 100 armoured vehicles from Poland: PM

Rheinmetall to open maintenance hub for Ukraine weapons

CYBER WARS
Serbia leader denies country sent weapons to Ukraine

Northrop Grumman expands space technology capabilities in Huntsville

Polish PM blasts 'short-sighted' European opening to China after Macron visit

Japan changes rules to allow aid to foreign militaries

CYBER WARS
'Brazil is back!' Lula says during state visit to China

US should stop 'encouraging' war in Ukraine, says Brazil's Lula

Orban backs Macron over China remarks as EU allies exasperated

France a 'reliable' US ally but needs to engage China: minister

CYBER WARS
Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.