combating short- and long-term cyber threats · 2020-06-10 · combating short- and long-term cyber...

35
Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. | Deputy Director Intelligence Advanced Research Projects Activity 25 October 2017

Upload: others

Post on 14-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. | Deputy Director

Intelligence Advanced Research Projects Activity

25 October 2017

Page 2: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

IARPA Partners & Customers: The Intelligence Community

Coast Guard

Central Intelligence Agency

Army

Navy

Air Force

Na9onal Reconnaissance Office

Na9onal Geospa9al-Intelligence Agency

Na9onal Security Agency

Defense Intelligence Agency

Department of State

Department of Energy

Department of the Treasury

Department of Homeland Security

Federal Bureau of Inves9ga9on

Drug Enforcement Administra9on

Marine Corps

Page 3: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

IARPA Mission

IARPA envisions and leads high-risk, high-payoff research that delivers innovative technology for

future overwhelming intelligence advantage

  Ourproblemsarecomplexandmul)disciplinary  Weemphasizetechnicalexcellence&technicaltruth

Page 4: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

IARPA Method Bringthebestmindstobearonourproblems

  FullandopencompeHHontothegreatestpossibleextent  World-class,rotaHonalProgramManagers

Defineandexecuteresearchprogramsthat:  Havegoalsthatareclear,measureable,ambiHousandcredible  EmployindependentandrigorousTest&EvaluaHon  InvolveICpartnersfromstarttofinish  Runfromthreetofiveyears  Publishpeer-reviewedresultsanddata,tothegreatestpossibleextent  TransiHonnewcapabiliHestointelligencecommunitypartners

Page 5: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

4 Core Research Thrusts

Page 6: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Computing R&D

TRUSTWORTHY COMPONENTS

Gainthebenefitsofleading-edgehardwareandsoTwarewithoutcompromisingsecurity

RevoluHonaryadvancestosolveproblemsintractablewithtoday’scomputers

COMPUTATIONAL POWER

SAFE AND SECURE SYSTEMS

ProtecHngsystemsagainstcyberthreats

“Operate effectively in a globally interdependent and networked environment”

Page 7: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

User

ApplicaHon

OperaHngSystem

Hypervisor

Firmware

Hardware

Page 8: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

IARPA Cybersecurity-related research

User

TICCAT

CAUSE

STONESOUP

SCITESPAR

VirtUE

ApplicaHon

OperaHngSystem

Hypervisor

Firmware

HardwareRAVEN

HECTOR

Page 9: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Cyber-attack Automated Unconventional Sensor Environment (CAUSE)

  Howcanweforecastcyber-aWackevents,hourstoweeksearlierthanexisHngmethods?

  CAUSEProgramgoals  DevelopandvalidateunconvenHonalmulH-disciplinarysensortechnologythatwillforecastcyber-aWacksandcomplementexisHngadvancedintrusiondetecHoncapabiliHes.

Page 10: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Approach

Page 11: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Performer Modeling & Analytic Approaches   LearningthespaHo-temporalstructurerelaHngobservablebehaviors(e.g.socialmediainteracHons)withhistoricalcyber-aWackdata

  Learningotherfeaturesfromsensordata(e.g.,Darkwebposts)thatarepredicHveofevents

  FusingnotonlypredicHonsfrommulHplemodels,butsignalsfrommulHplesensorsaswell

  TrainingatranslaHonmodelusingaconvoluHonalneuralnetwork(CNN)approachforfeatureextracHonfromwebsitesinotherlanguages

Page 12: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Sensor Research CONVENTIONAL UNCONVENTIONAL

INTERN

AL

NetworkBehaviorAnomalyDetec)on ThermalAnomalyDetec)onEX

TERN

AL

VulnerabilityMen)ons SocialMediaSen)mentAnalysis

ArehighfrequencymenHonsofsoTwarevulnerabiliHesindicaHveoffuturecyber-aWacks?

Page 13: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Program Challenges   Challenge#1:GroundTruth

  EventTypes:atypologydefiningtherelevantcyber-aWackeventspaceisnecessaryforpredicHvemodelingandanalyHcs

  HighFidelity:accuratepredicHonofeventdetailsadvancesthestate-of-the-artofcyber-aWackforecasHngandprovidesuHlityfordeployingeffecHvedefensivemeasures

  LessonsLearned:developingreliabledatacollecHonandencodingprocessesisparamountforexecuHngasuccessfulprogram

Page 14: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Program Challenges   Challenge#2:Transparency

  Cybersecurityanalystsarereluctanttoadoptblackboxsystemsthatfailtorevealthedecisionprocessandlacktransparency

