Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber...
Transcript of Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber...
![Page 1: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/1.jpg)
Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. | Deputy Director
Intelligence Advanced Research Projects Activity
25 October 2017
![Page 2: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/2.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
IARPA Partners & Customers: The Intelligence Community
Coast Guard
Central Intelligence Agency
Army
Navy
Air Force
Na9onal Reconnaissance Office
Na9onal Geospa9al-Intelligence Agency
Na9onal Security Agency
Defense Intelligence Agency
Department of State
Department of Energy
Department of the Treasury
Department of Homeland Security
Federal Bureau of Inves9ga9on
Drug Enforcement Administra9on
Marine Corps
![Page 3: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/3.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
IARPA Mission
IARPA envisions and leads high-risk, high-payoff research that delivers innovative technology for
future overwhelming intelligence advantage
Ourproblemsarecomplexandmul)disciplinary Weemphasizetechnicalexcellence&technicaltruth
![Page 4: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/4.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
IARPA Method Bringthebestmindstobearonourproblems
FullandopencompeHHontothegreatestpossibleextent World-class,rotaHonalProgramManagers
Defineandexecuteresearchprogramsthat: Havegoalsthatareclear,measureable,ambiHousandcredible EmployindependentandrigorousTest&EvaluaHon InvolveICpartnersfromstarttofinish Runfromthreetofiveyears Publishpeer-reviewedresultsanddata,tothegreatestpossibleextent TransiHonnewcapabiliHestointelligencecommunitypartners
![Page 5: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/5.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
4 Core Research Thrusts
![Page 6: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/6.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Computing R&D
TRUSTWORTHY COMPONENTS
Gainthebenefitsofleading-edgehardwareandsoTwarewithoutcompromisingsecurity
RevoluHonaryadvancestosolveproblemsintractablewithtoday’scomputers
COMPUTATIONAL POWER
SAFE AND SECURE SYSTEMS
ProtecHngsystemsagainstcyberthreats
“Operate effectively in a globally interdependent and networked environment”
![Page 7: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/7.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
User
ApplicaHon
OperaHngSystem
Hypervisor
Firmware
Hardware
![Page 8: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/8.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
IARPA Cybersecurity-related research
User
TICCAT
CAUSE
STONESOUP
SCITESPAR
VirtUE
ApplicaHon
OperaHngSystem
Hypervisor
Firmware
HardwareRAVEN
HECTOR
![Page 9: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/9.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Cyber-attack Automated Unconventional Sensor Environment (CAUSE)
Howcanweforecastcyber-aWackevents,hourstoweeksearlierthanexisHngmethods?
CAUSEProgramgoals DevelopandvalidateunconvenHonalmulH-disciplinarysensortechnologythatwillforecastcyber-aWacksandcomplementexisHngadvancedintrusiondetecHoncapabiliHes.
![Page 10: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/10.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Approach
![Page 11: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/11.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Performer Modeling & Analytic Approaches LearningthespaHo-temporalstructurerelaHngobservablebehaviors(e.g.socialmediainteracHons)withhistoricalcyber-aWackdata
Learningotherfeaturesfromsensordata(e.g.,Darkwebposts)thatarepredicHveofevents
FusingnotonlypredicHonsfrommulHplemodels,butsignalsfrommulHplesensorsaswell
TrainingatranslaHonmodelusingaconvoluHonalneuralnetwork(CNN)approachforfeatureextracHonfromwebsitesinotherlanguages
![Page 12: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/12.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Sensor Research CONVENTIONAL UNCONVENTIONAL
INTERN
AL
NetworkBehaviorAnomalyDetec)on ThermalAnomalyDetec)onEX
TERN
AL
VulnerabilityMen)ons SocialMediaSen)mentAnalysis
ArehighfrequencymenHonsofsoTwarevulnerabiliHesindicaHveoffuturecyber-aWacks?
