Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence

Subscribe to Updates

Get the latest National Security News directly to your inbox.

What's Hot

Ciolacu vrea o alianță pentru România în 2024 cu PNL. Care e motivul

January 28, 2023

Gavrilița va pleca la Bruxelles la reuniunea Comitetului de Asociere UE

January 28, 2023

Boțan: Noi înțelegem toate componentele acestui război propagandistic

January 28, 2023
Facebook Twitter Instagram
  • Privacy Policy
  • Terms and Conditions
  • Contact
Saturday, January 28
Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence
en English
en Englishet Estonianlv Latvianlt Lithuanianpl Polishro Romanianru Russianuk Ukrainian
Trending
  • Ciolacu vrea o alianță pentru România în 2024 cu PNL. Care e motivul
  • Gavrilița va pleca la Bruxelles la reuniunea Comitetului de Asociere UE
  • Boțan: Noi înțelegem toate componentele acestui război propagandistic
  • Gavrilița a discutat cu primarii din Nisporeni despre nivelul de trai
  • North Carolina Man Pleads Guilty to Bomb Threat Near the Library of Congress
  • Defendants from New Jersey and West Virginia Sentenced for Assaulting Officers During Jan. 6 Capitol Breach
  • What will it take to deter Iran from targeting opponents inside the US?
  • Dupu: Propaganda a încercat să ne divizeze că nu vorbim aceeași limbă
Subscribe
Facebook Twitter Instagram
Estonian Free PressEstonian Free Press
Home » DARPA Selects Teams to Protect Computers’ ‘Roots of Trust’ from Exploits

DARPA Selects Teams to Protect Computers’ ‘Roots of Trust’ from Exploits

October 15, 20223 Mins Read Cybersecurity
Share
Facebook Twitter LinkedIn Pinterest Email

Legend has it that John Quincy Adams, while serving in the U.S. House of Representatives, positioned his desk in the U.S. Capitol’s Statuary Hall so he could overhear the conversations of the opposition across the room. As the story goes, the curious acoustical “whispering gallery” produced by the hall’s ceiling design allowed Adams to exploit this effect, unintended but inherent in the architecture, by turning an integral feature of the building against his opponents.

Fast forward to modern times. Cyber attackers similarly hunt for exploits in computing systems via a phenomenon colloquially described as “weird machines.” Simply translated, the phrase means that a system’s own design and features can accidentally help an attacker operate the system in ways never intended. Unrelated, benign features across the system unwittingly add up to an unexpected or emergent execution engine that is ready to run attackers’ exploits.

For the Hardening Development Toolchains Against Emergent Execution Engines (HARDEN) program, DARPA selected teams to create practical tools that will prevent exploitation of integrated computing systems by disrupting the patterns of robust, reliable exploits used by attackers, and depriving the attackers of emergent execution engines.

“Weird machines can provide tremendous advantages to attackers who manage to discover and control emergent behaviors in their targets,” said Sergey Bratus, HARDEN program manager in DARPA’s Information Innovation Office. “HARDEN aims to deny these advantages, by combining ethical hackers’ growing understanding of how attackers turn parts of modern computing systems against the whole with the pioneering formal methods and automated software analysis developed with DARPA’s support. It stands to reason that ethical hackers and non-traditional performers play a key role in HARDEN.”

Attackers increasingly target the software that runs when computers boot up so they can dodge security protections before they are activated. These parts of computing systems provide the “root of trust” for the rest of the system – i.e. compromising these parts of a system destroys its trustworthiness. HARDEN will apply its combination of ethical hacker insights, mathematical models, and automation to secure the critical root-of-trust parts of systems.

The program will run for 48 months and is organized into three phases: Phases 1 and 2 will each be 18-months, followed by a 12-month Phase 3. Work performed by HARDEN teams will span several major technical areas, such as developing tools for software developers to account for emergent behaviors and creating models of emergent execution. Notably, several organizations selected for HARDEN are direct descendants of DARPA’s Cyber Fast Track program and Cyber Grand Challenge, both of which reached out to the ethical hacking community and helped diversify and grow their ranks. The selected performers include:

  • Arizona State University
  • Galois
  • Kudu Dynamics
  • Narf Industries
  • River Loop Security
  • Riverside Research Institute
  • University of California, Santa Barbara
  • WebSensing

An additional performer may be added, pending contract finalization.

Cromulence and the University of Illinois Urbana-Champaign will serve as proxies for the offense and test effectiveness of the proposed mitigations. Northrop Grumman will serve as the integration and systems engineering evaluator.

According to Bratus, these teams include a number of the world’s leading experts in exploiting and defending root-of-trust and embedded systems.

Read more at DARPA

Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email

Articles Liés

Joint Cyber Defense Collaborative Announces 2023 Planning Agenda

January 27, 2023 Cybersecurity

CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software

January 27, 2023 Cybersecurity

Mayorkas and European Union Commissioner for Internal Market Breton Meet on Cyber Resilience Cooperation

January 27, 2023 Cybersecurity

Coast Guard Releases New Guide to Help Maritime Cybersecurity Assessments

January 27, 2023 Cybersecurity

U.S. Department of Justice Disrupts Hive Ransomware Variant

January 27, 2023 Cybersecurity

U.K. Warns of Targeted Phishing Attacks from Russia and Iran

January 26, 2023 Cybersecurity
Don't Miss
Moldova

Gavrilița va pleca la Bruxelles la reuniunea Comitetului de Asociere UE

By woe whJanuary 28, 20230

O delegaţie a Guvernului Republicii Moldova, condusă de premierul Natalia Gavriliţa, va pleca săptămâna viitoare…

Boțan: Noi înțelegem toate componentele acestui război propagandistic

January 28, 2023

Gavrilița a discutat cu primarii din Nisporeni despre nivelul de trai

January 28, 2023

North Carolina Man Pleads Guilty to Bomb Threat Near the Library of Congress

January 28, 2023
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Our Picks

What will it take to deter Iran from targeting opponents inside the US?

January 27, 2023

Dupu: Propaganda a încercat să ne divizeze că nu vorbim aceeași limbă

January 27, 2023

Bolea a discutat despre extinderea cooperării europene la Bruxelles

January 27, 2023

Igor Grosu a avut o întrevedere cu Mustafa Șentop. Ce au convenit

January 27, 2023

Subscribe to Updates

Get the latest National Security News directly to your inbox.

© 2023 Estonian Free Press. All rights reserved.
  • Privacy Policy
  • Terms and Conditions
  • Contact

Type above and press Enter to search. Press Esc to cancel.