Loading in 2 Seconds...
Loading in 2 Seconds...
Operate Through Attacks!!. ORGANICALLY ASSURED & SURVIVABLE INFORMATION SYSTEMS: PRINCIPAL INVESTIGATORS’ MEETING. August 19, 2002. Dr. Jaynarayan H. Lala Program Manager Information Processing Technology Office Defense Advanced Research Projects Agency. TOPICS. New Office
While computational performance is increasing, productivity and effectiveness are not keeping up
We have to change the game to create an urgent & necessary quantum leap in computer system robustness and capability
Cognitive Information Processing Technology, BAA 02-21, http://www.eps.gov/spg/ODA/DARPA/CMO/BAA02-21/listing.html
Dynamic Coordinated Teams
Systems That Know
What They’re Doing
Robust Software and Hardware
FoundationalScience and Mathematics
(incl. Bio-inspired Computing, new approaches to Trust Management,…)
OASIS Dem-Val applies the DARPA program results and other technologies to produce an organically robust and dependable system architecture
The OASIS, FTN, and other DARPA programs developed tools, components, architectures, mechanisms.
Currently many systems can be brought down in seconds to minutes with little planning.
In Integrated Feasibility Experiment (IFE) 3.1 fourteen out of fifteen flags were captured by the red team.
Real-time Execution Monitors, Stealth, Randomness, Error Compensation,Response, Recovery, Diversity.
Existing projects worked by PI's
in academia and small niche companies.
Baseline Prototype Development
Prototype Demonstration and Red Team Scenario
The Prototype Design will be competed between two teams.
Dan Schnackenberg, Boeing Dr. Sanjai Narain, Telcordia
Dr. Hal Hager, Boeing Dr. Raj Rajagopalan, Telcordia
Dr. Nick Multari, Boeing Pete Dinsmore, NAI Labs
Don McQuinn, Boeing Mark Feldman, NAI Labs
Dr. Yair Amir, Spread Concepts
Designing Protection and Adaptation into a Survivability Architecture: Demonstration and Validation (DPASA-DV)
Mr. Pete Pflugrath, Program Manager
Dr. Partha Pal, Co-Principal Investigator
Mr. David Levin, Co-Principal Investigator
CONTEXT: Create robust software and hardware that are fault-tolerant, attack resilient, and easily adaptable to changes in functionality and performance over time.
PROGRAM GOAL: Create an underlying scientific foundation that will
Fragmentation, Redundancy, Scattering,
Value & Time Domain Error Detection
Redundancy-Based Cyber Attack Detection
Digital Integrity Marks
Monitor COTS Binaries
Sandbox Active Scripts
Operate thru’ Mobile/ Malicious Code Attacks
Secure Mobile Code Format
In-lined Reference Monitors
System Dem-Val Program
Survivable JBI Demonstration
Completed Validation Matrices
PI Meetings & Project Evaluation
Provably Correct Protocols
Software Vulnerability Detection
Design Assessment & Validation
Command & Control Systems
Strategic Indicators & Warning
Logistics & Personnel
Exploit unknown vulnerabilities
OASIS and OASIS Dem/Val
Financial Transaction Systems (Banks, Stock Markets)
IBM Autonomic Computing
AT&T Switching Systems
Boeing 777 Flight Control System
Exploit known vulnerabilities
Power Grid Control/ SCADA
Most desktop & commercial H/W & S/W (designed for ideal/non-realistic conditions)
Memory Bit Errors
Processor Fail-stop/ Fail-crash
* Householder, Houle, and Dougherty, "Computer Attack Trends Challenge Internet Security," Security & Privacy, IEEE Computer Society, Jan 2002
Accidental Faults and Errors