Transcript
Page 1: Opportunities for Cyber Trust Researchers  at  IARPA

1

Opportunities for Cyber Trust Researchers

at IARPA

Carl LandwehrNICIAR Program ManagerIntelligence Advanced Research Projects Activity (IARPA)301-226-9100email: [email protected]

Page 2: Opportunities for Cyber Trust Researchers  at  IARPA

2

The Nation’s Intelligence Community

New DNI, Mike McConnell: • Intelligence Community Integration• Acquisition emphasis• Information sharing:

•Need to know vs. responsibility to provide• Analyst at the center:

•Know the customer needs•Know the sensors and source

Page 3: Opportunities for Cyber Trust Researchers  at  IARPA

3

IARPA Genesis• Created 1 Oct. 2007

– Within the Office of the Director of National Intelligence• First Director: Dr. Lisa Porter, on board Feb. 2008• Extra-mural research, driven by Program Managers• Mix of unclassified and classified research programs• Unclassified research largely solicited through targeted BAAs• Watch FedBizOpps for opportunities• IARPA Web site coming soon:

– Keep your eye on www.iarpa.gov !• Location: College Park, MD• Rotational staff of Program Managers

– People with new program ideas encouraged to apply!

Page 4: Opportunities for Cyber Trust Researchers  at  IARPA

4

IARPA• No kidding, high-risk/high payoff research

– This is NOT about “quick wins,” “low-hanging fruit,” “sure things”, etc.– Failure is completely acceptable as long as

• It is not due to failure to maintain technical or programmatic integrity• Results are fully documented

• Best and brightest– Competitive awards and world-class PMs– Every IARPA program will start with a good idea and a good person to lead it.

Without both, IARPA will not start a program.• Cross community focus

– Address cross-agency challenges– Leverage agency expertise (both R&D and operational perspectives)– Work transition strategies and plans

• The “P” in IARPA is very important– Each Program will have a clearly defined and measurable end-goal, typically 3-5

years out. Intermediate milestones to measure progress are also required– IARPA does not “institutionalize” programs– Fresh ideas and fresh perspectives are always coming in; status quo is constantly

questioned

Page 5: Opportunities for Cyber Trust Researchers  at  IARPA

5

The Heilmeier Questions1. What are you trying to do?2. How is it done now? Who does it? What are the limitations of present

approaches?– Are you aware of the present state-of-the-art and have you thought

through all the options?3. What is new about your approach? Why do you think you can succeed at

this time?– Given that you’ve provided clear answers to 1 & 2, have you created a

compelling option?– What does a first order analysis of your approach reveal?

4. If you succeed, what difference will it make?– Why should we care?

5. How long will it take? How much will it cost? What are the mid-term and final exams?

– What is your program plan? How will you measure progress? What are your milestones/metrics? What is your transition strategy?

Page 6: Opportunities for Cyber Trust Researchers  at  IARPA

6

National Intelligence Community Information Assurance Research Program

Vision:Level the cybersecurity playing field– Dramatically improve the fundamental

trustworthiness of the NIC cyber infrastructure

– Defend existing NIC cyber infrastructure from external and internal threats; enable operation despite attacks

Goals:– Use accountability as a lever to reduce

vulnerabilities and foster information sharing

– Increase the attacker’s cost to penetrate NIC systems

– Provide usable and flexible security mechanisms

Flawed softwareSpoofable network protocolsComplex security management

Defense has an uphill battle!

Page 7: Opportunities for Cyber Trust Researchers  at  IARPA

7

Goals• Double attacker’s time/resource cost to compromise NIC systems through

remote exploits– Unmodified system as baseline– Applications: reduce vulnerability windows in time (patch

generation/installation, reconfiguration) and space (flaw/fault detection and removal)

• Decrease by half the time and effort required to attribute a specific computational event/information flow to a (human/software/hardware) initiator– Unmodified system as baseline– Applications: sanitization, information sharing (credit), leakage (blame)

• Stretch goal: Reduce by a factor of 10 the time/effort required to certify/accredit a new, conforming software component for use in a general purpose environment based on accountable information flow technologies– Existing system and certification/accreditation process as baseline

Page 8: Opportunities for Cyber Trust Researchers  at  IARPA

8

Current NICIAR Research Topics

Goals:• Increase attacker’s cost • Enable system operation during attack• Improve system configuration assurance

Technologies:• Dynamic, diverse programs and systems• Configuration specification and verification

Goals:• Incorporate accountable information flow

mechanisms at all system layers• Develop and demonstrate network designs

in which today’s attacks are engineered out

Technologies:• Physical unclonable functions, secure

coprocessors, static/dynamic analysis

Large Scale System DefenseVulnerable monoculture

Robust polyculture Intended configuration

Actual configuration

Accountable Information Flow

Page 9: Opportunities for Cyber Trust Researchers  at  IARPA

9

NICECAP Timeline

1 2 3 4 5 6 7 8 9 10 11 12 1 2 3 4 5 6 7 8 9 10 11 12 1 20072006 2008

BAA release 4/24/06

35 Full Proposals invited 1/15/08

Proposals due 2/14/08

Round I Work begins 6/1/07

Contract negotiations begin 4/15/08

Topic areas:Accountable Information flow

New focus area 10/07: Privacy Protecting Technologies

Large scale system defenseUpdated BAA release 10/2/07

White papers due 11/2/07 (received ~ 135 WPs)

Awards made 7/15/08

2009NICECAP BAA available at (or Google (NICECAP)):http://www.fbo.gov/spg/USAF/AFMC/AFRLRRS/Reference-Number-BAA-06-11-IFKA/listing.html

Page 10: Opportunities for Cyber Trust Researchers  at  IARPA

10

On the Horizon:Secure System Engineering Competitions

• How do we build systems of realistic scale that –Have a sound assurance argument–Can be extended without sabotaging it–Are usable and manageable

• How do we structure a competition to teach us these things?–What would be a compelling thing (or series of

things) to build?–How would we evaluate it?–How would we measure progress?

• What toolkits could we make available to competitors?

Page 11: Opportunities for Cyber Trust Researchers  at  IARPA

11

Thank You!

Questions?

Carl LandwehrNICIAR Program Manager301-226-9100email: [email protected]


Top Related