![Page 13: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/13.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Program Challenges Challenge#1:GroundTruth
EventTypes:atypologydefiningtherelevantcyber-aWackeventspaceisnecessaryforpredicHvemodelingandanalyHcs
HighFidelity:accuratepredicHonofeventdetailsadvancesthestate-of-the-artofcyber-aWackforecasHngandprovidesuHlityfordeployingeffecHvedefensivemeasures
LessonsLearned:developingreliabledatacollecHonandencodingprocessesisparamountforexecuHngasuccessfulprogram
![Page 14: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/14.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Program Challenges Challenge#2:Transparency
Cybersecurityanalystsarereluctanttoadoptblackboxsystemsthatfailtorevealthedecisionprocessandlacktransparency
AprogramobjecHveistopromotetransparencybyprovidinganAuditTrailcapabilitytorevealthedecisionprocessandconnectthedots
NarraHveprovidescontextaboutthewarningfromAuditTraildetails
![Page 15: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/15.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
CAUSE Technical Challenges HighDimensionalDataSources
PerHnentdatasources(e.g.,socialmedia,darkweb,news)areinherentlynoisyandhavehighdimensionality
Keychallengetoextractfeaturesandreducedimensionality
SensorResearch ConvenHonalandunconvenHonalsensorsrelyonbothinternal(e.g.,securityappliance)andexternaldatasources
SensorsmeasuremulH-modalobservablesignalssuchassenHment,outrage,andintentfrommulHpledatasources
KeychallengetomeasurenoisysignalsindicaHveofcyber-aWacks
![Page 16: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/16.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Virtuous User Environment (VirtUE)
Howcanwedevelopuserenvironmentsthataremoredynamic,secure,auditable,transferrable,andefficientthanthecurrentofferingsprovidedbytradiHonalphysicalworkstaHonsandcommercialVirtualdesktopinfrastructure?
![Page 17: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/17.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
VirtUE Program Goals UsethetechnologiesofthecloudtocreateanewuserinterfacethatmiHgatesuser-basedcomputerthreatsinthegovernment’scompuHngenvironment-“AbeWerVirtualDesktopInfrastructure”
MiHgatethisComputerSecurityConundrum: Computerusersareresponsibleformostofourcurrentsecurityincidents.Spear-Phishing,MaliciousWebcontent,usercarelessnessormalice
UsersneedconvenientaccesstocompuHngresourcestomaintainproducHvityandachieveorganizaHonalgoals
![Page 18: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/18.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Build a Dynamic, Securable User Environment Using the Cloud – A “Virtue”
“a virtual appliance built specifically for the purpose of safe, user-interactive computing tasks in the cloud”
![Page 19: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/19.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Redesign the Legacy User Environment Leveraging the Cloud
![Page 20: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/20.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
DBAdminVirtue
SharePointUserVirtue
AuditorVirtue
Emailuservirtue
InternetConsumervirtue
Documentcreatorvirtue
User interacting with 6 virtues in one interface
Provide a Clever Presentation Interface Merging User’s VirtUEs
![Page 21: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/21.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Scientific advances to Continuous Insider Threat Evaluation (SCITE)
HowcanweadvancethescienceandpracHceofinsiderthreatdetecHon?
ProgramGoals: ModelandforecasttheperformanceofexisHngandproposedinsiderthreatdetecHonenterprises
DevelopanewclassofacHveindicatorsandassociatedautomateddetecHontools
Status:programinprogress
![Page 22: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/22.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Security and Privacy Assurance Research (SPAR)
WhatdoyoudowhenaqueryistoosensiHvetoshare,andbulkingesHonofthedataraisesprivacyissues?
Query
Clientlearns:• Response• Querypolicy• Otherrecordcontents• Otherclients’queries
Serverlearns:• Querystructure• Querycontents• Queryresponse• Cross-querytrends
Client Server Database,Policy
![Page 23: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/23.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
SPAR Program Goals CreatesystemsthatguaranteeprivacywhilealsomaintainingcertainsecuritycharacterisHcs
GivesassurancetoadataownerthatonlyrelevantinformaHonisshared SupportsapracHcalsetofquerytypesandscalestorealisHcdatabasesizes
EnablescollaboraHonbetweennon-tradiHonal/occasionalpartners,andadministraHonwithoutaccesstocontent
![Page 24: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/24.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
SPAR Sharing Architecture Query
Client learns: • Response • Query policy • Other record contents • Other clients’ queries
Server learns: • Query structure • Query contents • Query response • Cross-query trends
Third party learns: • Query structure • Cross-query trends • # of records returned • Query contents • Record contents
Encrypted (DB)
Client Server
Third Party
DB, Policy
• Third Party learns limited information about DB and Queries
• Third Party management jointly decided by Client/Server
![Page 25: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/25.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Homomorphic Encryption Computing Techniques with Overhead Reduction (HECTOR)
Challenge:TobalancetheneedsofpolicycompliancewithprovidingaccesstodataneededtoprotectnaHonalsecurity.
Goal:Developacomprehensivesetofcryptographictools,programminglanguages,designandverificaHontoolstoenablenon-cryptographicexpertsystemarchitectsandapplicaHondeveloperstodevelopsecuredistributedapplicaHonsleveragingadvancedcryptographictechniques.
