Feeds

Drone security project to go open source

DARPA project to stop droneware being hacked will see some software freed

3 Big data security analytics techniques

Australia’s high end tech research engine NICTA will take a pivotal role in an US$18 million US Defence project which will develop software to protect the systems in drones from cyber attack.

The US Defense Advanced Research Projects Agency (DARPA) awarded the 4.5 year contract to a global consortium, which includes Australia's NICTA, the Boeing Company, Galois, the University of Minnesota and led by Rockwell Collins. A team of six to eight dedicated NICTA researchers will be placed on the project with more staff added at peak times in the project.

The project is part of DARPA’s High-Assurance Cyber Military Systems (HACMS) program, hatched earlier this year to produce ultra secure systems that are resilient to emerging cyber threats.

The HACMS program will focus on cyber-physical systems in the vehicle space, but it is anticipated that the tools and techniques developed in the program will be relevant to other kinds of systems as well.

The HACMS project will produce a set of open source tools integrated into a software workbench, which will be widely distributed for use in both the commercial and defense software sectors, according to DARPA.

A NICTA spokesperson said that the project will be using open source as much as possible but the specific elements are still being worked out.

The work will be undertaken by the same group of NICTA scientists that developed the internationally recognised, game changing , seL4 operating system. In 2009, NICTA researchers grabbed the global spotlight when they proved the correctness of 7,500 lines of C code in the seL4 operating system microkernel.

“NICTA’s selection for this project reflects our status as world leaders in the verification of operating systems. Now we will have the opportunity to greatly extend the scale, aiming to ensure the safety of a complete, real-world system, something considered impossible only a few years ago,” said Leader of NICTA’s Software Systems Research Group , Scientia Professor Gernot Heiser.

Key HACMS technologies include semi-automated software synthesis systems, verification tools such as theorem provers and model checkers, and specification languages.

HACMS aims to produce a set of publicly available tools integrated into a high-assurance software workbench, widely distributed to both defense and commercial sectors.

In the defense sector, HACMS plans to enable high-assurance military systems ranging from unmanned ground, air and underwater vehicles, to weapons systems, satellites, and command and control devices. ®

3 Big data security analytics techniques

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.