Energy News
CYBER WARS
The key to securing legacy computing systems
Older ships were susceptible to sinking from a single shot at the water line. To resolve this problem, modern ships such as the one depicted are now equipped with compartments for added security. DARPA's Compartmentalization and Privilege Management program aims to apply this concept to legacy software.
The key to securing legacy computing systems
by Staff Writers
Washington DC (SPX) Apr 11, 2023
DARPA wants to overhaul legacy software to stop cyber-attackers in their tracks when they penetrate a system.

For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds' development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Early sailing ships were similarly vulnerable because they were built without watertight compartments and a single leak had the potential to compromise the entire vessel. Eventually, watertight compartment technology became the norm in ship building, preventing a single leak from spreading throughout the ship. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system's speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages.

Through its new Compartmentalization and Privilege Management (CPM) program, the agency is seeking proposals to develop tools that can automatically restructure a software system into many small "compartments," each with a specific function and operating with the least privilege necessary to achieve its goals. Systems running software with least privilege compartments would be much more resistant to cyber attackers.

"Legacy systems over their lifetimes tend to become more unstructured and consequently less compartmentalized," said Dr. Howard Shrobe, DARPA's CPM program manager in the Information Innovation Office. "Our goal is to transform existing systems into resilient ones that prevent most cyber-attack campaigns from succeeding even if an adversary gains a foothold."

Shrobe explained that while there is growing commercial interest in compartmentalization, fine-grained compartmentalization has been limited in application to non-critical, low volume systems due to the high cost and risk of introducing novel technologies to large-scale, high-volume systems.

"Successful CPM research will demonstrate the analysis and enforcement technologies necessary for compartmentalization of large-scale systems with high confidence and low development effort," said Shrobe. "This work should create sufficient confidence for commercial entities to make the investments necessary for large-scale adoption."

Though CPM will focus on securing the vulnerable legacy code base, resulting solutions should also apply to new software.

CPM is a four-year program with two phases. Phase 1 will focus on technology development, specifically using the Linux operating system as the test and evaluation suite. Phase 2 will focus on demonstrating scalable capabilities on open-source systems representative of classes of computation important to the Department of Defense.

A Broad Agency Announcement solicitation with all program details and instructions for submitting proposals is available on SAM.gov here

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Australian finance company refuses hackers' ransom demand
Sydney (AFP) April 11, 2023
Australian firm Latitude Financial said Tuesday it refused to pay a ransom to hackers who stole millions of records in one of the country's biggest data heists. The consumer lending company, which offers loans and credit cards, said last month that hackers had stolen the personal records of around 14 million Australian and New Zealand customers. Latitude Financial said it had recently received a ransom threat from the group behind the cyber attack, which it was ignoring in line with government ... read more

CYBER WARS
Dutch refinery to feed airlines' thirst for clean fuel

Low concentration CO2 can be reused as plastic precursor using artificial photosynthesis

Queensland biofuel refinery to turn agricultural by-products into sustainable aviation fuel

Turning vegetable oil industry waste into power

CYBER WARS
High-efficiency sustainable solar cells for IoT devices with AI-powered energy management

Migrating ions through the perovskite layer in two dimensions

KAUST team sets world record for tandem solar cell efficiency

Solar cells charging forward

CYBER WARS
Wind farms drive away certain seabirds: study

Wind project near S.African elephant park riles activists

UK offshore staff 'want public ownership of energy firms'

Machine learning could help kites and gliders to harvest wind energy

CYBER WARS
Cities will need more resilient electricity networks to cope with extreme weather

Sun, wind power make record 12% of world electricity: survey

Fossil fuel pledges divide G7 in 'critical decade' for climate

Only 5% of top UK firms have 'credible' net zero plans: study

CYBER WARS
Fish-inspired, self-charging electric battery may help power space applications

Tesla to build battery plant in Shanghai: state media

New 'smart layer' could enhance durability and efficiency of solid-state batteries

Underground water could be the solution to green heating and cooling

CYBER WARS
'This week, no one': hazardous Thai pollution deters tourists

The hidden culprit behind nitrogen dioxide emissions

Thousands evacuated as fire rages at US plastics facility

US EPA moves to reduce exposure to carcinogenic sterilizer

CYBER WARS
Targets for a heating planet: G7 climate commitments

Qatar gives China share of landmark natural gas field

Kazakhstan takes global majors to court over oilfield revenues: minister

How Japan's big plans for a 'hydrogen society' fell flat

CYBER WARS
Scoping out the next sampling stop for Perseverance

New interactive mosaic uses NASA imagery to show Mars in vivid detail

Ready for Software Upgrade Sols 3786-3788

MOXIE Celebrates 2 Years on Mars: Discoveries and Work Left To Do

Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2026 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.