SBIR-STTR Award

Tunable Cyber Defensive Security Mechanisms
Award last edited on: 10/21/2019

Sponsored Program
SBIR
Awarding Agency
DOD : DARPA
Total Award Amount
$1,646,588
Award Phase
2
Solicitation Topic Code
SB153-003
Principal Investigator
Stelios Sidiroglou

Company Information

Aarno Labs LLC

One Broadway Street 14th Floor
Cambridge, MA 02142
   (617) 222-7664
   info@aarno-labs.com
   www.aarno-labs.com
Location: Single
Congr. District: 07
County: Middlesex

Phase I

Contract Number: ----------
Start Date: ----    Completed: ----
Phase I year
2016
Phase I Amount
$149,585
Evaluating security mechanisms is a difficult and manual process. To effectively compare different techniques, security analysts use synthetic benchmarks that are typically comprised of simple test cases or a combination of known vulnerabilities in an attempt to provide coverage for different classes of attacks. As such, security mechanisms adapt their techniques to guarantee good coverage for the synthetic benchmarks but provide little guarantees of their efficacy beyond that. To ensure accurate evaluation and comparison of competing security techniques on real-world programs, we need automated techniques for injecting realistic and verifiable vulnerabilities. We propose to develop a new technique and system for automatically generating and injecting realistic vulnerabilities to real-world applications. Our proposed system uses targeted symbolic execution to discover program paths that could be used to generate vulnerabilities (e.g., integer overflows). The programs paths (i.e., symbolic constraints) are then modified using information from formal methods (e.g.,, using SMT solvers) to generate and inject new code , at the source- or binary-level, that is provably vulnerable (e.g., the system can prove that the generated conditions along a specific program path can generate an overflow). If successful, our proposed system can transform the evaluation of security systems and enable novel pedagogical tools.

Phase II

Contract Number: ----------
Start Date: ----    Completed: ----
Phase II year
2017
Phase II Amount
$1,497,003
Evaluating security mechanisms is a difficult and manual process. To effectively compare different techniques, security analysts use synthetic benchmarks that are typically comprised of simple test cases or a combination of known vulnerabilities in an attempt to provide coverage for different classes of attacks. As such, security mechanisms adapt their techniques to guarantee good coverage for the synthetic benchmarks but provide little guarantees of their efficacy beyond that. To ensure accurate evaluation and comparison of competing security techniques on real-world programs, we need automated techniques for injecting realistic and verifiable vulnerabilities. In phase I, we developed a new technique and system for automatically generating and injecting realistic vulnerabilities to real-world applications. Our proposed system uses targeted symbolic execution to discover program paths that could be used to generate vulnerabilities (e.g., integer overflows). In phase II, we will improve our prototype with enhanced capabilities and improved scalability, robustness and usability. This effort will enhance the prototype's Technology Readiness Level and enable a transition to the DoD and commercial sector. If successful, our proposed system can transform the evaluation of security systems and enable novel pedagogical tools.Evaluating security mechanisms is a difficult and manual process. To effectively compare different techniques, security analysts use synthetic benchmarks that are typically comprised of simple test cases or a combination of known vulnerabilities in an attempt to provide coverage for different classes of attacks. As such, security mechanisms adapt their techniques to guarantee good coverage for the synthetic benchmarks but provide little guarantees of their efficacy beyond that. To ensure accurate evaluation and comparison of competing security techniques on real-world programs, we need automated techniques for injecting realistic and verifiable vulnerabilities. In phase I, we developed a new technique and system for automatically generating and injecting realistic vulnerabilities to real-world applications. Our proposed system uses targeted symbolic execution to discover program paths that could be used to generate vulnerabilities (e.g., integer overflows). In phase II, we will improve our prototype with enhanced capabilities and improved scalability, robustness and usability. This effort will enhance the prototype's Technology Readiness Level and enable a transition to the DoD and commercial sector. If successful, our proposed system can transform the evaluation of security systems and enable novel pedagogical tools.