Skip to main content

Currently Skimming:

Challenges of Engineering Cybersecurity: A Government Perspective--Tomas Vagoun
Pages 29-34

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 29...
... Its strategy, set forth in Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program (NSTC 2011) , directs federal agencies and challenges the research community at large to pursue game-changing advances in cybersecurity.
From page 30...
... . This strategy calls for the development of technologies such as nonpersistent execution environments, randomized execution of code, randomized network and host identities, randomizing compilers, dynamic address spaces, and automated patch synthesis and installation.
From page 31...
... When these self-monitoring systems detect a violation, they invoke built-in system services that attempt to diagnose the problem, using replay and reasoning techniques to isolate and characterize it; recover from the problem by having multiple redundant methods to achieve any given goal; synthesize filters to detect the same type of attack in the future and prevent it from succeeding; and automatically generate a patch to fix the underlying vulnerability. The DARPA CRASH program successfully demonstrated that it is possible to develop significantly more secure computing systems that incorporate gamechanging ideas that address core deficiencies of today's cyberspace, as summarized in Table 1.
From page 32...
... The most focused science-of-security research initiative funded by the federal government is the set of Science of Security Lablets, funded by the National Security Agency and launched in 2012. Four universities -- Carnegie Mellon University, University of Illinois at Urbana-Champaign, North Carolina State
From page 33...
... The growing emphasis on the science of security is strengthening foundations of security across many areas, including MTD. Efforts to develop and evaluate MTD techniques from a theoretical basis are growing, including, for example, a project that assesses how MTD techniques increase a system's entropy and decrease the predictability of its behavior (Zhuang et al.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.