Today, Commercial off-the-shelf (COTS), Government off-the-shelf (GOTS), and Free and open-source (FOSS) software support nearly all aspects of DoD, military, and commercial operations. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities, using a suite of tools and techniques that require extensive training. While effective, the process is largely manual and requires hundreds, if not thousands, of hours of effort for each vulnerability discovered. The use of automated program analysis to support the discovery process has become more prevalent in recent years. However, current automation is limited and only able to reason over a few vulnerability classes without human involvement due to a lack of understanding of certain software semantics and context clues.
To address the challenges facing our abilities to scale and accelerate vulnerability detection, DARPA’s Information Innovation Office (I2O) today announced the Computers and Humans Exploring Software Security (CHESS) program. CHESS aims to develop capabilities to discover and address zero-day vulnerabilities at a speed and scale appropriate for the continuously growing, complex software ecosystem by enabling humans and computers to collaboratively reason over software artifacts. Moving from a manual, human-driven process to one that is based on advanced computer-human collaboration creates opportunities for a broader range of technical–or potentially non-technical–experts to assist in the detection and remediation of known and emerging threats.
“The relatively small number of skilled hackers that exist across industry, government, and academia, combined with the limitations of current automated program analysis capabilities has made it extremely difficult to scale vulnerability detection and remediation to the level needed for today’s software environment,” said Dustin Fraze, the I2O program manager leading CHESS. “Through CHESS, we’re looking to gather, understand, and convert the expertise of human hackers into automated analysis techniques that are more accessible to a broader range of technologists. By allowing more individuals to contribute to the process, we’re creating a way to scale vulnerability detection well beyond its current limits.”
To achieve its goal, the CHESS program is seeking innovative proposals across five technical areas. Through these efforts, the program plans to examine novel approaches to rapid vulnerability detection that focus on identifying system information gaps requiring human assistance, generating representations of these gaps appropriate for human collaborators, capturing and integrating human insight into the analysis process, and ultimately synthesizing software patches based on the collaborative analysis.
Under the first technical area, research teams will focus on capturing and analyzing the process expert hackers use to reason over software artifacts–such as source code and compiled binaries. Leveraging the gathered insights, researchers will create a basis for developing new forms of highly effective communication and other human-computer interactions.
Performers working on the second technical area will seek to develop technologies capable of discovering and patching specified vulnerability classes in both source code and compiled binaries. Through the process, they will also identify missing but relevant information to vulnerability analysis–or information gaps–addressable by the human-generated insights found under the first technical area. Research efforts under both of these technical areas will be highly collaborative, as the goal is to create a system for vulnerability detection that is easily understandable by both computers and humans.
“Humans have world knowledge as well as semantic and contextual understanding that is beyond the reach of automated program analysis alone,” said Fraze. “These information gaps inhibit machine understanding for many classes of software vulnerabilities. Properly communicated, human insights can fill these information gaps and enable expert hacker-level vulnerability analysis at machine speeds.”
The third and fourth technical areas focus on creating the testing and evaluation criteria for the collaborative human/computer technologies created under the first two technical areas. These areas will look to a pre-determined set of vulnerability classes of interest to create a realistic set of test problems, as well as the current state-of-the-art in vulnerability detection tools and techniques to create a measurement baseline. The final technical area will manage evaluations, integration, and seek to transition the final solution to government and/or commercial partners.
The CHESS program will span one 18-month and two 12-month phases for a total of 42 months. Each phase will focus on increasing the complexity of an application the CHESS system is able to analyze effectively.
Interested proposers have an opportunity to learn more about the CHESS program during a Proposers Day, scheduled for Thursday, April 19 from 1:00-4:15pm ET at the DARPA Conference Center, located at 675 N. Randolph St., Arlington, Virginia, 22203. To learn more, visit https://www.fbo.gov/index?s=opportunity&mode=form&id=557cfe6440e774224a008f6923e526f3&tab=core&_cview=0
For a full program description, please visit the Broad Agency Announcement published here on FedBizOpps: https://www.fbo.gov/index.php?s=opportunity&mode=form&id=cb10b80125a2e1377f3920586d36b5c9&tab=core&_cview=0
# # #
Media with inquiries should contact DARPA Public Affairs at email@example.com
Associated images posted on www.darpa.mil and video posted at www.youtube.com/darpatv may be reused according to the terms of the DARPA User Agreement, available here: http://go.usa.gov/cuTXR.
You are now leaving the DARPA.mil website that is under the control and
management of DARPA. The appearance of hyperlinks does not constitute
endorsement by DARPA of non-U.S. Government sites or the information,
products, or services contained therein. Although DARPA may or may not
use these sites as additional distribution channels for Department of
Defense information, it does not exercise editorial control over all of
the information that you may find at these locations. Such links are
provided consistent with the stated purpose of this website.
After reading this message, click to continue