[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? Andrew Futter will provide a comprehensive assessment of the worrying and little-understood cyber challenge to nuclear weapons and explain how the many dynamics we label as “cyber” will impact the way that the world thinks about and manages the bomb. The talk will cut through the hype surrounding the cyber phenomenon and provide a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence, and crisis management. He will make the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of "hacking the bomb."
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
What is CyberSecurity? Who are the threats? Why is cyber attack happening? How bad is it? How do attackers do it? What can we learn from Star Wars?
This presentations Cyber Attacks, State of CyberSecurity, some guidance for the students interested in getting into the field, and some great resources.
[CB19] Keynote:Hacking the Bomb - Cyber Threats and Nuclear Weapons by Andrew...CODE BLUE
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? Andrew Futter will provide a comprehensive assessment of the worrying and little-understood cyber challenge to nuclear weapons and explain how the many dynamics we label as “cyber” will impact the way that the world thinks about and manages the bomb. The talk will cut through the hype surrounding the cyber phenomenon and provide a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence, and crisis management. He will make the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of "hacking the bomb."
Cyber Hacking & Security - IEEE - Univ of Houston 2015-04Kyle Lai
What is CyberSecurity? Who are the threats? Why is cyber attack happening? How bad is it? How do attackers do it? What can we learn from Star Wars?
This presentations Cyber Attacks, State of CyberSecurity, some guidance for the students interested in getting into the field, and some great resources.
Before venturing into learning and practicing security testing aka penetration testing, every individuals should have fundamental skills without which it will be very difficult to grasp all the related concepts.
I am sharing the basic details, which I have used to train fellow enthusiasts before initiating them into Security Testing.
Lecture on 22 January 2019
CAP Theorem
Byzantines General Problem
Blockchain for Beginners
Elective course from the Faculty of Information Technology, Thai - Nichi Institute of Technology, Bangkok for undergraduate students.
#BlockchainTNI2018
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for
decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack
has been, for decades, far easier than cyber defense.
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...Michael Rosenblum
Every long-term IT project reaches a point when one or more fundamental concepts that define the whole system are no longer true. If the business is lucky, this may lead to a brand new development project. If not, the current system must be altered to support requirements for which it was never designed. This presentation discusses how to mitigate possible design-time risks using available technologies and concepts from a database perspective, such as repository-based solutions, code generators, abstract models, micro-SOA, etc. The presentation will also cover real-life examples of best practices for handling unexpected architectural shifts based on systems with 10+ years of life span.
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
More Related Content
Similar to Blockchain for Cyber Defense: Will It Be As Good As You Think?
Before venturing into learning and practicing security testing aka penetration testing, every individuals should have fundamental skills without which it will be very difficult to grasp all the related concepts.
I am sharing the basic details, which I have used to train fellow enthusiasts before initiating them into Security Testing.
Lecture on 22 January 2019
CAP Theorem
Byzantines General Problem
Blockchain for Beginners
Elective course from the Faculty of Information Technology, Thai - Nichi Institute of Technology, Bangkok for undergraduate students.
#BlockchainTNI2018
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for
decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack
has been, for decades, far easier than cyber defense.
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...Michael Rosenblum
Every long-term IT project reaches a point when one or more fundamental concepts that define the whole system are no longer true. If the business is lucky, this may lead to a brand new development project. If not, the current system must be altered to support requirements for which it was never designed. This presentation discusses how to mitigate possible design-time risks using available technologies and concepts from a database perspective, such as repository-based solutions, code generators, abstract models, micro-SOA, etc. The presentation will also cover real-life examples of best practices for handling unexpected architectural shifts based on systems with 10+ years of life span.
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
'Blockchain and Cryptocurrency' Subject @ Korea University, 2021
01. Syllabus
02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -
03. Blockchain's Theoretical Foundation, Cryptography
04. Bitcoin and Nakamoto Blockchain
05. Ethereum and Smart Contract
06. NFT and Metaverse
07. Cardano(ADA) and Other Altcoins
08. Dark Coins
09. Blockchain Usage Beyond Currency - Way to Design Good Blockchain Business Models -
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
Even in this pandemic situation, thank you for making and running the HITCON 2021 so well. Thank you for giving me the chance to talk!
