Space Travel News
CYBER WARS
The key to securing legacy computing systems
Older ships were susceptible to sinking from a single shot at the water line. To resolve this problem, modern ships such as the one depicted are now equipped with compartments for added security. DARPA's Compartmentalization and Privilege Management program aims to apply this concept to legacy software.
The key to securing legacy computing systems
by Staff Writers
Washington DC (SPX) Apr 11, 2023

DARPA wants to overhaul legacy software to stop cyber-attackers in their tracks when they penetrate a system.

For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds' development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Early sailing ships were similarly vulnerable because they were built without watertight compartments and a single leak had the potential to compromise the entire vessel. Eventually, watertight compartment technology became the norm in ship building, preventing a single leak from spreading throughout the ship. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system's speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages.

Through its new Compartmentalization and Privilege Management (CPM) program, the agency is seeking proposals to develop tools that can automatically restructure a software system into many small "compartments," each with a specific function and operating with the least privilege necessary to achieve its goals. Systems running software with least privilege compartments would be much more resistant to cyber attackers.

"Legacy systems over their lifetimes tend to become more unstructured and consequently less compartmentalized," said Dr. Howard Shrobe, DARPA's CPM program manager in the Information Innovation Office. "Our goal is to transform existing systems into resilient ones that prevent most cyber-attack campaigns from succeeding even if an adversary gains a foothold."

Shrobe explained that while there is growing commercial interest in compartmentalization, fine-grained compartmentalization has been limited in application to non-critical, low volume systems due to the high cost and risk of introducing novel technologies to large-scale, high-volume systems.

"Successful CPM research will demonstrate the analysis and enforcement technologies necessary for compartmentalization of large-scale systems with high confidence and low development effort," said Shrobe. "This work should create sufficient confidence for commercial entities to make the investments necessary for large-scale adoption."

Though CPM will focus on securing the vulnerable legacy code base, resulting solutions should also apply to new software.

CPM is a four-year program with two phases. Phase 1 will focus on technology development, specifically using the Linux operating system as the test and evaluation suite. Phase 2 will focus on demonstrating scalable capabilities on open-source systems representative of classes of computation important to the Department of Defense.

A Broad Agency Announcement solicitation with all program details and instructions for submitting proposals is available on SAM.gov here

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Australian finance company refuses hackers' ransom demand
Sydney (AFP) April 11, 2023
Australian firm Latitude Financial said Tuesday it refused to pay a ransom to hackers who stole millions of records in one of the country's biggest data heists. The consumer lending company, which offers loans and credit cards, said last month that hackers had stolen the personal records of around 14 million Australian and New Zealand customers. Latitude Financial said it had recently received a ransom threat from the group behind the cyber attack, which it was ignoring in line with government ... read more

CYBER WARS
CYBER WARS
Scoping out the next sampling stop for Perseverance

New interactive mosaic uses NASA imagery to show Mars in vivid detail

Ready for Software Upgrade Sols 3786-3788

MOXIE Celebrates 2 Years on Mars: Discoveries and Work Left To Do

CYBER WARS
NASA's first flight with crew critical to long-term return to the moon

First woman, Black astronaut, Canadian to make 2024 flight around Moon

NASA to reveal crew for 2024 flight around the Moon

U.S. Navy pilot to become first person of color to go to the moon

CYBER WARS
Europe's Jupiter probe launched

Spotlight on Ganymede, Juice's primary target

Search for alien life extends to Jupiter's icy moons

Europe's JUICE mission to launch for Jupiter's icy moons

CYBER WARS
Do Earth-like exoplanets have magnetic fields

New paper investigates exoplanet climates

JWST confirms giant planet atmospheres vary widely

Planet hunting and the origins of life

CYBER WARS
Musk's Twitter marks BBC, NPR as 'government funded' but not Tesla or SpaceX

Purdue offering new online Hypersonics Graduate Certificate

NASA's TEMPO spacecraft hitched a ride with Intelsat's 40e satellite on a SpaceX rocket

Privately built, liquid-fuel rocket first in world to reach orbit in debut flight

CYBER WARS
China's inland space launch site advances commercial services

China's Shenzhou XV astronauts complete 3rd spacewalk

China's Shenzhou-15 astronauts to return in June

China's space technology institute sees launches of 400 spacecraft

CYBER WARS
Psyche updated plan puts mission on track for October launch

Two meteorites are providing a detailed look into outer space

NASA prepares for historic asteroid sample delivery on Sept 24

Large asteroid to zoom between Earth and Moon

Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.