. 24/7 Space News .
CYBER WARS
Rapidly patching legacy software vulnerabilities in mission-critical systems
by Staff Writers
Washington DC (SPX) Oct 16, 2019

illustration only

There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on - from transportation systems to electric grids to industrial equipment.

Much like commercial or personal computing devices, these systems utilize embedded software to execute and manage their operations. To fix certain security vulnerabilities, commercial and personal devices must undergo frequent updates, and are replaced every few years - or on occasion, more frequently when an update fails. Mission-critical systems are built to last for decades, and rarely have the same short upgrade cycles.

These systems are expensive to develop and hard to replace, and as they become increasingly connected for the purposes of maintenance diagnostics and data collection, this proliferation of connected software is opening them to compromise. While the amount of deployed vulnerable software is growing exponentially, the effective means of addressing known vulnerabilities at scale are limited.

"Patching vulnerabilities in legacy software used by mission-critical systems is a challenge that is only growing in importance and complexity," said Dr. Sergey Bratus, a program manager in DARPA's Information Innovation Office (I2O).

"Even after a particular flaw is fully understood, and a remediation approach has been developed and expressed as a source code change in the software, a vendor's ability to produce patches for all of their deployed devices in a timely, assuredly safe, and scalable manner is limited. This results in mission-critical software going unpatched for months to years, increasing the opportunity for attackers."

Today, identifying and remediating software vulnerabilities in legacy binaries requires highly skilled software engineers who are able to make expert assumptions based on what source code samples and/or limited knowledge of the original development environment may be available. The engineers are responsible for understanding the structure of the binary, developing and applying a patch by hand, and then manually analyzing and testing the binary to ensure it works properly.

The process is arduous and time consuming with minimal assurances that the system will continue working as intended after the fix is applied. Further, this approach is becoming increasingly untenable as the amount of deployed software continues to grow within mission-critical systems.

The Assured Micropatching (AMP) program seeks to address these challenges and accelerate the process of patching legacy binaries in mission-critical systems and infrastructure. AMP aims to develop tools and methodologies for analyzing, modifying, and fixing legacy software in binary form with the assistance of assured, targeted "micropatches."

Micropatches are small patches that change the binary as little as possible in order to achieve an intended objective while also minimizing the potential side effects of the fix. AMP aims to create breakthrough technologies to reason about these small software fixes and, perhaps most importantly, provide proofs to assure that the system's original baseline functionality is not lost or altered by the fix.

"Think of how many times you have updated software on your personal device and the update inadvertently caused some of the software to stop working, or worse, "bricked" the device. With current patching approaches, we are not given the assurance that the system will continue working as intended after the fix is applied. Assured Micropatching aims to create and apply fixes in an automated and assured way, giving us a means to expedite the time to test and deploy the patched system from months and years to just days," said Bratus.

To enable the creation and rapid implementation of assured micropatches, the AMP program will explore novel breakthroughs in binary decompilation and analysis, compiler techniques, and program verification. Today, engineers utilize software decompilers to understand the executable binary, which is a key step in the process of patching legacy software. While helpful, today's decompilers are largely heuristic and only able to generate a "best guess" at what the original source code may have been like.

AMP seeks to develop goal-driven decompilation, which would use existing source code samples, any available knowledge of the original build process, and other historic software artifacts to improve decompilation and direct it towards a specific goal, such as situating a known source code patch. By being able to guide decompilation, an engineer developing a binary micropatch is better able to translate knowledge of flaws from the source code to the binary, accelerating the identification, analysis, and repair of vulnerabilities in the binary.

In addition to goal-driven decompilation, AMP aims to develop "recompilers" that compile the desired source-level change against the existing binary and provide assurances that the intended functionality of the software is maintained after it is patched. Today, it is difficult to analyze changes in the binary as compilers take a clean-sheet approach - throwing out the existing binary and starting from scratch with each analysis.

The AMP program will work to develop recompilers that preserve the binary as much as possible when the patch is applied and analyzed. Once a fix is applied, the novel recompilers will analyze the effects to ensure it does not disrupt the baseline functionality of the software.

To ensure the tools and techniques in development work as intended, AMP will run a number of challenges throughout the life of the program. The challenges will explore various cyber-physical mission-critical system use cases, and assess how effective the technologies are at rapidly patching legacy systems.

More information on the AMP program is available within the Broad Agency Announcement (BAA) that is posted here


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being there;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Monthly Supporter
$5+ Billed Monthly


paypal only
SpaceDaily Contributor
$5 Billed Once


credit card or paypal


CYBER WARS
The high-tech start-up tackling online extremism
London (AFP) Oct 13, 2019
Vidhya Ramalingam believes it's always possible to change, even for people deeply involved in the murky online world of jihadist and far-right extremism. Her company Moonshot CVE has the ambitious aim of trying to get anyone tempted by violence back on the straight and narrow. Over the last four years, the London-based start-up has grown quietly but not anonymously, if a recent partnership deal with Facebook is anything to go by. US national Ramalingam and the firm's co-founder Ross Frenett ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
'One small nibble for man': 3D printer makes meat in space

Raytheon to help Jet Propulsion Lab explore the universe

Humans will not 'migrate' to other planets, Nobel winner says

Astronauts grow 'space meat' but admit taste 'needs to be improved'

CYBER WARS
Space and Missile Systems Center completes summer launch campaign; with small launchers next focus

Sea Launch platform stripped of foreign equipment, ready to leave US for Russia

Jet taking off from Florida will launch NASA weather satellite

Boeing's HorizonX $20M investment in Virgin Galactic values VG at $1.5B

CYBER WARS
UK eases sanctions on Moscow to allow activities related to joint space mission to Mars

Curiosity findings suggest Mars once featured dozens of shallow briny ponds

NASA's Mars 2020 rover tests descent-stage separation

NASA's Curiosity Rover finds an ancient oasis on Mars

CYBER WARS
China's rocket-carrying ships depart for transportation mission

China's KZ-1A rocket launches two satellites

China's newly launched communication satellite suffers abnormality

China launches first private rocket capable of carrying satellites

CYBER WARS
OmegA team values partnerships with customer, suppliers

Competition to find business ideas that are out of this world

UK space skills support sustainable development

Talking space with the next generation in Europe

CYBER WARS
When debris overwhelms space exploitation

Celebrating a mission that changed how we use radar

Electronic solid could reduce carbon emissions in fridges and air conditioners

German shooter video stays online despite crackdown

CYBER WARS
Scientists observe formation of individual viruses, a first

Were hot, humid summers the key to life's origins?

A planet that should not exist

Many gas giant exoplanets waiting to be discovered

CYBER WARS
NASA's Juno prepares to jump Jupiter's shadow

Huge Volcano on Jupiter's Moon Io Erupts on Regular Schedule

Stony-iron meteoroid caused August impact flash at Jupiter

Storms on Jupiter are disturbing the planet's colorful belts









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.