This presentation is revised by reinforcing Q&A. Look forward to seeing you offline next year!
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
Kid Blockchain - Everything You Need to Know - (Part 1)
01. 화폐의 역사 : 금에서부터 간편결제에 이르기까지 ... 4P
02. 비트코인의 탄생 ... 27P
03. 비트코인과 블록체인의 세부 동작원리 ... 85P
04. 작업증명(PoW)이란? ... 158P
05. 비트코인과 블록체인이 당면한 기술적 문제 ... 171P
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
Seungyeon Jeong, Sooyoung Kang, and Seungjoo Kim, "Application of the Common Criteria to Building Trustworthy Automotive SDLC", Proc. of The 19th ICCC 2020, The 19th International Common Criteria Conference, Virtual (online) Conference, November 16-18, 2020.
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
Sooyoung Kang, Seungyeon Jeong, and Seungjoo Kim, "Assurance-Level Driven Method for Integrating Security into SDLC Process”, Proc. of The 18th CCUF Workshop 2020, The 18th Common Criteria Users Forum Workshop, Virtual (online) Conference, November 12, 2020.
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
Seungjoo Kim, "How South Korea Is Fighting North Korea's Cyber Threats", Asia Transnational Threats Forum - Virtual Roundtable on North Korean Cyber Threats, Center for East Asia Policy Studies at BROOKINGS, October 15, 2020.
o 행 사 명 : 포스트코로나 시대의 ICT산업 미래전략포럼
o 일시/장소 : ‘20.5.22.(금) 10:00~16:30 / 에스팩토리(서울 성수동 소재)
o 주최/후원 : KAIT, KCA, IITP / SKT, KT, LGU+, LG전자 등
o 참 석 자 : 과기정통부 2차관, 정보통신산업정책관 및 ICT산업분야별 전문가 등
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common Criteria @ ICCC 2019 (International Common Criteria Conference), which is a major conference for the community of experts involved in security evaluation
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
Verification of IVI Over-The-Air using UML/OCL @ ICCC 2019 (International Common Criteria Conference), which is a major conference for the community of experts involved in security evaluation
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Blockchain for Cyber Defense: Will It Be As Good As You Think?
1. /51
BLOCKCHAIN FOR CYBER DEFENSE:
WILL IT BE AS GOOD AS YOU THINK?
Suhyeon Lee
Korea Univ. /
ROKA
Seungjoo Kim
Korea Univ.
This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the
ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-
00403)supervised by the IITP(Institute for Information &communications Technology Planning
&Evaluation
2. /51
Suhyeon Lee
Ph.D Student in Korea University
Captain in ROKA
Suhyeon Lee ( ) is a Ph.D student in Korea
university. I have 3 years experience as a researcher
in Agency for Defense Development.
As a security researcher, I am interested in network
security, cyber defense, and blockchain
• Cryblock 2019 @ IEEE Infocom speaker
“Countering Block Withholding Attack Efficiently”
• Cryblock 2020 @ ACM Mobicom speaker
“Proof-of-Stake at Stake: Predatory, Destructive Attack on
PoS Cryptocurrencies”
I like to get groundbreaking ideas from philosophy.
My favorite philosophers: Derrida, Nietzsche,
Foucault, Wittgenstein, etc.
orion-alpha at korea.ac.kr
2
3. /51
Seungjoo Kim
Professor in Korea University
Seungjoo Kim is a professor of School of Cybersecurity
in Korea University from 2011.
In addition to being a professor, he is positioning a head
of SANE(Security Assessment aNd Engineering) Lab, an
adviser of undergraduate hacking club 'CyKor', a
founder/advisory director of an international security &
hacking conference 'SECUINSIDE'. Since 2018, he has
been a review board member of Black Hat Asia.
