SlideShare a Scribd company logo
Randy Garrett
Government Keynote
Program Manager,
Information Innovation
Office, Defense
Advanced Research
Projects Agency
Cyber Security Analytics:
The Internet of Things
Dr. Randy Garrett
The views, opinions, and/or findings contained in this presentation are those of the author and should not be interpreted as
representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency
or the Department of Defense
Approved for Public Release, Distribution Unlimited
DARPA History
Approved for Public Release, Distribution Unlimited
I2O: information to operations
• Cyber
• ISR exploitation
• New experts
Information
is a force multiplier
Approved for Public Release, Distribution Unlimited
The Earth at Night
NASA Earth Observatory/NOAA NGDC
Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)
The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not
be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research
Projects Agency or the Department of Defense.
6
Interconnectivity
Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)
The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not
be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research
Projects Agency or the Department of Defense.
7
•Instantaneous global
communications
•Low cost, rapid global transportation
•Ubiquitous mass media
•Encryption
•High Resolution Satellite Imagery
•Precision Navigation & Timing
•Design & fabrication of sophisticated:
parts, electronics, biological materials
• IED’s, EFP, semi-submersibles
•High performance computing
•Capital Equipment
• Jet fighters, Naval fighting vessels,
long range artillery
• Missiles (but not UAV’s,
Tomahawks)
• Nuclear Weapons (?)
•State-of-the-art sensors
•Sophisticated C2
•Large numbers of trained troops
Democritization of Technology
Available to Individuals: State Governments:
Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)
The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not
be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research
Projects Agency or the Department of Defense.
Understanding Organizations and Their Relationships
Traditional DOD
(Nation State)
Historic Military
Counter-Insurgency
Unexplored Territory
Approved for Public Release, Distribution Unlimited
Our physical systems are vulnerable to cyber attacks…
Small group of academics took
control of a car using Bluetooth
and OnStar. They were able to
disable the brakes, control the
accelerator, and turn on the
interior microphone.[1]
Chinese cyber attack:
“Highly sophisticated and targeted
attack” on Google corporate
infrastructure (known as Aurora)
False speedometer reading
Note that the car is in park…[1] K. Koscher, et al. "Experimental Security Analysis of a Modern Automobile," in Proceedings of
the IEEE Symposium on Security and Privacy, Oakland, CA, May 16-19, 2010.
Approved for Public Release, Distribution Unlimited 9
Approved for Public Release, Distribution Unlimited
•Real-time cyberspace analytics
•Intuitive views and interactions
•Single fused situational awareness
•Machine execution
•Assured and integrated battle damage assessment
•Work with range of skill sets, novice to expert
Plan X
A single view of the cyber battlespace for planning, operation and situational awareness
Core Plan X Technology Base
Intuitive Interfaces
Cyber
battlespace
analytics
Mission
Planning
Capability
Database
Platforms
Mission
Execution
Plan X System
network
mapping
data
deploy,
operate,
measure
11
Scalable analytics & data processing technology
Technical Area 1 - XDATA
Quadratic scaling O(n^2)
Correlation of subsets of data
Statistics for an n^2 scaling analytic based on 20K
records with feature vector length of 8000 used to
generate a correlation coefficient matrix.
Data locality (random access seek times) along
with CPU usage are the primary factors in
execution.
*Actual measured times
other times above are estimated
n^3 scaling O(n^3)
PCA/SVD, betweenness, force-directed layout
“Betweenness” using 4.7 million nodes and 29 million edges1.
1 AFRL 2011
Small
Medium
Large
Huge
Massive
Approved for public release; distribution is unlimited.
• Propagation of uncertainty
• Measuring non-linear relationships
• Sampling and estimation
techniques for distributed
platforms
• Methods for distributed
dimensionality reduction, matrix
factorization etc.
• Streaming data feeds
• Optimal cloud configurations and
resource allocation with
asymmetric components
Challenges to achieve practical solutions with
know accuracy in realistic environments
Reduction methods?
Getting convergent:
Manageable diversity (CRASH‡)
Management
Interface &
Dynamic
Loader Component
Map
Dependency
Map
Diversity Management Middleware
Address space layout
randomization
Instruction set randomization
Functional
Redundancy
Methodij
Taski
Randomization of Lower Layers
High-Level Visible Layers to User Remain Unchanged
New architectures
guided by biology
Attacker
System Users
System Managers
Make all systems look the
same to the system users and managers,
but different to the attackers.
• Preventing common attacks.
• Adapting in response to
unanticipated attacks.
• Create diversity so attacker
has to deal with heterogeneity.
‡ Clean-slate design of Resilient, Adaptive, Secure Hosts
Approved for Public Release, Distribution Unlimited 12
Encrypted computing in the cloud as privately as in
your data center (PROCEED‡)
Program Approach
• PROCEED is searching for efficient ways to compute on encrypted data that can be
implemented on modern computers
• Potential applications
• High assurance network guards
• Training simulators
