Title :
Securing the supply chain for commodity IT devices by automated scenario generation
Author_Institution :
Raytheon BBN Technol., Cambridge, MA, USA
Abstract :
Almost all commodity IT devices include firmware and software components from non-US suppliers, potentially introducing grave vulnerabilities to homeland security by enabling cyber-attacks via flaws injected into these devices through the supply chain. However, determining that a given device is free of any and all implementation flaws is computationally infeasible in the general case; hence a critical part of any vetting process is prioritizing what kinds of flaws are likely to enable potential adversary goals. We present Theseus, a four-year research project sponsored by the DARPA VET program. Theseus will provide technology to automatically map and explore the firmware/software (FW/SW) architecture of a commodity IT device and then generate attack scenarios for the device. From these device attack scenarios, Theseus then creates a prioritized checklist of FW/SW components to check for potential vulnerabilities. Theseus combines static program analysis, attack graph generation algorithms, and a Boolean satisfiability solver to automate the checklist generation workflow. We describe how Theseus exploits analogies between the commodity IT device problem and attack graph generation for networks. We also present a novel approach called Component Interaction Mapping to recover a formal model of a device´s FW/SW architecture from which attack scenarios can be generated.
Keywords :
Boolean functions; DP industry; firmware; graph theory; program diagnostics; security of data; supply chain management; Boolean satisfiability solver; DARPA VET program; FW-SW; Theseus; adversary goals; attack graph generation algorithms; automated scenario generation; checklist generation workflow; commodity IT devices; component interaction mapping; cyber-attacks; firmware-software architecture; grave vulnerabilities; homeland security; nonUS suppliers; software components; static program analysis; supply chain security; vetting process; Computer architecture; Hardware; Microprogramming; Operating systems; Security; Supply chains; attack graph generation; commodity devices; program analysis; supply chain;
Conference_Titel :
Technologies for Homeland Security (HST), 2015 IEEE International Symposium on
Conference_Location :
Waltham, MA
Print_ISBN :
978-1-4799-1736-5
DOI :
10.1109/THS.2015.7225307