Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Dan RoelkerProgram Manager, Information Innovation Office             Scaling Cyberwarfare                DARPA Cyber Coll...
Cyberartisan production doesn’t scaleAll cybertools have a limited shelf-life and operational relevance                   ...
Program: Binary Executable Transforms (BET)            Identify                                    Extract                ...
Hacker vs. Hacker approach doesn’t scale                                                                                 S...
Limitations to the Hacker vs. Hacker approach    Cyberwarfare is executed at the speed of light . . .                  For...
Pillars of Foundational Cyberwarfare                       Exploitation Research automation techniques, defeating formal m...
Ideas, thoughts, code? daniel.roelker@darpa.mil              Approved for Public Release, Distribution Unlimited.
Upcoming SlideShare
Loading in …5
×

Scaling Cyberwarfare (Roelker)

1,456 views

Published on

Presentation from the Colloquium on Future Directions in Cyber Security on Nov 7, 2011.

Published in: Technology, Education
  • Be the first to comment

  • Be the first to like this

Scaling Cyberwarfare (Roelker)

  1. 1. Dan RoelkerProgram Manager, Information Innovation Office Scaling Cyberwarfare DARPA Cyber Colloquium Arlington, VA November 7, 2011 Approved for Public Release, Distribution Unlimited.
  2. 2. Cyberartisan production doesn’t scaleAll cybertools have a limited shelf-life and operational relevance Cyberartisan Automation Skill Individual Technology-based Level of effort Manually intensive Mass produced Cost/Benefit “Too big to fail” Cost effective Approved for Public Release, Distribution Unlimited.
  3. 3. Program: Binary Executable Transforms (BET) Identify Extract Combine 1 1 1 Binary A 2 1 2 3 1 2 3 2 1 3 2 Binary B 1 2 2 1 2 3 1 3 2 1 1 Binary C 2 3 1 2 1 2 3 1 2 BET Basic Research Areas Automated combinatorial approach to software development given requirements could provide novel outcomes and diverse binary setsBET identifies and extracts functional components from binary executables with potential for reusing components in new combinations Approved for Public Release, Distribution Unlimited.
  4. 4. Hacker vs. Hacker approach doesn’t scale Skill Level Not everyone can be the cyber equivalent of a Navy SEAL Scaling Limitations Force size Execution speed Tactical depthWe don’t win wars by out-hiring an adversary, we win through technology Approved for Public Release, Distribution Unlimited.
  5. 5. Limitations to the Hacker vs. Hacker approach Cyberwarfare is executed at the speed of light . . . Force Size Limitations #of people trained per year # of people to execute a mission Execution Speed Limitations Speed of planning process Speed of mission operation Tactical Depth Limitations Real-time move-counter-move Multi-phase mission strategywe need breakthroughs in technology to accomplish this goal Approved for Public Release, Distribution Unlimited.
  6. 6. Pillars of Foundational Cyberwarfare Exploitation Research automation techniques, defeating formal methods, high-fidelity emulation Network Analysis on-demand topology, infrastructure capability, platform positioning Planning and Executionassured and automated execution, large-scale analytics, distributed planning Cyberwarfare Platform Development Visualization new interfaces, adaptable views, large-scale data representation Approved for Public Release, Distribution Unlimited.
  7. 7. Ideas, thoughts, code? daniel.roelker@darpa.mil Approved for Public Release, Distribution Unlimited.

×