Back to news

August 5, 2019 | Local, Security

Hacker Community to Take on DARPA Hardware Defenses at DEF CON 2019

This month, DARPA will bring a demonstration version of a secure voting ballot box equipped with hardware defenses in development on the System Security Integrated Through Hardware and Firmware (SSITH) program to the DEF CON 2019 Voting Machine Hacking Village (Voting Village). The SSITH program is developing methodologies and design tools that enable the use of hardware advances to protect systems against software exploitation of hardware vulnerabilities. To evaluate progress on the program, DARPA is incorporating the secure processors researchers are developing into a secure voting ballot box and turning the system loose for public assessment by thousands of hackers and DEF CON community members.

Many of today's hardware defenses cover very specific instances or vulnerabilities, leaving much open to attack or compromise. Instead of tackling individual instances, SSITH researchers are building defenses that address classes of vulnerabilities. In particular, SSITH is tackling seven vulnerabilities classes identified by the NIST Common Weakness Enumeration Specification (CWE), which span exploitation of permissions and privilege in the system architectures, memory errors, information leakage, and code injection.

“There are a whole set of cyber vulnerabilities that happen in electronic systems that are at their core due to hardware vulnerabilities – or vulnerabilities that hardware could block,” said Dr. Linton Salmon, the program manager leading SSITH. “Current efforts to provide electronic security largely rely on robust software development and integration, utilizing an endless cycle of developing and deploying patches to the software firewall without addressing the underlying hardware vulnerability. The basic concept around SSITH is to make hardware a more significant participant in cybersecurity, rather than relegating system security only to software.”

Under the SSITH program, researchers are exploring a number of different design approaches that go well beyond patching. These include using metadata tagging to detect unauthorized system access; employing formal methods to reason about integrated circuit systems and guarantee the accuracy of security characteristics; and combining hardware performance counters (HPCs) with machine learning to detect attacks and establish protective fences within the hardware. One team from the University of Michigan is developing a novel security approach that changes the unspecified semantics of a system every 50 milliseconds. Currently, attackers continuously probe a system to locate these undefined sections and, over time, are able to create a system map to identify possible hacks. By changing the construct every 50 milliseconds, attackers do not have enough time to find those weaknesses or develop an accurate representation of the system as a whole.

To evaluate the hardware security concepts in development on the SSITH program, DARPA – working with Galois – is pursuing a voting system evaluation effort to provide a demonstration system that facilitates open challenges. The program elected to use a voting system as its demonstration platform to provide researchers with an accessible application that can be evaluated in an open forum. Further, the topic of election system security has become an increasingly critical area of concern for the hacker and security community, as well as the United States more broadly.

“DARPA focuses on creating technologies to enhance national defense, and election system security falls within that remit. Eroding trust in the election process is a threat to the very fabric of our democracy,” noted Salmon.

While protecting democracy is a critical national defense issue, SSITH is not trying to solve all issues with election system security nor is it working to provide a specific solution to use during elections. “We expect the voting booth demonstrator to provide tools, concepts, and ideas that the election enterprise can use to increase security, however, our true aim is to improve security for all electronic systems. This includes election equipment, but also defense systems, commercial devices, and beyond,” said Salmon.

During DEF CON 2019, the SSITH voting system demonstrator will consist of a set of RISC-V processors that the research teams will modify to include their SSITH security features. These processors will be mounted on field programmable gate arrays (FPGAs) and incorporated into a secure ballot box. Hackers will have access to the system via an Ethernet port as well as a USB port, through which they can load software or other attacks to challenge the SSITH hardware. Since SSITH's research is still in the early stages, only two prototype versions of the 15 processors in development will be available for evaluation.

“At this year's Voting Village, hackers may find issues with the processors and quite frankly we would consider that a success. We want to be transparent about the technologies we are creating and find any problems in these venues before the technology is placed in another venue where a compromise could be more dangerous,” said Salmon.

Following DEF CON 2019, the voting system evaluation effort will go on a university roadshow where additional cybersecurity experts will have an opportunity to further analyze and hack the technology. In 2020, DARPA plans to return to DEF CON with an entire voting system, which will incorporate fixes to the issues discovered during the previous year's evaluation efforts. The 2020 demonstrator will use the STAR-Vote system architecture, which is a documented, open source architecture that includes a system of microprocessors for the voting booth, ballot box, and other components. It also includes a verifiable paper ballot, providing both digital and physical representations of the votes cast within the booth.

“While the 2020 demonstrator will provide a better representation of the full attack surface, the exercise will not result in a deployable voting system. To aid in the advancement of secure election equipment as well as electronic systems more broadly, the hardware design approaches and techniques developed during the SSITH program will be made available to the community as open-source items,” concluded Salmon.

https://www.darpa.mil/news-events/2019-08-01

On the same subject

  • Industry briefing questions Ottawa's choice of guns, defence systems for new frigates

    December 26, 2019 | Local, Naval

    Industry briefing questions Ottawa's choice of guns, defence systems for new frigates