  AprogramobjecHveistopromotetransparencybyprovidinganAuditTrailcapabilitytorevealthedecisionprocessandconnectthedots

  NarraHveprovidescontextaboutthewarningfromAuditTraildetails

Page 15: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

CAUSE Technical Challenges   HighDimensionalDataSources

  PerHnentdatasources(e.g.,socialmedia,darkweb,news)areinherentlynoisyandhavehighdimensionality

  Keychallengetoextractfeaturesandreducedimensionality

  SensorResearch  ConvenHonalandunconvenHonalsensorsrelyonbothinternal(e.g.,securityappliance)andexternaldatasources

  SensorsmeasuremulH-modalobservablesignalssuchassenHment,outrage,andintentfrommulHpledatasources

  KeychallengetomeasurenoisysignalsindicaHveofcyber-aWacks

Page 16: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Virtuous User Environment (VirtUE)

  Howcanwedevelopuserenvironmentsthataremoredynamic,secure,auditable,transferrable,andefficientthanthecurrentofferingsprovidedbytradiHonalphysicalworkstaHonsandcommercialVirtualdesktopinfrastructure?

Page 17: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

VirtUE Program Goals   UsethetechnologiesofthecloudtocreateanewuserinterfacethatmiHgatesuser-basedcomputerthreatsinthegovernment’scompuHngenvironment-“AbeWerVirtualDesktopInfrastructure”

  MiHgatethisComputerSecurityConundrum:  Computerusersareresponsibleformostofourcurrentsecurityincidents.Spear-Phishing,MaliciousWebcontent,usercarelessnessormalice

  UsersneedconvenientaccesstocompuHngresourcestomaintainproducHvityandachieveorganizaHonalgoals

Page 18: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Build a Dynamic, Securable User Environment Using the Cloud – A “Virtue”

“a virtual appliance built specifically for the purpose of safe, user-interactive computing tasks in the cloud”

Page 19: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Redesign the Legacy User Environment Leveraging the Cloud

Page 20: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

DBAdminVirtue

SharePointUserVirtue

AuditorVirtue

Emailuservirtue

InternetConsumervirtue

Documentcreatorvirtue

User interacting with 6 virtues in one interface

Provide a Clever Presentation Interface Merging User’s VirtUEs

Page 21: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Scientific advances to Continuous Insider Threat Evaluation (SCITE)

  HowcanweadvancethescienceandpracHceofinsiderthreatdetecHon?

  ProgramGoals:  ModelandforecasttheperformanceofexisHngandproposedinsiderthreatdetecHonenterprises

  DevelopanewclassofacHveindicatorsandassociatedautomateddetecHontools

  Status:programinprogress

Page 22: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Security and Privacy Assurance Research (SPAR)

  WhatdoyoudowhenaqueryistoosensiHvetoshare,andbulkingesHonofthedataraisesprivacyissues?

Query

Clientlearns:•  Response•  Querypolicy•  Otherrecordcontents•  Otherclients’queries

Serverlearns:•  Querystructure•  Querycontents•  Queryresponse•  Cross-querytrends

Client Server Database,Policy

Page 23: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

SPAR Program Goals   CreatesystemsthatguaranteeprivacywhilealsomaintainingcertainsecuritycharacterisHcs

  GivesassurancetoadataownerthatonlyrelevantinformaHonisshared  SupportsapracHcalsetofquerytypesandscalestorealisHcdatabasesizes

  EnablescollaboraHonbetweennon-tradiHonal/occasionalpartners,andadministraHonwithoutaccesstocontent

Page 24: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

SPAR Sharing Architecture Query

Client learns: •  Response •  Query policy •  Other record contents •  Other clients’ queries

Server learns: •  Query structure •  Query contents •  Query response •  Cross-query trends

Third party learns: •  Query structure •  Cross-query trends •  # of records returned •  Query contents •  Record contents

Encrypted (DB)

Client Server

Third Party

DB, Policy

•  Third Party learns limited information about DB and Queries

•  Third Party management jointly decided by Client/Server

Page 25: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Homomorphic Encryption Computing Techniques with Overhead Reduction (HECTOR)

  Challenge:TobalancetheneedsofpolicycompliancewithprovidingaccesstodataneededtoprotectnaHonalsecurity.

  Goal:Developacomprehensivesetofcryptographictools,programminglanguages,designandverificaHontoolstoenablenon-cryptographicexpertsystemarchitectsandapplicaHondeveloperstodevelopsecuredistributedapplicaHonsleveragingadvancedcryptographictechniques.

  Status:TheBroadAreaAnnouncementclosesonDecember1st.