• Image processing
It is theoretically possible to perform arbitrary computations on encrypted data without
decrypting. Thus, preserving security even on untrustworthy computational
infrastructure. [Gentry, 2009] [1]
What if all computation could be
done on encrypted data?
• Secure computational outsourcing
• System hardware and software
provenance concerns reduced
• Data provenance and availability
remain concerns
Will your
foreign-built
computer steal
your data?
‡ PROgramming Computation on EncryptEd Data (PROCEED)
[1] Craig Gentry. Fully Homomorphic Encryption Using Ideal Lattices.
41st ACM Symposium on Theory of Computing (STOC), 2009.
Approved for Public Release, Distribution Unlimited 13
Approved for Public Release, Distribution Unlimited.
Active Authentication
Fingerprint
Ridge Ending
Ridge
Bifurcation
Core
Island
Forensic authorship
Average word
length
Type-token ratio
Use of
Punctuation
Use of unique
words
Mouse tracking
Time over a
single location
Drifting while
reviewing topics
Double click
Hovering to review
alt-text
Repurposed TechnologyExisting Technology New Technology
Source: epdeatonville.orgwp-content uploads2011 04fingerprint.jpg
Source: The Mancurian Candidate, Robert Graves, P2, Amazon PreviewSource: google search for "real estate" with mouse tracking provided by IOGraph
Biometric Identity Modalities
Beyond passwords
Objective
Validate the individual at the
keyboard by those unique factors
that make up the individual.
Approach
Focus on software biometrics
(those without hardware sensors).
Rotate many different biometrics
as the human at the keyboard is
working, resulting in an invisible
authentication method.
Approved for Public Release, Distribution Unlimited
Objective
• Develop new program analysis tools
and techniques for detecting malicious
functionality in mobile applications.
• Seek fundamental advances in
program analysis that might enable
DoD to vet other kinds of software,
too.
Approach
• Produce practical automated analysis
tools designed to keep malicious code
out of DoD mobile application
marketplaces.
• Translate goal of keeping malicious
code out of DoD mobile application
marketplaces into lower-level
properties that can be proven with
automated program analysis tools.
Automated Program Analysis for Cybersecurity
(APAC)
Third-party
developers
submit mobile
apps to DoD.
Some contain
hidden
malicious
functionality.
DoD analysts
keep mobile app
store free of
malicious apps.
Develop new tools and techniques
for vetting mobile apps.
APP APP STORE
15
Objective
•Fully-automated checks for broad classes of
malicious features and dangerous flaws in
software and firmware
Approach
•Detect attacks we have never seen before
that are not based on signatures
• Define malice:
• Determine broad classes of hidden malicious
functionality to rule out
• Confirm the absence of malice:
• Demonstrate the absence of those broad
classes of hidden malicious functionality
• Examine equipment at scale:
• Scale to non-specialist technicians who must
vet every individual new device used by DoD
prior to deployment
VET: Vetting Commodity IT Software
and Firmware
Smart
Phones
Routers Printers
Approved for Public Release, Distribution Unlimited
http://www.dtic.mil/whs/esd/cmd/index.htm
http://broadband.mt.gov/providers.aspx
http://www.benning.army.mil/library/content/MCoELibrariesEResources/mcoelibrarieseresources.htm
http://www.mc4.army.mil/hardware/Printers
Examples
Images of specific hardware are for
illustration only and should not be
interpreted as implying vulnerabilities
16
Objective:
• Cost-effective construction of high-
assurance cyber-physical systems.
• Functionally correct.
• Satisfy appropriate safety and security
properties.
Approach:
• Use clean-slate formal methods
• Produce high-assurance operating system
components and control systems.
• Develop a suite of program synthesizers
and formal-methods tools.
• Generate an integration workbench
containing all HACMS tools and assured
components.
High Assurance Cyber Military Systems
Proof
• im
• sa
• sa
when
• on
de
• in
en
Idea: Synthesize & Verify Hig
12/8/11
“If soft
by its m
vulnera
easier
Felix Li
High Assurance: Correctness,
Resource
Constraints
Environment
Description
Functional
Specification
Synthesizer
Code
Proof
Diagnostic
Information
Hardware
Description
Verified
Libraries
Safety
Policy
Security
Policy
Clean-slate formal-methods-based approach
Approved for Public Release, Distribution Unlimited 17
Cyber Grand Challenge
Objective:
A Cyber Grand Challenge for
automated defenders similar to
DEFCON Capture the Flag
Approach:
Create automated systems that can
sense and respond to cyber
attacks more rapidly than human
operators
Compete systems that can engage in
counter-adaptation cycles and
repel novel threats from networks
• Anomaly detection, big data
analytics, case-based reasoning,
heuristics, game theory, and
stochastic optimization
Compete at a high level in cyber
competitions
Flag Monitoring
Vulnerability Scan
Service Poller
Mixed Inputs
Key
Competition
Testbed
Further dissemination only as directed by DARPA Public Release Center or higher DoD authority
Dark Nebula
© Robert Traube
Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)
The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as
representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of
www.darpa.mil
20
Distribution Statement “A” (Approved for Public Release, Distribution Unlimited)
The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not
be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research
Projects Agency or the Department of Defense.

