Medical and Hospital News
CYBER WARS
The key to securing legacy computing systems
Older ships were susceptible to sinking from a single shot at the water line. To resolve this problem, modern ships such as the one depicted are now equipped with compartments for added security. DARPA's Compartmentalization and Privilege Management program aims to apply this concept to legacy software.
The key to securing legacy computing systems
by Staff Writers
Washington DC (SPX) Apr 11, 2023

DARPA wants to overhaul legacy software to stop cyber-attackers in their tracks when they penetrate a system.

For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. The SolarWinds attack started by compromising the email account of a SolarWinds employee. This foothold was followed by other exploits to access SolarWinds' development environment and insert a backdoor into the SolarWinds product, ultimately compromising over 18,000 organizations.

Early sailing ships were similarly vulnerable because they were built without watertight compartments and a single leak had the potential to compromise the entire vessel. Eventually, watertight compartment technology became the norm in ship building, preventing a single leak from spreading throughout the ship. DARPA is pursuing an approach to cyber resilience that would subdivide software systems into smaller, secure compartments that prevent an initial attempt at penetration from becoming a successful attack.

With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system's speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages.

Through its new Compartmentalization and Privilege Management (CPM) program, the agency is seeking proposals to develop tools that can automatically restructure a software system into many small "compartments," each with a specific function and operating with the least privilege necessary to achieve its goals. Systems running software with least privilege compartments would be much more resistant to cyber attackers.

"Legacy systems over their lifetimes tend to become more unstructured and consequently less compartmentalized," said Dr. Howard Shrobe, DARPA's CPM program manager in the Information Innovation Office. "Our goal is to transform existing systems into resilient ones that prevent most cyber-attack campaigns from succeeding even if an adversary gains a foothold."

Shrobe explained that while there is growing commercial interest in compartmentalization, fine-grained compartmentalization has been limited in application to non-critical, low volume systems due to the high cost and risk of introducing novel technologies to large-scale, high-volume systems.

"Successful CPM research will demonstrate the analysis and enforcement technologies necessary for compartmentalization of large-scale systems with high confidence and low development effort," said Shrobe. "This work should create sufficient confidence for commercial entities to make the investments necessary for large-scale adoption."

Though CPM will focus on securing the vulnerable legacy code base, resulting solutions should also apply to new software.

CPM is a four-year program with two phases. Phase 1 will focus on technology development, specifically using the Linux operating system as the test and evaluation suite. Phase 2 will focus on demonstrating scalable capabilities on open-source systems representative of classes of computation important to the Department of Defense.

A Broad Agency Announcement solicitation with all program details and instructions for submitting proposals is available on SAM.gov here

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues

Subscribe Free To Our Daily Newsletters
Tweet

RELATED CONTENT
The following news reports may link to other Space Media Network websites.
CYBER WARS
Australian finance company refuses hackers' ransom demand
Sydney (AFP) April 11, 2023
Australian firm Latitude Financial said Tuesday it refused to pay a ransom to hackers who stole millions of records in one of the country's biggest data heists. The consumer lending company, which offers loans and credit cards, said last month that hackers had stolen the personal records of around 14 million Australian and New Zealand customers. Latitude Financial said it had recently received a ransom threat from the group behind the cyber attack, which it was ignoring in line with government ... read more

CYBER WARS
Biden to hold first meeting with Colombia's leftist president

UAE and China promise Pakistan $1.3 bln to get IMF deal on track

China official visits Nicaragua to launch housing initiative

Mutation risks due to residual radiation from Fukushima nuclear disaster

CYBER WARS
Telit Cinterion adds Dual-Band GNSS Positioning to AIROHA AG3335 Chipsets

Monogoto teams with Skylo and SODAQ to deliver NB-IoT satellite asset tracking

Quectel announces CC200A-LB satellite module for IoT

Topcon further expands MC-X Platform with all-new GNSS Option

CYBER WARS
What the Jetsons got right and wrong about the future of work

Composition of joint lubricant potential culprit behind osteoarthritis

Amazon Indigenous lands prevent disease, save billions: study

"Spatial computing" enables flexible working memory

CYBER WARS
Monkey business: Sri Lanka considers macaque sales to China

California bursts into 'super bloom' after wet winter

Poachers kill five elephants in Chad

India's tiger population rises above 3,000

CYBER WARS
First H3N8 bird flu death recorded in China

Why are animal-to-human diseases on the rise?

In Mexican jungle, scientists prepare for future pandemics

'We need to know': WHO says China has more on Covid origin

CYBER WARS
Brazil's Lula to meet Xi in Beijing after lashing out at US dollar, IMF

China jails two prominent human rights lawyers for over ten years

UN rights chief 'concerned' as China jails rights lawyers

Taiwan to work with US to counter China authoritarianism

CYBER WARS
People smugglers use TikTok to promote their services

Colombia's Petro accuses Gulf Clan cartel of breaking ceasefire

Ecuadoran soldier killed in clash with drug traffickers

US designates Russia's Wagner military group an intl 'criminal organization'

CYBER WARS
Subscribe Free To Our Daily Newsletters




The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.