. 24/7 Space News .
CYBER WARS
Applying Computer-Human Collaboration to Accelerate Detection of Zero-Day Vulnerabilities
by Staff Writers
Washington DC (SPX) Apr 19, 2018

illustration only

Today, Commercial off-the-shelf (COTS), Government off-the-shelf (GOTS), and Free and open-source (FOSS) software support nearly all aspects of DoD, military, and commercial operations. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities, using a suite of tools and techniques that require extensive training.

While effective, the process is largely manual and requires hundreds, if not thousands, of hours of effort for each vulnerability discovered.

The use of automated program analysis to support the discovery process has become more prevalent in recent years. However, current automation is limited and only able to reason over a few vulnerability classes without human involvement due to a lack of understanding of certain software semantics and context clues.

To address the challenges facing our abilities to scale and accelerate vulnerability detection, DARPA's Information Innovation Office (I2O) today announced the Computers and Humans Exploring Software Security (CHESS) program. CHESS aims to develop capabilities to discover and address zero-day vulnerabilities at a speed and scale appropriate for the continuously growing, complex software ecosystem by enabling humans and computers to collaboratively reason over software artifacts.

Moving from a manual, human-driven process to one that is based on advanced computer-human collaboration creates opportunities for a broader range of technical-or potentially non-technical-experts to assist in the detection and remediation of known and emerging threats.

"The relatively small number of skilled hackers that exist across industry, government, and academia, combined with the limitations of current automated program analysis capabilities has made it extremely difficult to scale vulnerability detection and remediation to the level needed for today's software environment," said Dustin Fraze, the I2O program manager leading CHESS. "

Through CHESS, we're looking to gather, understand, and convert the expertise of human hackers into automated analysis techniques that are more accessible to a broader range of technologists. By allowing more individuals to contribute to the process, we're creating a way to scale vulnerability detection well beyond its current limits."

To achieve its goal, the CHESS program is seeking innovative proposals across five technical areas. Through these efforts, the program plans to examine novel approaches to rapid vulnerability detection that focus on identifying system information gaps requiring human assistance, generating representations of these gaps appropriate for human collaborators, capturing and integrating human insight into the analysis process, and ultimately synthesizing software patches based on the collaborative analysis.

Under the first technical area, research teams will focus on capturing and analyzing the process expert hackers use to reason over software artifacts-such as source code and compiled binaries. Leveraging the gathered insights, researchers will create a basis for developing new forms of highly effective communication and other human-computer interactions.

Performers working on the second technical area will seek to develop technologies capable of discovering and patching specified vulnerability classes in both source code and compiled binaries.

Through the process, they will also identify missing but relevant information to vulnerability analysis-or information gaps-addressable by the human-generated insights found under the first technical area.

Research efforts under both of these technical areas will be highly collaborative, as the goal is to create a system for vulnerability detection that is easily understandable by both computers and humans.

"Humans have world knowledge as well as semantic and contextual understanding that is beyond the reach of automated program analysis alone," said Fraze.

"These information gaps inhibit machine understanding for many classes of software vulnerabilities. Properly communicated, human insights can fill these information gaps and enable expert hacker-level vulnerability analysis at machine speeds."

The third and fourth technical areas focus on creating the testing and evaluation criteria for the collaborative human/computer technologies created under the first two technical areas.

These areas will look to a pre-determined set of vulnerability classes of interest to create a realistic set of test problems, as well as the current state-of-the-art in vulnerability detection tools and techniques to create a measurement baseline. The final technical area will manage evaluations, integration, and seek to transition the final solution to government and/or commercial partners.

The CHESS program will span one 18-month and two 12-month phases for a total of 42 months. Each phase will focus on increasing the complexity of an application the CHESS system is able to analyze effectively.

+ Interested proposers have an opportunity to learn more about the CHESS program during a Proposers Day, scheduled for Thursday, April 19 from 1:00-4:15pm ET at the DARPA Conference Center, located at 675 N. Randolph St., Arlington, Virginia, 22203. To learn more, visit here

+ For a full program description, please visit the Broad Agency Announcement published here on FedBizOpps


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


CYBER WARS
Tech firms sign pledge to refrain from helping cyberattacks
San Francisco (AFP) April 17, 2018
Thirty-four global technology companies and organizations signed a pact Tuesday calling for a stronger defense against cyberattacks in any form and pledging to refrain from helping governments attack "innocent" civilians or enterprises. "The devastating attacks from the past year demonstrate that cybersecurity is not just about what any single company can do but also about what we can all do together," said Brad Smith, president of Microsoft, in a statement endorsed by US firms including Facebook, O ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Cosmonautics demonstrates how US, Russia should work together

Philippines to deploy riot police for Boracay tourist closure

Top tomatoes thanks to Mars missions

Growing Plants in Antarctica 'Open Way' for Distant Space Missions - Analyst

CYBER WARS
Lockheed awarded $928M for hypersonic strike weapon

RL10 Selected for OmegA Rocket

ISRO not facing funds crunch: Chairman K.Sivan

Alaska Aerospace Clarifies Commercial Aerospace Plans For Kodiak

CYBER WARS
US, Russia likely to go to Mars Together, former NASA astronaut says

Trace Gas Orbiter reaches stable Mars orbit, ready to start science mission

Mars impact crater or supervolcano?

The Rock Outcrop 'Tome' Continues to Garner Interest On Mars

CYBER WARS
Flowers on the Moon? China's Chang'e-4 to launch lunar spring

China's 'space dream': A Long March to the moon

China says Earth-bound space lab to offer 'splendid' show

Tiangong-1 expected to burn up on reentering atmosphere

CYBER WARS
Airbus has shipped SES-12 highly innovative satellite to launch base

Storm hunter launched to International Space Station

SpaceX says Iridium satellite payload deployed

Spacecom selects SSL to build AMOS-8 comsat with advanced capabilities

CYBER WARS
'Artificial mole' could warn of cancer: study

New type of opal formed by common seaweed discovered

Flat gallium joins roster of new 2-D materials

Polymer-graphene nanocarpets to electrify smart fabrics

CYBER WARS
We think we're the first advanced earthlings - but how do we really know?

Newly discovered salty subglacial lakes could help search for life in solar system

SPHERE Reveals Fascinating Zoo of Discs Around Young Stars

A Cosmic Gorilla Effect Could Blind the Detection of Aliens

CYBER WARS
Pluto's largest moon, Charon, gets its first official feature names

Juno Provides Infrared Tour of Jupiter's North Pole

SSL to provide of critical capabilities for Europa Flyby Mission

Jupiter's turmoil more than skin deep: researchers









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.