More Related Content

What's hot (20)

PDF
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
PDF
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
Alex Pinto
 
PPTX
Crowd-Sourced Threat Intelligence
AlienVault
 
PPTX
Narrative Mind Week 3 H4D Stanford 2016
Stanford University
 
PPTX
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
PDF
IOCs Are Dead—Long Live IOCs!
Priyanka Aash
 
PDF
Threat Hunting Report
Morane Decriem
 
PPTX
Narrative Mind Week 5 H4D Stanford 2016
Stanford University
 
PDF
Rapid Threat Modeling Techniques
Priyanka Aash
 
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
HITCON GIRLS
 
PPTX
Dollars and Sense of Sharing Threat Intelligence
ThreatConnect
 
PDF
Breaking and entering how and why dhs conducts penetration tests
Priyanka Aash
 
PDF
Fishreel Lessons Learned H4D Stanford 2016
Stanford University
 
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
 
PDF
Security precognition chaos engineering in incident response
Priyanka Aash
 
PPTX
Narrative Mind Week 6 H4D Stanford 2016
Stanford University
 
PPTX
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
PPTX
Operationalizing Threat Intelligence to Battle Persistent Actors
ThreatConnect
 
PDF
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
PPTX
The Business Benefits of Threat Intelligence Webinar
ThreatConnect
 
TTPs for Threat hunting In Oil Refineries
Dragos, Inc.
 
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tid...
Alex Pinto
 
Crowd-Sourced Threat Intelligence
AlienVault
 
Narrative Mind Week 3 H4D Stanford 2016
Stanford University
 
Bsides 2019 - Intelligent Threat Hunting
Dhruv Majumdar
 
IOCs Are Dead—Long Live IOCs!
Priyanka Aash
 
Threat Hunting Report
Morane Decriem
 
Narrative Mind Week 5 H4D Stanford 2016
Stanford University
 
Rapid Threat Modeling Techniques
Priyanka Aash
 
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
HITCON GIRLS
 
Dollars and Sense of Sharing Threat Intelligence
ThreatConnect
 
Breaking and entering how and why dhs conducts penetration tests
Priyanka Aash
 
Fishreel Lessons Learned H4D Stanford 2016
Stanford University
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
 
