RTX to Optimize Cyber Vulnerability Detection for DARPA

RTX BBN Technologies to advance high-fidelity exploit chain testing and evaluation.

Cyber vulnerability detection rendering.
Cyber vulnerability detection rendering.
RTX

CAMBRIDGE, Mass. - RTX's BBN Technologies was awarded a contract from DARPA to support its Intelligent Generation of Tools for Security, or INGOTS, program. INGOTS aims to strengthen cybersecurity by developing advanced methods to identify and mitigate complex exploit chains, preventing their use in real-world attacks.

Exploit chains pose a growing threat, amplified by the increasing complexity and sophistication of cyberattacks. The U.S. Cybersecurity and Infrastructure Security Agency's Known Exploited Vulnerabilities catalog has surpassed 1,300 entries, with steady growth reflecting the increasing number of threats targeting essential services and networks. Despite this rising threat, current assessment methods rely heavily on manual analysis, requiring significant expertise and time. INGOTS seeks to address this challenge by automating the creation, modification, modeling and analysis of exploit chains to enable faster and more effective security interventions.

Jack Dietz, BBN principal investigator, said, "Effectively countering exploit chains requires more than just identifying individual vulnerabilities. It demands a system that can replicate real-world attack scenarios and anticipate potential risks before they are exploited."

To support this effort, BBN will apply its expertise in testbed architecture to develop the System Test of Android at Large-scale Accelerating Generation and Modeling for INGOTS Test and Evaluation, or STALAGMITE. This system will serve as a comprehensive platform for testing and evaluating exploit analysis tools, offering key capabilities such as:

  • Accurate real-world simulations: High-fidelity testing in combined virtual and physical environments ensures realistic assessments of Android vulnerabilities in a secure and controlled setting.
  • Proactive threat responses: Seamless integration of INGOTS components enables security teams to anticipate and mitigate potential attacks, enhancing preparedness against emerging threats.
  • Efficient security research: A robust environment for reproducible, automated testing advances research in software vulnerabilities and countermeasures, improving operating system and application security.

"Today's manual methods for assessing exploitability are costly, time-consuming and lack scalability and efficiency," said Dietz. "We aim to alleviate this burden from security professionals by accelerating the automatic identification of security risks across various devices and configurations using precise testing and measurement to strengthen overall cybersecurity defenses."

While the program focuses on the Android ecosystem, the methodologies and technologies developed under INGOTS are expected to have far-reaching applications across personal, business, government and military sectors.

The BBN-led team includes Assured Information Security. Work on the program will be completed in Cambridge, Massachusetts; Columbia, Maryland; and Rome, New York.

More in IoT