    Murray Brewster The Department of National Defence has faced some tough, pointed questions about whether it has chosen the right radar, main gun and close air defence systems for the navy's new frigates, which will soon hit the drawing board. An unsolicited defence industry slide deck presentation, obtained by CBC News, questions each of those key components in the planned $60 billion modernization of the fleet. It was circulated earlier this year and put in front of the senior federal officials in charge of the program. The defence industry briefing presentation points out that the Lockheed Martin-built AN/SPY-7 radar system — an updated, more sophisticated version of an existing U.S. military system — has not been installed and certified on any warship. A land-based version of the system is being produced and fielded for the Japanese government. The briefing calls it "an unproven radar" system that will be "costly to support," and claims it comes at a total price tag of $1 billion for all of the new ships, which the undated presentation describes as "an unnecessary expenditure." Lockheed Martin Canada and British-based BAE Systems Inc. were chosen earlier this year by the Liberal government to design and help build 15 new warships to replace the country's existing patrol frigates — the backbone of the navy. Old guns, inadequate defence systems? The briefing raises concerns about DND's choice of a main gun for the frigates — a 127 millimetre MK 45 described by the briefing as 30-year-old technology that will soon be obsolete and cannot fire precision-guided shells. The briefing also singles out as inadequate the Sea Ceptor close air defence system, which is meant to shoot down incoming, ship-killing missiles. Given the Canadian government's past missteps with military procurement — buying used equipment or opting for developmental systems that take years to get into service — a defence expert said the caution being expressed by the industry now is legitimate, but in some respects it's coming years too late. "There's a risk anytime you try to do something new for the first time," said Dave Perry, an analyst who specializes in procurement at the Canadian Global Affairs Institute. The navy struggled for years to get second-hand British submarines up to Canadian standards. The air force also sat on its hands while the manufacturer of the CH-148 Cyclone helicopters worked out all of the developmental bugs. The presentation, Perry said, essentially tries to re-litigate decisions made by federal officials over three years ago, when the government's request for proposals was mapped out. 'The ship has sailed' "This is calling into question whether the government set down [technical] markers in an appropriate spot or not," he said. "There is always the possibility that these issues can be revisited, but I think at this point the ship has sailed because a competition was run, it did produce a preferred bidder." The pressure to get the new frigate design right is enormous, given the enormous expense involved and the changing nature of warfare, Perry added. The briefing presentation apparently was circulated by a rival radar-maker which was not part of the bidding process. Federal officials declined to name the company. Raytheon Canada Ltd. and its U.S. parent are among the biggest electronics and radar manufacturers in the world. A request for comment sent to their international business division went unanswered last week. 'We did our homework' The concerns in the briefing were presented last summer to: Pat Finn, former head of materiel at DND; Andre Fillion, the assistant deputy minister of defence purchasing at Public Services and Procurement Canada; and Rear Admiral Casper Donovan, the navy's director general for "future ship capability." DND confirmed the existence of the briefing presentation but refused to say who received it or which defence contractor was pushing it. "It is not uncommon for companies to present unsolicited material to our department when they are unsuccessful in a competitive process," spokesman Andrew McKelvey said recently. "We do not comment on these unsolicited documents as they are provided outside the scope of our established procurement process." Both the department and the commander of the navy stand behind the decisions that were made and the systems chosen for the new frigate. "We did our homework. We talked to other navies. We engaged our allies," said Vice-Admiral Art McDonald, who added DND was aware of other options on the market. Delivering the warships on schedule and on budget in the mid-2020s is a constant preoccupation in the department, he said. He would not say whether the choice of radar system might mean a delay in delivery. A senior executive at Lockheed Martin Canada said the company's radar system is identical to one selected by the U.S. government and other countries. Much of the system's hardware, and some of its software, have been used on U.S. Aegis-type guided missile destroyers and cruisers. The difference between the radar system chosen for Canada's frigates and conventional systems is in its array: the Lockheed Martin system sweeps around and above the vessel, rather than only horizontally. "The work that remains is to integrate it into the ship and integrate it into the ship's combat system," said Gary Fudge, general manager and vice president of Lockheed Martin Canada. "We worked for two years with BAE during the proposal stage to optimize the ship design with this particular radar." https://www.cbc.ca/news/politics/frigate-gun-radar-canadian-navy-1.5405054

  • NATO at 70: leaders meet in London today

    December 4, 2019 | Local, Aerospace, Naval, Land, C4ISR

    NATO at 70: leaders meet in London today

    By Marc Montgomery Most alliances historically don't last more than a couple of decades, but the North Atlantic Treaty Alliance is 70 this year, and has grown over that time to its now 29 members. Originally formed as a protection against the Soviets, new and much different types of threats lurk, and there are divisions in the organisation. Colin Robertson, a former Canadian diplomat and a Vice President of the Canadian Global Affairs Institute. discusses the issues. U.S. President Donald Trump has been forcefully scolding many members of the Alliance for not living up to defence spending. In 2018, the Alliance widened the rules as to what counts as defence spending. Canada is among several members, including France and Germany, not living up to the commitment to spend at least two per cent of GDP on defence. This now includes for example, pensions paid to former soldiers. The Liberal government has been meticulously searching for any expense that might be counted as defence spending including RCMP expenses for members involved in peacekeeping, costs for Canada's spy agency-the Communications Security Establishment (CSE) and even death benefits for veteran's survivors. Canada now spends about 1.27 per cent of its Gross Domestic Product on defence. Robertson notes that the Alliance is burdened with disagreements, but that this is not unusual in NATO's history. It now faces new and much different threats from the more simpler Cold War period, such as new state actor threats, social but somewhat fluid and unorganised threats like piracy and mass migration, and non-state actors like Al Queda and DAESH, and a move by Russia and China to militarise space. While it has its hurdles to overcome, Robertson feels the Alliance will remain strong coming out of this week's meetings. https://www.rcinet.ca/en/2019/12/03/nato-at-70-leaders-meet-in-london-today/

  • Britain offers Canadian military help to defend the Arctic | CBC News

    September 27, 2021 | Local, Naval

    Britain offers Canadian military help to defend the Arctic | CBC News

    Britain is signalling its interest in working with the Canadian military in the Arctic by offering to take part in cold-weather exercises and bring in some of its more advanced capabilities — such as nuclear-powered submarines — to help with surveillance and defence in the Far North.

All news