Security precognition chaos engineering in incident response
Priyanka Aash
 
Narrative Mind Week 6 H4D Stanford 2016
Stanford University
 
Building an Analytics - Enabled SOC Breakout Session
Splunk
 
Operationalizing Threat Intelligence to Battle Persistent Actors
ThreatConnect
 
Threat Intelligence Is Like Three Day Potty Training
Priyanka Aash
 
The Business Benefits of Threat Intelligence Webinar
ThreatConnect
 

Viewers also liked (6)

PDF
Modern Release Engineering in a Nutshell - Why Researchers should Care!
Bram Adams
 
PPTX
Development Lifecycle: From Requirement to Release
Julie Meloni
 
PPTX
Internet of Everything
Cisco Services
 
PDF
Agile requirements management
Christian Hassa
 
PPT
BANKING SYSTEM
Ashok Basnet
 
PPTX
Managing Requirements in Agile Development - Best Practices for Tool-Based Re...
pd7.group
 
Modern Release Engineering in a Nutshell - Why Researchers should Care!
Bram Adams
 
Development Lifecycle: From Requirement to Release
Julie Meloni
 
Internet of Everything
Cisco Services
 
Agile requirements management
Christian Hassa
 
BANKING SYSTEM
Ashok Basnet
 
Managing Requirements in Agile Development - Best Practices for Tool-Based Re...
pd7.group
 
Ad

Similar to Internet of Things: Government Keynote, Randy Garrett (20)

PPTX
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
PDF
How to Become a Penetration Tester in 2025 (1).pdf
daksh908982
 
PDF
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
PDF
TechEvent 2019: Artificial Intelligence in Dev & Ops; Martin Luckow - Trivadis
Trivadis
 
PPTX
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
PDF
resume4
James Black
 
PPTX
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
Agile Testing Alliance
 
PPTX
Doug maughan ppt
gbass12
 
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
PDF
Bridging the Gap: Analyzing Data in and Below the Cloud
Inside Analysis
 
PDF
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
 
PDF
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
PDF
Vulnerability Assessment and Penetration Testing using Webkill
ijtsrd
 
PPTX
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
PDF
Practical Enterprise Security Architecture
Priyanka Aash
 
PPTX
Droidcon mobile security
Judy Ngure
 
PDF
An Overview Of The Singularity Project
alanocu
 
PDF
Cyber security series advanced persistent threats
Jim Kaplan CIA CFE
 
PPTX
Owasp Summit - Wednesday evening briefing master
Dinis Cruz
 
PPTX
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
Top 10 Software to Detect & Prevent Security Vulnerabilities from BlackHat US...
Mobodexter
 
How to Become a Penetration Tester in 2025 (1).pdf
daksh908982
 
Penetration Testing Services_ Comprehensive Guide 2024.pdf
qualysectechnology98
 
TechEvent 2019: Artificial Intelligence in Dev & Ops; Martin Luckow - Trivadis
Trivadis
 
For Business's Sake, Let's focus on AppSec
Lalit Kale
 
resume4
James Black
 
ATAGTR2017 Cost-effective Security Testing Approaches for Web, Mobile & Enter...
Agile Testing Alliance
 
Doug maughan ppt
gbass12
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern
 
Bridging the Gap: Analyzing Data in and Below the Cloud
Inside Analysis
 
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
 
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
Vulnerability Assessment and Penetration Testing using Webkill
ijtsrd
 
Security in the age of open source - Myths and misperceptions
Tim Mackey
 
Practical Enterprise Security Architecture
Priyanka Aash
 
Droidcon mobile security
Judy Ngure
 
An Overview Of The Singularity Project
alanocu
 
Cyber security series advanced persistent threats
Jim Kaplan CIA CFE
 
Owasp Summit - Wednesday evening briefing master
Dinis Cruz
 
Maturing Endpoint Security: 5 Key Considerations
Sirius
 
Ad

More from GovLoop (20)

PPTX
How is GovLoop Transforming Learning for Government?
GovLoop
 
PPTX
Teaching vs learning
GovLoop
 
PPT
Next Gen: Critical Conversations Slide Deck
GovLoop
 
PPTX
Internet of Things: Lightning Round, Sargent
GovLoop
 
PPTX
Internet of Things: Lightning Round, Ronzio
GovLoop
 
PPTX
Internet of Things: Lightning Round, Hite
GovLoop
 
PPTX
Internet of Things: Lightning Round, Fritzinger
GovLoop
 
PPTX
Internet of Things: Lightning Round, McKinney
GovLoop
 
DOCX
Leap Not Creep Participant Guide Pre-Course Through Week 3 - 20140722
GovLoop
 
