Researchers help develop state-of-the-art cybersecurity resource

February 5, 2014

Researchers from Indiana University's Center for Applied Cybersecurity Research and University Information Technology Services' Research Technologies Division have contributed to the development of a new tool designed to help software developers close critical security holes in their products.

Cybercrime is booming; it is an estimated $100 billion industry in the United States and shows no signs of slowing down. Attackers have an arsenal of weapons at their disposal, including social engineering—or phishing—penetrating weak security protocols and exploiting software vulnerabilities that can serve as an "open window" into an organization's IT environment. Closing those windows requires effective and accessible tools to identify and root out .

The Software Assurance Marketplace, or the SWAMP, has created a resource to address this growing need that was made publicly available and free to the software community this week.

Supported by a $23.4 million grant from the Department of Homeland Security's Science and Technology Directorate, the SWAMP provides a state-of-the-art facility that serves as an open resource for , software assurance tool developers and software researchers who wish to collaborate and improve software assurance activities in a safe, secure environment. From the very early stages of a project and throughout its entire life cycle, the SWAMP offers continuous, automated access to a rich and evolving set of assessment capabilities.

"We're pleased Indiana University's resources could be leveraged in the creation of this state-of-the-art facility that can now serve as an open resource to help improve the safety and quality of software ecosystems by creating access to assurance tools, testing and reporting," said CACR Deputy Director and SWAMP Chief Security Officer Von Welch. Welch serves as the principal investigator for IU's work with SWAMP.

Located in Madison, Wis., and designed by researchers from the Morgridge Institute for Research, the University of Wisconsin-Madison, IU and the University of Illinois, Champaign-Urbana, the SWAMP provides a suite of assurance tools and software packages that serve to identity vulnerabilities and reduce false positives. According to SWAMP's director and chief technology officer, Miron Livny, "The magnitude of our national software assurance problem requires a comprehensive approach backed by a powerful facility that addresses all dimensions of the problem—integrated education, better tools and wider adoption."

The initial operating capability of the SWAMP enables the assessment of Java, C and C++ software against five static analysis tools. Results are displayed via Secure Decisions' CodeDx vulnerability results viewer, which was developed through the Small Business Innovation Research program of the Department of Homeland Security's Science and Technology Directorate.

"We see widespread adoption of the SWAMP as having a profound, positive impact on software systems and applications that powers our critical infrastructure," said DHS software assurance program manager Kevin Greene. "Better assurance practices lead to better security. It's that simple."

"The SWAMP collaboration is a great example of the public and private sector coming together to advance improvements in assurance activities to deal with emerging cyber threats," he added.

The SWAMP's initial assurance tools include FindBugs, PMD, Clang, CppCheck and GCC and the choice of eight platforms. Over the five-year project, SWAMP will add multiple assessment capabilities including mobile, dynamic and binary analysis tools.

Explore further: CACR: MacDefender shows Apple users no longer immune from cyberattacks

Related Stories

NIST improves tool for hardening software against cyber attack

November 23, 2011

(PhysOrg.com) -- Computer scientists at the National Institute of Standards and Technology (NIST) have dramatically enlarged a database designed to improve applications that help programmers find weaknesses in software. This ...

Games help improve software security

December 5, 2013

Ever more sophisticated cyber attacks exploit software vulnerabilities in the Commercial Off-the-Shelf (COTS) IT systems and applications upon which military, government and commercial organizations rely. The most rigorous ...

Apple denies 'backdoor' NSA access

January 1, 2014

Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone.

Recommended for you

Microsoft describes hard-to-mimic authentication gesture

August 1, 2015

Photos. Messages. Bank account codes. And so much more—sit on a person's mobile device, and the question is, how to secure them without having to depend on lengthy password codes of letters and numbers. Vendors promoting ...

Power grid forecasting tool reduces costly errors

July 30, 2015

Accurately forecasting future electricity needs is tricky, with sudden weather changes and other variables impacting projections minute by minute. Errors can have grave repercussions, from blackouts to high market costs. ...

Netherlands bank customers can get vocal on payments

August 1, 2015

Are some people fed up with remembering and using passwords and PINs to make it though the day? Those who have had enough would prefer to do without them. For mobile tasks that involve banking, though, it is obvious that ...

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.