His main research areas focus on trustworthy system
development methodology such as secure SDLC, RMF,
Common Criteria, CMVP, and blockchain etc. He is a
corresponding author.
skim71 at korea.ac.kr
3
4. /51
TOPICS
What is blockchain for cyber
defense
Challenges for blockchain in cyber
defense
Related military projects and
analysis
Takeaway
4
5. /51
TARGETS
Someone interested in blockchain
Someone interested in cyber
defense
Someone interested in how
blockchain can be hacked
Someone needs fresh ideas
→ It will be fun to know about blockchain
→ It will be fun to know about cyber defense perspectives
Someone who needs fresh ideas
5
9. /51
Cyber Defense, maybe you don’t know
Cyber security Information security
Threats to
information-
based assets
Threats using ICT Rossouw Von Solms and Johan Van Niekerk. From
information security to cyber security. computers &
security, 38:97–102, 2013 9
10. /51
Cyber Defense, maybe you don’t know
Cyber security Information security
National security
(or defense)
Cyber defense
Narrowly military defense
Widely national security
10
12. /51
Cyber Defense, maybe you don’t know
2007 Cyber attack
to Estonia
2010 Stuxnet to Iranian
nuclear facilities
2015 BlackEnergy to Ukranian
power gird
Therefore nation countries need cybersecurity technologies
12
14. /51
Blockchain looks secure, reliable
“Defense systems require high
security and high reliability…”
“It’s unhackable”
“Okay, then Defense needs it!”
14
15. /51
Related Projects - Preview
• Military Encrypted Messaging App Built on Blockchain
• Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs
• Decentralized Key Management using Blockchain
• Army Innovation Network -Information System
• Provenance Using Blockchain on Disconnected Networks
• Navy's Approved Multi-Factor Authentication for Personal Mobile Devices
• Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks
• Chinese soldiers reward system using cryptocurrency for good performance
• Blockchain-based system to record intelligence in Australia
• Blockchain to help secure aerospace and defense (A&D) supply chains
• French Military Police Record on Tezos Blockchain
• South Korean Military's Blockchain-Based Digital IDentification (DID)
…… and so on
15
18. /51
What is waiting for us in the battleground?
War is the realm of uncertainty; three quarters of
the factors on which action in war is based are
wrapped in a fog of greater or lesser uncertainty. A
sensitive and discriminating judgment is called for; a
skilled intelligence to scent out the truth.
Carl von Clausewitz
@realClausewitz
18
20. /51
Can be more miserable
Where are
Trees?
They burnt down
a year ago
Mountain
20
21. /51
Let’s assume you got an order to apply
Blockchain in Cyber Defense
“Adopt the blockchain Technology
and secure our networks”
“Aye Aye Sir!”
(There are trusted networks…)
21
30. /51
Challenge 2:: Forced Dynamic Environment
- Case : Sudden expansion
Total nodes: 8
Acceptable faulty nodes : (8-1)/3 = 2
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Too easy to make consensus!
The majority becomes the minority.
That is, now, your minority can make the consensus
30
31. /51
Challenge 2:: Forced Dynamic Environment
- Case : Sudden shrinkage
Total nodes: 8
Acceptable faulty nodes : (8-1)/3 = 3
Nearly impossible to make
consensus!
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 11
The minority becomes the majority.
That is, now, your majority can’t make the consensus
31
32. /51
Challenge 2:: Forced Dynamic Environment
- Case : Bombing & Partitioning
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
There’s no majority anymore. Furthermore…. 32
33. /51
Challenge 2:: Forced Dynamic Environment
- Case : Bombing & Partitioning
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Consistency?
Furthermore, we will meet a fork problem. But we can’t just choose one. 33
34. /51
Challenge 2:: Forced Dynamic Environment
In more extreme situations,
→ Assumptions can be easily broken.
→ Weaknesses can be easily revealed.
→ Especially, deterministic consensus mechanisms
that CAN NOT guarantee liveness are….
34
35. /51
Challenge 3:: Resource Shortage
▪ The first problem is resource consumption.