PPT
Week Three
GovLoop
 
PPT
FHWA Week Two
GovLoop
 
PDF
Building Powerful Outreach - Executive Research Brief
GovLoop
 
PPTX
Turning Big Data into Big Decisions
GovLoop
 
PPTX
Examining the Big Data Frontier
GovLoop
 
PPTX
The Need for NoSQL - MarkLogic
GovLoop
 
PPTX
Capitalizing on the Cloud
GovLoop
 
PDF
Build Better Virtual Events & Training for your Agency
GovLoop
 
PDF
Social Media Presentation for The Center for Organizational Effectiveness
GovLoop
 
PDF
Guide to Managing the Presidential Management Fellows (PMF) Application Proce...
GovLoop
 
PDF
Winning the Cybersecurity Battle
GovLoop
 
How is GovLoop Transforming Learning for Government?
GovLoop
 
Teaching vs learning
GovLoop
 
Next Gen: Critical Conversations Slide Deck
GovLoop
 
Internet of Things: Lightning Round, Sargent
GovLoop
 
Internet of Things: Lightning Round, Ronzio
GovLoop
 
Internet of Things: Lightning Round, Hite
GovLoop
 
Internet of Things: Lightning Round, Fritzinger
GovLoop
 
Internet of Things: Lightning Round, McKinney
GovLoop
 
Leap Not Creep Participant Guide Pre-Course Through Week 3 - 20140722
GovLoop
 
Week Three
GovLoop
 
FHWA Week Two
GovLoop
 
Building Powerful Outreach - Executive Research Brief
GovLoop
 
Turning Big Data into Big Decisions
GovLoop
 
Examining the Big Data Frontier
GovLoop
 
The Need for NoSQL - MarkLogic
GovLoop
 
Capitalizing on the Cloud
GovLoop
 
Build Better Virtual Events & Training for your Agency
GovLoop
 
Social Media Presentation for The Center for Organizational Effectiveness
GovLoop
 
Guide to Managing the Presidential Management Fellows (PMF) Application Proce...
GovLoop
 
Winning the Cybersecurity Battle
GovLoop
 

Recently uploaded (20)

PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
PPTX
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
PPTX
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
NewMind AI - Journal 100 Insights After The 100th Issue
NewMind AI
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
DevBcn - Building 10x Organizations Using Modern Productivity Metrics
Justin Reock
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Bitcoin for Millennials podcast with Bram, Power Laws of Bitcoin
Stephen Perrenod
 
Webinar: Introduction to LF Energy EVerest
DanBrown980551
 
Q2 FY26 Tableau User Group Leader Quarterly Call
lward7
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 

