Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole...

10
Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551

description

Complexity makes Cyber Threats Assymetric Vulnerabilities exist in the best code. The developer, user, and attacker all don't know where the holes are. Finding them, in general, is an undecidable problem. Most tools that find bugs are only incremental – there is no one who can say ”this code is clean” Assymetry arises from the fact that only one vulnerability compromises the whole code. Developer has to find all of them, which means they must do something that is, in general, impossible.

Transcript of Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole...

Page 1: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Living with Thriving on Complexity in Cybersecurity

Rob ArmstrongJaideep Ray

Jackson MayoNicole Lemaster

Sandia National LabsLivermore, CA 94551

Page 2: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Securing an Arbitrary Code is not Just Hard, Its Impossible

Restated: generic code has vulnerabilities that are unprovable and unknowable.

Not statistical, even in principal Turing completeness demands that an generic code is

undecidable

So now what?

Page 3: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Complexity makes Cyber Threats Assymetric

Vulnerabilities exist in the best code. The developer, user, and attacker all don't know where the holes are. Finding them, in general, is an undecidable problem.

Most tools that find bugs are only incremental – there is no one who can say ”this code is clean”

Assymetry arises from the fact that only one vulnerability compromises the whole code. Developer has to find all of them, which means they must do something that is, in general, impossible.

Page 4: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Observation #1: A Program's Feature Set Has Many Implementations

A particular feature set has infinitely many implementations

Finite large number if size is bounded...

Page 5: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Observation #2: Ensemble of Instances Permits the Formulation of Statistics

Assumption: multiple implementations randomize security holes.

Ensemble of randomized undecideable codes allows the formation of statistics about the security improvement of the ensemble.

Page 6: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Break it into components

Page 7: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Living Systems Adapt to Cope with Unknowable Attacks

Port type is similar to a genotype, component implementaton similar to alleles of a gene.

Page 8: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Reassemble Alleles into Individuals Different alleles can be

assembled into new individuals that have ”randomized” security holes.

New individuals are differently vulnerable and potentially adaptive.

Page 9: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Compare Responses from Individuals Now different individuals will

produce the same feature set but react differently to attacks.

Page 10: Living with Thriving on Complexity in Cybersecurity Rob Armstrong Jaideep Ray Jackson Mayo Nicole Lemaster Sandia National Labs Livermore, CA 94551.

Evolve new and more robust individuals

Eliminate the one with the differentiated response.