{"id":16575,"date":"2025-02-24T09:48:13","date_gmt":"2025-02-24T12:48:13","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=16575"},"modified":"2025-02-24T09:48:13","modified_gmt":"2025-02-24T12:48:13","slug":"darpa-promueve-metodos-formales-para-prevenir-los-desastres-ciberneticos","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=16575","title":{"rendered":"DARPA promueve m\u00e9todos formales para prevenir los desastres cibern\u00e9ticos"},"content":{"rendered":"<p>Los funcionarios de la Agencia de Programas de Investigaci\u00f3n Avanzada de Defensa han comenzado a instar a los gerentes del Departamento de Defensa a utilizar herramientas de ciberseguridad de DARPA inactivas destinadas a prevenir ataques y accidentes en programas cr\u00edticos.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Officials at the Defense Advanced Research Programs Agency have begun nudging Defense Department managers to utilize idling DARPA cybersecurity tools meant to preempt hacks and accidents in critical programs.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">A series of high-profile incidents in recent years has highlighted a kind of passivity among defense officials in the face of the damage caused, according to Kathleen Fisher, the director of DARPA\u2019s Information Innovation Office. Believing that systems can\u2019t stave off catastrophic cyber incidents caused by software vulnerabilities, the department often focuses instead on reactive fixes, she said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">But proactive tools for building more resilient software already exist in the Pentagon\u2019s arsenal of countermeasures, she said at a demonstration day at the agency\u2019s Arlington, VA headquarters earlier this month.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cWe have many critical mission systems that have these kinds of vulnerabilities in them, and the way we\u2019ve learned to deal with them is after they\u2019ve been attacked, after we\u2019ve learned, \u2018OK, that\u2019s a bad one,\u2019 we then go and fix it,\u201d Fisher said. \u201cWe pay billions of dollars after the fact to go fix these problems.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">In 2017, Russia conducted a cyberattack against Ukraine that\u2019s now known as NotPetya.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">While the attack targeted Ukraine\u2019s power infrastructure, it ended up spreading outside the country, affecting infrastructure and businesses across Europe, including a Danish logistics company, Maersk, which is responsible for about 20% of global container shipping. In seven minutes, the attack destroyed 50,000 of the firm\u2019s computers and nearly wiped out the active directory system tracking its container ships. The company estimated the damage at around $300 million.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Seven years later, in July 2024, faulty software from\u00a0<a href=\"https:\/\/www.c4isrnet.com\/congress\/capitol-hill\/2019\/09\/26\/this-is-the-us-threat-intel-firm-referenced-in-the-trump-ukraine-controversy\/\" target=\"_blank\" rel=\"noopener\">security firm CrowdStrike<\/a>\u00a0took millions of government and private sector computers offline, delaying thousands of commercial flights and canceling medical procedures as part of the global outage. The disruption was widespread, but the root cause was determined to be an accident \u2014 a software glitch that spread through a routine update.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Events like these \u2014 adversarial or accidental \u2014 have become\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2022\/11\/07\/advance-work-in-ukraine-blunted-russian-cyber-advantage-us-says\/\" target=\"_blank\" rel=\"noopener\">more prevalent in recent years<\/a>. And according to Fisher, they highlight troubling software vulnerabilities in critical infrastructure. In response, the Defense Department and the broader U.S. government have developed a sense of \u201clearned helplessness\u201d when it comes to addressing software vulnerabilities.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Over the last 10 to 15 years, DARPA has proven that a software design approach called \u201cformal methods\u201d can address these vulnerabilities before they\u2019re exploited by a coding error or an attack. Rather than validate the security of software code solely by testing it after it\u2019s already written, a formal-methods approach designs software through rigorous mathematical analysis, verifying its performance before and as it\u2019s being built.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">Some of the tools DARPA has developed have made their way into DOD programs of record, but adoption has been limited. Now, as concerns grow about the cybersecurity of military weapon systems, the agency is trying to raise awareness in the defense acquisition community that these solutions exist and are available for use.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cWe can imagine a world without these software vulnerabilities, where we can eliminate the sense of learned helplessness across DOD, where we can rapidly secure critical systems . . . and where we can create a sustainable ecosystem of formal-methods tools that are ready and off the shelf for people to use,\u201d Fisher said.