Internet of Things: Government Keynote, Randy Garrett

  • 1. Randy Garrett Government Keynote Program Manager, Information Innovation Office, Defense Advanced Research Projects Agency
  • 2. Cyber Security Analytics: The Internet of Things Dr. Randy Garrett The views, opinions, and/or findings contained in this presentation are those of the author and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of Defense Approved for Public Release, Distribution Unlimited
  • 3. DARPA History Approved for Public Release, Distribution Unlimited
  • 4. I2O: information to operations • Cyber • ISR exploitation • New experts Information is a force multiplier Approved for Public Release, Distribution Unlimited
  • 5. The Earth at Night NASA Earth Observatory/NOAA NGDC Distribution Statement “A” (Approved for Public Release, Distribution Unlimited) The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of Defense.
  • 6. 6 Interconnectivity Distribution Statement “A” (Approved for Public Release, Distribution Unlimited) The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of Defense.
  • 7. 7 •Instantaneous global communications •Low cost, rapid global transportation •Ubiquitous mass media •Encryption •High Resolution Satellite Imagery •Precision Navigation & Timing •Design & fabrication of sophisticated: parts, electronics, biological materials • IED’s, EFP, semi-submersibles •High performance computing •Capital Equipment • Jet fighters, Naval fighting vessels, long range artillery • Missiles (but not UAV’s, Tomahawks) • Nuclear Weapons (?) •State-of-the-art sensors •Sophisticated C2 •Large numbers of trained troops Democritization of Technology Available to Individuals: State Governments: Distribution Statement “A” (Approved for Public Release, Distribution Unlimited) The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of Defense.
  • 8. Understanding Organizations and Their Relationships Traditional DOD (Nation State) Historic Military Counter-Insurgency Unexplored Territory Approved for Public Release, Distribution Unlimited
  • 9. Our physical systems are vulnerable to cyber attacks… Small group of academics took control of a car using Bluetooth and OnStar. They were able to disable the brakes, control the accelerator, and turn on the interior microphone.[1] Chinese cyber attack: “Highly sophisticated and targeted attack” on Google corporate infrastructure (known as Aurora) False speedometer reading Note that the car is in park…[1] K. Koscher, et al. "Experimental Security Analysis of a Modern Automobile," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 16-19, 2010. Approved for Public Release, Distribution Unlimited 9
  • 10. Approved for Public Release, Distribution Unlimited •Real-time cyberspace analytics •Intuitive views and interactions •Single fused situational awareness •Machine execution •Assured and integrated battle damage assessment •Work with range of skill sets, novice to expert Plan X A single view of the cyber battlespace for planning, operation and situational awareness Core Plan X Technology Base Intuitive Interfaces Cyber battlespace analytics Mission Planning Capability Database Platforms Mission Execution Plan X System network mapping data deploy, operate, measure
  • 11. 11 Scalable analytics & data processing technology Technical Area 1 - XDATA Quadratic scaling O(n^2) Correlation of subsets of data Statistics for an n^2 scaling analytic based on 20K records with feature vector length of 8000 used to generate a correlation coefficient matrix. Data locality (random access seek times) along with CPU usage are the primary factors in execution. *Actual measured times other times above are estimated n^3 scaling O(n^3) PCA/SVD, betweenness, force-directed layout “Betweenness” using 4.7 million nodes and 29 million edges1. 1 AFRL 2011 Small Medium Large Huge Massive Approved for public release; distribution is unlimited. • Propagation of uncertainty • Measuring non-linear relationships • Sampling and estimation techniques for distributed platforms • Methods for distributed dimensionality reduction, matrix factorization etc. • Streaming data feeds • Optimal cloud configurations and resource allocation with asymmetric components Challenges to achieve practical solutions with know accuracy in realistic environments Reduction methods?
  • 12. Getting convergent: Manageable diversity (CRASH‡) Management Interface & Dynamic Loader Component Map Dependency Map Diversity Management Middleware Address space layout randomization Instruction set randomization Functional Redundancy Methodij Taski Randomization of Lower Layers High-Level Visible Layers to User Remain Unchanged New architectures guided by biology Attacker System Users System Managers Make all systems look the same to the system users and managers, but different to the attackers. • Preventing common attacks. • Adapting in response to unanticipated attacks. • Create diversity so attacker has to deal with heterogeneity. ‡ Clean-slate design of Resilient, Adaptive, Secure Hosts Approved for Public Release, Distribution Unlimited 12