Page 26: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Securely Taking on Executable Software of Uncertain Provenance (STONESOUP)

  HowcanwebenefitfromhighlyfuncHonalsoTwareproducedbyaglobalizedindustrywithoutpuhngtheenterpriseatrisk?

Is this SOUP safe?

SOUP

Page 27: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

STONESOUP Accomplishments   ProtectssystemsbyautomaHcallyprevenHngsoTwareweaknessesfrombeingexploited

  AutomaHcallyfindsandmiHgatesexploitablesecurityvulnerabiliHesinsoTware

  Analyzesprograms,notthedataprocessedbyprograms  FindsflawsthatleadtoinsecureprogramcondiHons,ratherthanlookingforknownaWackpaWerns

  Status:Programendedin2015  ToolsarehostedonlinebyNIST.SearchIARPASTONESOUPNIST

Page 28: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Circuit Analysis Tools (CAT) and Rapid Analysis of Various Emerging Nanoelectronics (RAVEN)

  Microelectronicsdesignsareadvancingfasterthanourcapacitytoanalyzethem.

  HowdowekeepupwithmicroelectronicswhennextgeneraHoncircuitsare10,000xsmallerthanahumanhair?

Page 29: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Circuit Analysis Tools (CAT)   Developtoolsforintegratedcircuitanalysisatfuturetechnologynodes,specificallythe22nmnodeandbeyond.

  Analysistoolscapableofworkingwithadvancedpackagesincludingbutstackeddie.

  ToolsandtechniquesmustaddressanalysisandimagingchallengesforwhichtherearecurrentlynosoluHons.

  ProgramStatus  Programcomplete.  Commercialproductsareinthemarketplace.

Page 30: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Rapid Analysis of Various Emerging Nanoelectronics (RAVEN)

  TheRAVENprogramaimstodevelopaprototypeanalysistoolforacquiringimagesfromalllayersina1cm2areaofa14nmintegratedcircuit,within25days.

  Programgoalsinclude:afullyautomatedprototypetoolcapableofrapidimageacquisiHonfromanindividualchip.

Page 31: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

Trusted Integrated Chips (TIC)   Over90%oftheworld’sintegratedcircuitfoundrycapacityiscontrolledbynon-UScompanies.

  HowcanweleveragethisglobalinfrastructurewhileprotecHngintellectualpropertyandensuringsecurity?

Page 32: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

TIC Program Goals   EnsuretheU.S.IntelligenceCommunitycanobtainthehighestperformancepossibleinintegratedcircuits.

  Obtainassurancethatdesignsaresafeandsecure–notcompromisedwithmaliciouscircuitry.

  Ensuresecurityofdesigns,capability,andperformancewhilesimultaneouslyprotecHngintellectualproperty.

  RealizesecuresystemscombiningadvancedCMOSwithhighervaluechips.

Page 33: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

TIC Technical Accomplishments   Demonstratedsplit-manufacturingofintegratedcircuitsusingastate-of-the-artuntrustedFEOL(FrontEndofLine)foundryandatrustedBEOL(BackEndofLine)foundry.

  130nm,65nm,and28nmnodes.

  ProgramStatus  Programisinitsfinalphase.  Findingsarebeingsharedwithgovernmentandindustry.

Page 34: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

IARPA Cybersecurity-related research

User

TICCAT

CAUSE

STONESOUP

SCITESPAR

VirtUE

ApplicaHon

OperaHngSystem

Hypervisor

Firmware

HardwareRAVEN

HECTOR

Page 35: Combating Short- and Long-Term Cyber Threats · 2020-06-10 · Combating Short- and Long-Term Cyber Threats Stacey A. Dixon, Ph.D. ... Cybersecurity analysts are reluctant to adopt

INTELLIGENCEADVANCEDRESEARCHPROJECTSACTIVITY(IARPA)

How to Engage with IARPA iarpa.gov|301-851-7500

[email protected]

RESEARCH PROGRAMS

“SEEDLINGS” RFIS AND WORKSHOPS

Opportuni)estoEngage:PRIZE

CHALLENGES

MulH-yearresearchfundingopportuniHesonspecifictopics.

Noproposalsrequired.SubmitsoluHonstoourproblems–ifyoursoluHonsarethebest,youreceiveacashprizeandbraggingrights.

OpportuniHestolearnwhatiscoming,andtoinfluenceprograms.

Typicallya9-12monthstudy;youcansubmityourresearchproposalatanyHme.WestronglyencourageinformaldiscussionwithaPMbeforeproposalsubmission.

•  ReachouttoourProgramManagers.•  ScheduleavisitifyouareintheDCareaorinvite

ustovisityou