Specifically, Galois will develop its Prattle system for the Air Force. Galois describes Prattle as a system that generates traffic that misleads an attacker that has penetrated a network: making them doubt what they have learned, or to cause them to make mistakes that increase their likelihood of being detected sooner.
The Air Force is giving Galois a $750,000 grant to work on the program as part of a larger $100 million effort to expand cyber detection technologies. The funds will be used to take the program out of its prototype phase. “The idea is to try to fool the adversary about what’s going on in the world, so that they either make bad decisions they take longer or they are easier to detect,” said Adam Wick, research lead at Galois, the company contracted with the Air Force for the project.
Award part of a growing number of Galois projects focused on helping organizations deploy safe, and cost-effective deception technology to deal with cyber threats. Galois announced today that it has been awarded a $750,000 grant from the Air Force Research Lab (AFRL) to develop a new, advanced network cyber deception technology: Prattle. Prattle generates […]
Paving the way for government use, DARPA has funded a handful of startups, such as Guardtime Federal and Galois Inc., to develop blockchain uses for secure communications, as well as potentially everything from weapons systems to files. The work should be completed within a year, Booher said. Some defense contractors are already demonstrating and deploying the blockchain, he said.
If the verification goes well, it would inch DARPA closer to using some form of blockchain technology for the military, Booher says. “We’re certainly thinking through a lot of applications,” he says. “As Galois does its verification work and we understand at a deep level the security properties pf this [technology] then I would start to set up a series of meetings [with the rest of the agency] to start that dialog.”
When the project started, a “Red Team” of hackers could have taken over the helicopter almost as easily as it could break into your home Wi-Fi. But in the intervening months, engineers from the Defense Advanced Research Projects Agency had implemented a new kind of security mechanism—a software system that couldn’t be commandeered. Key parts of Little Bird’s computer system were unhackable with existing technology, its code as trustworthy as a mathematical proof. Even though the Red Team was given six weeks with the drone and more access to its computing network than genuine bad actors could ever expect to attain, they failed to crack Little Bird’s defenses.
Galois and Guardtime Federal Awarded $1.8 Million DARPA Contract to Formally Verify Blockchain-Based Integrity Monitoring System
Galois and Guardtime Federal today announced they have jointly been awarded a $1.8 million contract by the Defense Advanced Research Projects Agency (DARPA) to verify the correctness of Guardtime Federal’s Keyless Signature Infrastructure (KSI). The contract will fund a significant effort that aims to advance the state of formal verification tools and all blockchain-based integrity […]
The Defense Advanced Research Projects Agency awarded a $6 million contract to Galois, a Portland, Oregon-based computer science company, to build out a product that can identify “advanced persistent threats” — cyberintrusions that allow the actor to remain in the system for an extended period. The company is also working with the National Institute of Standards in Technology on an internet of things pilot. Galois is developing a system that could collect consumer data from smart-home devices and services, while attempting to preserve their privacy. It has also demonstrated software to DOD that could help prevent drones from being hacked.
Galois Awarded $6 Million DARPA Contract To Address Advanced Persistent Threats (APTs) in Systems and Networks
Galois today announced it has been awarded a $6 million contract under a Defense Advanced Research Projects Agency (DARPA) program to develop a system to detect Advanced Persistent Threat (APT) cyber attacks in increasingly complex enterprise network and system environments.
Seven experts, including Galois Rigorous Software Engineering Lead Joe Kiniry, weigh in on the current use and practice of formal methods in cybersecurity. “FM researchers are pursuing two complementary paths. The bulk of the community continues to focus on foundations (what I call “pure FM”), while the rest of the community looks for opportunities to […]