Visible to the public Securing the supply chain for commodity IT devices by automated scenario generation

TitleSecuring the supply chain for commodity IT devices by automated scenario generation
Publication TypeConference Paper
Year of Publication2015
AuthorsJilcott, S.
Conference Name2015 IEEE International Symposium on Technologies for Homeland Security (HST)
Date Publishedapr
Keywordsadversary goals, attack graph generation, attack graph generation algorithms, automated scenario generation, Boolean functions, Boolean satisfiability solver, checklist generation workflow, commodity devices, commodity IT devices, component interaction mapping, Computer architecture, cyber-attacks, DARPA VET program, DP industry, firmware, firmware-software architecture, FW-SW, graph theory, grave vulnerabilities, Hardware, homeland security, Microprogramming, nonUS suppliers, Operating systems, program analysis, program diagnostics, pubcrawl170112, security, security of data, software components, static program analysis, supply chain, supply chain management, supply chain security, Supply chains, Theseus, vetting process
Abstract

Almost all commodity IT devices include firmware and software components from non-US suppliers, potentially introducing grave vulnerabilities to homeland security by enabling cyber-attacks via flaws injected into these devices through the supply chain. However, determining that a given device is free of any and all implementation flaws is computationally infeasible in the general case; hence a critical part of any vetting process is prioritizing what kinds of flaws are likely to enable potential adversary goals. We present Theseus, a four-year research project sponsored by the DARPA VET program. Theseus will provide technology to automatically map and explore the firmware/software (FW/SW) architecture of a commodity IT device and then generate attack scenarios for the device. From these device attack scenarios, Theseus then creates a prioritized checklist of FW/SW components to check for potential vulnerabilities. Theseus combines static program analysis, attack graph generation algorithms, and a Boolean satisfiability solver to automate the checklist generation workflow. We describe how Theseus exploits analogies between the commodity IT device problem and attack graph generation for networks. We also present a novel approach called Component Interaction Mapping to recover a formal model of a device's FW/SW architecture from which attack scenarios can be generated.

DOI10.1109/THS.2015.7225307
Citation Keyjilcott_securing_2015