Status:TheBroadAreaAnnouncementclosesonDecember1st.
![Page 26: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/26.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Securely Taking on Executable Software of Uncertain Provenance (STONESOUP)
HowcanwebenefitfromhighlyfuncHonalsoTwareproducedbyaglobalizedindustrywithoutpuhngtheenterpriseatrisk?
Is this SOUP safe?
SOUP
![Page 27: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/27.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
STONESOUP Accomplishments ProtectssystemsbyautomaHcallyprevenHngsoTwareweaknessesfrombeingexploited
AutomaHcallyfindsandmiHgatesexploitablesecurityvulnerabiliHesinsoTware
Analyzesprograms,notthedataprocessedbyprograms FindsflawsthatleadtoinsecureprogramcondiHons,ratherthanlookingforknownaWackpaWerns
Status:Programendedin2015 ToolsarehostedonlinebyNIST.SearchIARPASTONESOUPNIST
![Page 28: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/28.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Circuit Analysis Tools (CAT) and Rapid Analysis of Various Emerging Nanoelectronics (RAVEN)
Microelectronicsdesignsareadvancingfasterthanourcapacitytoanalyzethem.
HowdowekeepupwithmicroelectronicswhennextgeneraHoncircuitsare10,000xsmallerthanahumanhair?
![Page 29: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/29.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Circuit Analysis Tools (CAT) Developtoolsforintegratedcircuitanalysisatfuturetechnologynodes,specificallythe22nmnodeandbeyond.
Analysistoolscapableofworkingwithadvancedpackagesincludingbutstackeddie.
ToolsandtechniquesmustaddressanalysisandimagingchallengesforwhichtherearecurrentlynosoluHons.
ProgramStatus Programcomplete. Commercialproductsareinthemarketplace.
![Page 30: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/30.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Rapid Analysis of Various Emerging Nanoelectronics (RAVEN)
TheRAVENprogramaimstodevelopaprototypeanalysistoolforacquiringimagesfromalllayersina1cm2areaofa14nmintegratedcircuit,within25days.
Programgoalsinclude:afullyautomatedprototypetoolcapableofrapidimageacquisiHonfromanindividualchip.
![Page 31: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/31.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
Trusted Integrated Chips (TIC) Over90%oftheworld’sintegratedcircuitfoundrycapacityiscontrolledbynon-UScompanies.
HowcanweleveragethisglobalinfrastructurewhileprotecHngintellectualpropertyandensuringsecurity?
![Page 32: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/32.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
TIC Program Goals EnsuretheU.S.IntelligenceCommunitycanobtainthehighestperformancepossibleinintegratedcircuits.
Obtainassurancethatdesignsaresafeandsecure–notcompromisedwithmaliciouscircuitry.
Ensuresecurityofdesigns,capability,andperformancewhilesimultaneouslyprotecHngintellectualproperty.
RealizesecuresystemscombiningadvancedCMOSwithhighervaluechips.
![Page 33: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/33.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
TIC Technical Accomplishments Demonstratedsplit-manufacturingofintegratedcircuitsusingastate-of-the-artuntrustedFEOL(FrontEndofLine)foundryandatrustedBEOL(BackEndofLine)foundry.
130nm,65nm,and28nmnodes.
ProgramStatus Programisinitsfinalphase. Findingsarebeingsharedwithgovernmentandindustry.
![Page 34: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/34.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
IARPA Cybersecurity-related research
User
TICCAT
CAUSE
STONESOUP
SCITESPAR
VirtUE
ApplicaHon
OperaHngSystem
Hypervisor
Firmware
HardwareRAVEN
HECTOR
![Page 35: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt](https://reader036.fdocuments.in/reader036/viewer/2022070915/5fb5dde21723a8374a613bc2/html5/thumbnails/35.jpg)
INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)
How to Engage with IARPA iarpa.gov|301-851-7500
RESEARCH PROGRAMS
“SEEDLINGS” RFIS AND WORKSHOPS
Opportuni)estoEngage:PRIZE
CHALLENGES
MulH-yearresearchfundingopportuniHesonspecifictopics.
Noproposalsrequired.SubmitsoluHonstoourproblems–ifyoursoluHonsarethebest,youreceiveacashprizeandbraggingrights.
OpportuniHestolearnwhatiscoming,andtoinfluenceprograms.
Typicallya9-12monthstudy;youcansubmityourresearchproposalatanyHme.WestronglyencourageinformaldiscussionwithaPMbeforeproposalsubmission.
• ReachouttoourProgramManagers.• ScheduleavisitifyouareintheDCareaorinvite
ustovisityou