. 24/7 Space News .
CYBER WARS
Baking Hack Resistance Directly into Hardware
by Staff Writers
Washington DC (SPX) Apr 13, 2017


A new DARPA program, SSITH, aims to develop novel design techniques that lead to protection against cyberintruders at the hardware and circuit level, rather than relying only on software-based security patches. For a larger version of this image please go here.

Military and civilian technological systems, from fighter aircraft to networked household appliances, are becoming ever more dependent upon software systems inherently vulnerable to electronic intruders. To meet its mission of preventing technological surprise and increasing national security, DARPA has advanced a number of technologies to make software more secure.

But what if hardware could be recruited to do a bigger share of that work? That's the question DARPA's new System Security Integrated Through Hardware and Firmware (SSITH) program aims to answer.

"Security for electronic systems has been left up to software until now, but the overall confidence in this approach is summed up in the sardonic description of this standard practice as 'patch and pray,'" said SSITH program manager Linton Salmon of the Agency's Microsystems Technology Office. "This race against ever more clever cyberintruders is never going to end if we keep designing our systems around gullible hardware that can be fooled in countless ways by software.

The SSITH program will complement DARPA software security efforts like High-Assurance Cyber Military Systems (HACMS) and the Cyber Grand Challenge (CGC) by taking advantage of new technologies to develop integrated circuits that are inherently impervious to software end-runs."

Any software patch to a hardware-based security flaw-whether it is in a personal computer or a corporate or government information-technology system-merely salves a symptom without addressing the underlying hardware vulnerability. Left untouched, that same hardware weakness remains vulnerable to follow-on software-based breaches that members of the clever club might devise.

"To break this cycle and thwart both today's and tomorrow's software attacks, the SSITH program challenges researchers to design security directly at the hardware architecture level," said Salmon. "Instead of relying on software Band-Aids to hardware-based security issues, we are aiming to remove those hardware vulnerabilities in ways that will disarm a large proportion of today's software attacks."

SSITH specifically seeks to address the seven classes of hardware vulnerabilities listed in the Common Weakness Enumeration (cwe.mitre.org), a crowd-sourced compendium of security issues that is familiar to the information technology security community. In cyberjargon, these classes are: permissions and privileges, buffer errors, resource management, information leakage, numeric errors, crypto errors, and code injection.

Researchers have documented some 2800 software breaches that have taken advantage of one or more of these hardware vulnerabilities, all seven of which are variously present to in the integrated microcircuitry of electronic systems around the world. Remove those hardware weaknesses, Salmon said, and you would effectively close down more than 40% of the software doors intruders now have available to them.

The strategic challenge for participants in the SSITH program will be to develop new integrated circuit (IC) architectures that lack the current software-accessible points of illicit entry, yet retain the computational functions and high-performance the ICs were designed to deliver.

Another goal of the program is the development of design tools that would become widely available so that hardware-anchored security would eventually become a standard feature of ICs in both Defense Department and commercial electronic systems. The anticipated 39-month program centers on two technical areas.

One of them focuses on the development and demonstration of hardware architectures that protect against one or more of the seven vulnerability classes as well as design tools the electronics community would need for including hardware-based security innovations in their design and manufacturing practices.

The second technical area encompasses methodologies and metrics for measuring (and representing for system designers) the security status of the newly designed electronic systems and any tradeoffs the hardware-won security might levy in the form of system performance, power needs and efficiency, circuit area, and other standard circuit features.

DARPA will host a Proposers Day in support of the SSITH program on Friday, April 21, 2017, at the Booz Allen Hamilton Conference Center (3811 N. Fairfax Drive, Suite 600, Arlington, VA, 22203) from 8:00 am to 5:00 pm EDT. The purpose of this meeting is to provide information on the SSITH program, address questions from potential proposers, and provide an opportunity for potential proposers to identify possible teaming arrangements. Participants must register for the SSITH Proposers Day through the registration website by April 18, 2017, at 5:00 pm EDT. More information about the Proposers Day is available in a Special Notice (DARPA-SN-17-31) posted on FBO.gov. A detailed description of the program, (DARPA Broad Agency Announcement (HR001117S0023), is expected to become available on FBO.gov prior to the Proposers Day.

CYBER WARS
Web pioneer slams UK, US calls to weaken encryption
London (AFP) April 4, 2017
British web pioneer Tim Berners-Lee on Tuesday slammed as a "bad idea" recent calls in Britain and the United States to weaken cyber encryption. "I know that if you're trying to catch terrorists it's really tempting to demand to be able to break all that encryption," Berners-Lee told the BBC. "But if you break that encryption then guess what - so could other people, and guess what - th ... read more

Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
US, Russian Astronauts Prepare for April Crew Swap on Space Station

US astronaut John Glenn is buried with military honors

Russia, Europe, US Should Work Together on Space Exploration - German Agency

The long legacy of space-farming leading us to Mars

CYBER WARS
Bezos sells $1 bn in Amazon stock yearly to pay for rocket firm

US-Russia Venture Hopes to Sell More RD-180 Rocket Engines to US

US Hardware Production Begins for Money-Saving Next-Generation Rockets

'Fuzzy' fibers can take rockets' heat

CYBER WARS
Chile desert combed for clues to life on Mars

Russia critcal to ExoMars Project says Italian Space Agency Head

New MAVEN findings reveal how Mars' atmosphere was lost to space

Potential Mars Airplane Resumes Flight

CYBER WARS
Yuanwang fleet to carry out 19 space tracking tasks in 2017

China Develops Spaceship Capable of Moon Landing

Long March-7 Y2 ready for launch of China's first cargo spacecraft

China Seeks Space Rockets Launched from Airplanes

CYBER WARS
BRICS States Want to Expand Cooperation to Space Science

Mitsubishi Electric to Build New Satellite Production Facility

Ukraine Plans to Launch Telecom Satellite in Fourth Quarter of 2017

Russian Satellite Builder Reshetnev Fully Switches to Import Substitution

CYBER WARS
China Considering Cooperation With Russia on Space Debris

Mitsubishi Electric Chosen as Prime Contractor of Japanese Government's Engineering Test Satellite 9

Aerojet Rocketdyne achieves 3-D printing milestone

Despite EU fines, Greece struggling to promote recycling

CYBER WARS
Exoplanet mission gets ticket to ride

Atmosphere around super-earth detected

Possible Venus twin discovered around dim star

Inside Arctic ice lies a frozen rainforest of microorganisms

CYBER WARS
Hubble takes close-up portrait of Jupiter

Neptune's movement from the inner to the outer solar system was smooth and calm

Four unknown objects being investigated in Planet X

New Horizons Halfway from Pluto to Next Flyby Target









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.