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 gpyzAH a-heading1\"><strong>DARPA demos<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">One early DARPA program to showcase the utility of formal methods was the\u00a0<a href=\"https:\/\/www.c4isrnet.com\/home\/2017\/05\/09\/rockwell-collins-wins-darpa-cyber-contract\/\" target=\"_blank\" rel=\"noopener\">High-Assurance Cyber Military Systems effort, or HACMS<\/a>. The program ran from 2012 to 2016 and culminated with two demonstrations, the first using a small quadcopter drone and then, in 2017, using Boeing\u2019s autonomous helicopter, the Unmanned Little Bird.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">During the second demonstration, a red team of hackers tried unsuccessfully to infiltrate the aircraft, according to Darren Cofer, a principal fellow at Collins Aerospace, whose predecessor Rockwell Collins was a contractor on HACMS.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cIn HACMS, we showed that formal methods could be used to eliminate important security vulnerabilities from embedded systems in real aircraft,\u201d Cofer said during the DARPA demo day.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">The agency has since pursued several other efforts to improve the usability of formal methods for DOD platforms. One of those programs, called SafeDocs, addresses vulnerabilities in parsers \u2013 software tools that convert data into a usable format. Another effort, Assured Micro Patching or AMP, provides a way to fix software bugs without the source code and ensure that the fix itself doesn\u2019t do more damage.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">These tools have all transitioned to DOD programs in a limited capacity, and DARPA has\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2024\/06\/05\/darpa-sees-automated-tools-helping-streamline-software-certification\/\" target=\"_blank\" rel=\"noopener\">several other ongoing efforts<\/a>\u00a0aimed at further improving formal methods. Fisher noted that because the problem hasn\u2019t been fully solved, there\u2019s a tendency for programs to hold off on adopting it. But DARPA sees potential for these technologies to be planted more widely now &#8212; both to secure existing DOD software installed on legacy platforms and to design software for future systems.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cWe have plenty of technology that\u2019s ready for prime time and we should go ahead and transition and use that technology now because it will dramatically improve the security of our systems,\u201d she said. \u201cWe can\u2019t afford to wait until we\u2019ve solved the whole problem to use the technology that we\u2019ve got now.\u201d<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 gpyzAH a-heading1\"><strong>Spreading the word<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">How quickly and broadly the Defense Department adopts these tools depends on a number of factors \u2014 including funding and prioritization within the military services.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">To help spread the word and address barriers to adoption, DARPA kicked off the Capstone program last year. Through a partnership with the Undersecretary of Defense for Research and Engineering and the Director of Operational Test and Evaluation, the agency is working with the services to identify platforms that could benefit from formal methods.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">DARPA is providing some matching funds to make the tools available and, according to program manager Steve Kuhn, expects to identify the platforms by May. Once the Capstone programs are selected, the agency will help identify and fix software vulnerabilities within them and capture lessons learned to be compiled in a best practice guide that all programs will be able to access.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">DARPA\u2019s hope, Kuhn said, is that the guide will help DOD program offices see how resilient software tools are being applied and offer a resource that helps with that implementation.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 bFwqVI body-paragraph body-paragraph\">\u201cPart of the strategy that we\u2019ve been embarking on is really an adoption plan that brings these resilient software tools to both our defense industrial base, our partners and the services themselves,\u201d Kuhn said. \u201cWe\u2019re not going to fix everything, but can we really capture what it takes to bring these tools to the masses?\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/pentagon\/2025\/02\/21\/darpa-touts-formal-methods-for-nipping-cyber-disasters-in-the-bud\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los funcionarios de la Agencia de Programas de Investigaci\u00f3n Avanzada de Defensa han comenzado a instar a los gerentes del Departamento de Defensa a utilizar&hellip; <\/p>\n","protected":false},"author":1,"featured_media":16576,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16575"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=16575"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16575\/revisions"}],"predecessor-version":[{"id":16577,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/16575\/revisions\/16577"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/16576"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=16575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=16575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=16575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}