  • 13. Encrypted computing in the cloud as privately as in your data center (PROCEED‡) Program Approach • PROCEED is searching for efficient ways to compute on encrypted data that can be implemented on modern computers • Potential applications • High assurance network guards • Training simulators • Image processing It is theoretically possible to perform arbitrary computations on encrypted data without decrypting. Thus, preserving security even on untrustworthy computational infrastructure. [Gentry, 2009] [1] What if all computation could be done on encrypted data? • Secure computational outsourcing • System hardware and software provenance concerns reduced • Data provenance and availability remain concerns Will your foreign-built computer steal your data? ‡ PROgramming Computation on EncryptEd Data (PROCEED) [1] Craig Gentry. Fully Homomorphic Encryption Using Ideal Lattices. 41st ACM Symposium on Theory of Computing (STOC), 2009. Approved for Public Release, Distribution Unlimited 13
  • 14. Approved for Public Release, Distribution Unlimited. Active Authentication Fingerprint Ridge Ending Ridge Bifurcation Core Island Forensic authorship Average word length Type-token ratio Use of Punctuation Use of unique words Mouse tracking Time over a single location Drifting while reviewing topics Double click Hovering to review alt-text Repurposed TechnologyExisting Technology New Technology Source: epdeatonville.orgwp-content uploads2011 04fingerprint.jpg Source: The Mancurian Candidate, Robert Graves, P2, Amazon PreviewSource: google search for "real estate" with mouse tracking provided by IOGraph Biometric Identity Modalities Beyond passwords Objective Validate the individual at the keyboard by those unique factors that make up the individual. Approach Focus on software biometrics (those without hardware sensors). Rotate many different biometrics as the human at the keyboard is working, resulting in an invisible authentication method.
  • 15. Approved for Public Release, Distribution Unlimited Objective • Develop new program analysis tools and techniques for detecting malicious functionality in mobile applications. • Seek fundamental advances in program analysis that might enable DoD to vet other kinds of software, too. Approach • Produce practical automated analysis tools designed to keep malicious code out of DoD mobile application marketplaces. • Translate goal of keeping malicious code out of DoD mobile application marketplaces into lower-level properties that can be proven with automated program analysis tools. Automated Program Analysis for Cybersecurity (APAC) Third-party developers submit mobile apps to DoD. Some contain hidden malicious functionality. DoD analysts keep mobile app store free of malicious apps. Develop new tools and techniques for vetting mobile apps. APP APP STORE 15
  • 16. Objective •Fully-automated checks for broad classes of malicious features and dangerous flaws in software and firmware Approach •Detect attacks we have never seen before that are not based on signatures • Define malice: • Determine broad classes of hidden malicious functionality to rule out • Confirm the absence of malice: • Demonstrate the absence of those broad classes of hidden malicious functionality • Examine equipment at scale: • Scale to non-specialist technicians who must vet every individual new device used by DoD prior to deployment VET: Vetting Commodity IT Software and Firmware Smart Phones Routers Printers Approved for Public Release, Distribution Unlimited http://www.dtic.mil/whs/esd/cmd/index.htm http://broadband.mt.gov/providers.aspx http://www.benning.army.mil/library/content/MCoELibrariesEResources/mcoelibrarieseresources.htm http://www.mc4.army.mil/hardware/Printers Examples Images of specific hardware are for illustration only and should not be interpreted as implying vulnerabilities 16
  • 17. Objective: • Cost-effective construction of high- assurance cyber-physical systems. • Functionally correct. • Satisfy appropriate safety and security properties. Approach: • Use clean-slate formal methods • Produce high-assurance operating system components and control systems. • Develop a suite of program synthesizers and formal-methods tools. • Generate an integration workbench containing all HACMS tools and assured components. High Assurance Cyber Military Systems Proof • im • sa • sa when • on de • in en Idea: Synthesize & Verify Hig 12/8/11 “If soft by its m vulnera easier Felix Li High Assurance: Correctness, Resource Constraints Environment Description Functional Specification Synthesizer Code Proof Diagnostic Information Hardware Description Verified Libraries Safety Policy Security Policy Clean-slate formal-methods-based approach Approved for Public Release, Distribution Unlimited 17
  • 18. Cyber Grand Challenge Objective: A Cyber Grand Challenge for automated defenders similar to DEFCON Capture the Flag Approach: Create automated systems that can sense and respond to cyber attacks more rapidly than human operators Compete systems that can engage in counter-adaptation cycles and repel novel threats from networks • Anomaly detection, big data analytics, case-based reasoning, heuristics, game theory, and stochastic optimization Compete at a high level in cyber competitions Flag Monitoring Vulnerability Scan Service Poller Mixed Inputs Key Competition Testbed Further dissemination only as directed by DARPA Public Release Center or higher DoD authority
  • 19. Dark Nebula © Robert Traube Distribution Statement “A” (Approved for Public Release, Distribution Unlimited) The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of
  • 20. www.darpa.mil 20 Distribution Statement “A” (Approved for Public Release, Distribution Unlimited) The views, opinions, and/or findings contained in this article/presentation are those of the author/presenter and should not be interpreted as representing the official views or policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the Department of Defense.