{"id":8140,"date":"2021-07-14T08:25:18","date_gmt":"2021-07-14T11:25:18","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8140"},"modified":"2021-07-14T08:25:18","modified_gmt":"2021-07-14T11:25:18","slug":"la-fuerza-aerea-de-eeuu-ofrece-su-software-de-deteccion-de-archivos-maliciosos-al-sector-privado","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8140","title":{"rendered":"La Fuerza A\u00e9rea de EEUU ofrece su software de detecci\u00f3n de archivos maliciosos al sector privado"},"content":{"rendered":"<p>La Fuerza A\u00e9rea de EEUU firm\u00f3 acuerdos de licencia de patentes con el sector privado para el c\u00f3digo que desarroll\u00f3 para detectar vulnerabilidades de software. El software, llamado Whiddler , escanea archivos en una red y calcula la probabilidad de que un archivo sea malicioso. Aseguran que la cooperaci\u00f3n con el sector privado ayudar\u00e1 a mejorar la tecnolog\u00eda y ser\u00e1 un est\u00edmulo para los desarrolladores, para poder retenerlos, mediante mejores recompensas y el reconocimiento como inventores en las patentes.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">WASHINGTON \u2014 In a first for the Air Force\u2019s new information warfare entity, the service inked patent license agreements with the private sector for code it developed in house to detect software vulnerabilities.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">The software, called\u00a0<a href=\"https:\/\/techlinkcenter.org\/technologies\/whiddler-anti-malware-scanner-software-with-zero-day-detection-capabilities\/d483d018-e691-4125-94b5-b640d26b70aa\" target=\"_blank\" rel=\"noopener\">Whiddler<\/a>, scans files on a network and calculates the probability of whether a file is malicious. It looks for suspicious items that don\u2019t have a signature and therefore might escape antivirus software that scans for known problematic signatures.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">The first agreement was in December 2020 and the second in May 2021. The agreements are the first for organizations under 16th Air Force, however, not the first within the Air Force itself.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">The Air Force signed a cooperative research and development agreement, or CRADA, with the first company, and officials said they are working on another with the second company. The service did not name the companies or disclose the dollar amounts for the agreements.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">Under these agreements, the companies can use the technology developed by the 90th Cyberspace Operations Squadron and transfer it to the private sector to better identify software risks on networks.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">Officials said completing these deals has multiple benefits for not just the Air Force or Department of Defense, but potentially for the larger commercial ecosystem.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">It provides \u201cthe ability to improve our technology that maybe we ourselves are no longer maintaining,\u201d Rebecca Lively, deputy director of the 90th Cyberspace Operations Squadron, told C4ISRNET in an interview. \u201cThrough that cooperative agreement, we are able to reap the benefits of those improvements at no cost to the government or at least to now cost to our unit.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">With the technology transferred to a third party, the government can choose whether its wants to adopt improvements to the code that the companies make.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">The companies can modify and improve the code and sell it to industry, making the larger community more secure, officials said. The arrangement keeps the government removed from marketing to industry but provides an advanced tool to some businesses with proprietary detection methods that hackers haven\u2019t learned to defeat.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">\u201cI think that\u2019s the intent of technology transfer as a whole is that ability to take something that the government has invested funds in, taxpayer funds and let it benefit the taxpayers more broadly than we do just in the DoD,\u201d Lively said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">As a result, the Air Force is helping companies better protect consumers and companies from cyber threats, said Eric Rosenberg, chief of cyber intellectual property law at the 67th Cyberspace Wing.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">A big pillar of the DoD\u2019s approach to cybersecurity is enabling others. Many experts have referred to the need for a so-call whole-of-society approach to cybersecurity that combines the government and private sector efforts to create a more stable cyberspace.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">\u201cThe United States government, in tandem with industry partners, must improve its defensive posture to prevent and or minimize the impacts and impose cost in time and money on those who exploit such vulnerabilities and target American companies and citizens,\u201d Gen. Paul Nakasone, commander of U.S. Cyber Command, told the House Armed Services Committee in May.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">Officials also noted another benefit for the DoD in inking these patent license agreements with the private sector for recruitment and retention.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">\u201cPeople want to see their work published, and people want that recognition that you can get by being an inventor on a genuine patent. That\u2019s something especially in the more classified environment we don\u2019t see as often,\u201d Lively said. \u201cWe have the ability to leverage these patents license fees that are coming back to pay bonuses to the inventors or who helped that collaboration \u2026 That\u2019s a huge piece there, but again, it adds a little to recruiting and retention and it ties to being able to reward our folks.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">Rosenberg also noted that these licensing agreements validate a certain maturity of the labs within the 67th Cyberspace Wing and 16th Air Force.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 EpKcu body-paragraph body-paragraph\">\u201cI think it shows that we developed as a lab and we\u2019re able to pull off more and more sophisticated technology transfer agreements,\u201d he said. \u201cI think that sets the stage for us to engage in more complicated in cooperation with the private sector.\u201d<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/07\/12\/air-force-cyber-squadron-offers-its-malicious-file-detection-software-to-private-sector\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Fuerza A\u00e9rea de EEUU firm\u00f3 acuerdos de licencia de patentes con el sector privado para el c\u00f3digo que desarroll\u00f3 para detectar vulnerabilidades de software.&hellip; <\/p>\n","protected":false},"author":1,"featured_media":8141,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[23],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8140"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8140"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8140\/revisions"}],"predecessor-version":[{"id":8142,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8140\/revisions\/8142"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/8141"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}