Securing the supply chain for commodity IT devices by automated scenario generation
Title | Securing the supply chain for commodity IT devices by automated scenario generation |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Jilcott, S. |
Conference Name | 2015 IEEE International Symposium on Technologies for Homeland Security (HST) |
Date Published | apr |
Keywords | adversary goals, attack graph generation, attack graph generation algorithms, automated scenario generation, Boolean functions, Boolean satisfiability solver, checklist generation workflow, commodity devices, commodity IT devices, component interaction mapping, Computer architecture, cyber-attacks, DARPA VET program, DP industry, firmware, firmware-software architecture, FW-SW, graph theory, grave vulnerabilities, Hardware, homeland security, Microprogramming, nonUS suppliers, Operating systems, program analysis, program diagnostics, pubcrawl170112, security, security of data, software components, static program analysis, supply chain, supply chain management, supply chain security, Supply chains, Theseus, vetting process |
Abstract | Almost all commodity IT devices include firmware and software components from non-US suppliers, potentially introducing grave vulnerabilities to homeland security by enabling cyber-attacks via flaws injected into these devices through the supply chain. However, determining that a given device is free of any and all implementation flaws is computationally infeasible in the general case; hence a critical part of any vetting process is prioritizing what kinds of flaws are likely to enable potential adversary goals. We present Theseus, a four-year research project sponsored by the DARPA VET program. Theseus will provide technology to automatically map and explore the firmware/software (FW/SW) architecture of a commodity IT device and then generate attack scenarios for the device. From these device attack scenarios, Theseus then creates a prioritized checklist of FW/SW components to check for potential vulnerabilities. Theseus combines static program analysis, attack graph generation algorithms, and a Boolean satisfiability solver to automate the checklist generation workflow. We describe how Theseus exploits analogies between the commodity IT device problem and attack graph generation for networks. We also present a novel approach called Component Interaction Mapping to recover a formal model of a device's FW/SW architecture from which attack scenarios can be generated. |
DOI | 10.1109/THS.2015.7225307 |
Citation Key | jilcott_securing_2015 |
- security of data
- Hardware
- Homeland Security
- Microprogramming
- nonUS suppliers
- operating systems
- program analysis
- program diagnostics
- pubcrawl170112
- security
- grave vulnerabilities
- software components
- static program analysis
- Supply Chain
- supply chain management
- supply chain security
- supply chains
- Theseus
- vetting process
- component interaction mapping
- attack graph generation
- attack graph generation algorithms
- automated scenario generation
- Boolean functions
- Boolean satisfiability solver
- checklist generation workflow
- commodity devices
- commodity IT devices
- adversary goals
- computer architecture
- cyber-attacks
- DARPA VET program
- DP industry
- firmware
- firmware-software architecture
- FW-SW
- graph theory