Blockchain’s other name is “state replication system”
Influence on “Mission critical functions” should be checked
35
36. /51
Challenge 3:: Resource Shortage
▪ The first problem is resource consumption.
▪ The second problem is that solving resource
consumption is not easy.
Speed
Our ultimate goal in acquisitions should be
to deliver capability to the warfighter more
rapidly, but unfortunatelytoday it takes too
long to develop and field our systems.
-DEBORAHLEE JAMES,
SECRETARY OF THE AIR FORCE
Bureaucratic acquisition process
36
37. /51
What can you do?
▪ PoW…. We can’t waste energy
▪ PoS…. We don’t have coins
Let’s go to the private style → PBFT style
Challenge 3:: Resource Shortage
37
38. /51
What can you do?
▪ PoW…. We can’t waste energy
▪ PoS…. We don’t have coins
Let’s go to the private style → PBFT style
⇒ But not flexible & Goto Challenge 2 again!
Challenge 3:: Resource Shortage
38
39. /51
Challenge 3:: Resource Shortage
→ Mission is always first.
However, due to the military environment,
support is not so timely and sufficient.
39
40. /51
Related Projects
• Data Integrity*
• Supply Chain Management
• Internet-of-Things
• Communications
• Identification & Authentication
Total 42
14 (33%)
12 (29%)
8 (19%)
11 (26%)
5 (12%)
* Projects only concerned to data integrity
- One project can belong to multiple categories
40
42. /51
Related Projects
• Data Integrity
- French military police records on Tezos
- US DoD project “Sharing of defense research,
development, testing, and evaluation - Data
distribution using blockchain”
- US DoD project “Provenance using blockchain on
disconnected networks”
42
43. /51
Related Projects
•Supply Chain Management
-US DoD project “Blockchain supply
chain enhancement for trusted and
assured FPGA and ASICs”
Blockchain on supply chain management is
also actively researched for efficiency not
only for security
43
44. /51
Related Projects
• Internet-of-Things
- US DHS project “Combining blockchain
technology with critical infrastructure”
It’s sensors and cameras that protect the integrity and
authenticity of critical infrastructure. Blockchain projects
on IoT may suffer from Challenge #3, Resource Shortage.
44
45. /51
Related Projects
• Communications
- US DARPA project “Building an encrypted
msg system based on blockchain technology”
If it is related to messages in tactical networks,
Challenge #2, Forced Dynamic Environments and
Challenge #3, Resource Shortage should be considered.
45
46. /51
Related Projects
• Identification & Authentication
- US DHS project “Decentralized key
management using blockchain”
- South Korea project “blockchain-based DID”
46
47. /51
Related Projects
• Military Encrypted Messaging App Built on Blockchain
• Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs
• Decentralized Key Management using Blockchain
• Army Innovation Network -Information System
• Provenance Using Blockchain on Disconnected Networks
• Navy's Approved Multi-Factor Authentication for Personal Mobile Devices
• Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks
• Chinese soldiers reward system using cryptocurrency for good performance
• Blockchain-based system to record intelligence in Australia
• Blockchain to help secure aerospace and defense (A&D) supply chains
• French Military Police Record on Tezos Blockchain
• South Korean Military's Blockchain-Based Digital IDentification (DID)
…… and so on
47
50. /51
Takeaway
- Cyber defense makes more challenges and
requirements for blockchain.
• Air-gaps, Sudden expansion, shrinkage, partitioning..
- Blockchain’s resource consumption can be a
problem, but defense environments are not flexible
to assign more enough resources.
- We don’t need to cling to blockchain if it’s not adaptable.
Otherwise, it will bring more issues.
50
51. /51
Get in Touch
We welcome any questions and discussions
Suhyeon Lee
orion-alpha at korea.ac.kr
Seungjoo Kim
skim71 at korea.ac.kr
51
52. /51
Thank you
Suhyeon Lee
Korea Univ. /
ROKA
Seungjoo Kim
Korea Univ.
This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the
ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-
00403)supervised by the IITP(Institute for Information &communications Technology Planning
&Evaluation