Researchers help develop state-of-the-art cybersecurity resource

February 5, 2014

Researchers from Indiana University's Center for Applied Cybersecurity Research and University Information Technology Services' Research Technologies Division have contributed to the development of a new tool designed to help software developers close critical security holes in their products.

Cybercrime is booming; it is an estimated $100 billion industry in the United States and shows no signs of slowing down. Attackers have an arsenal of weapons at their disposal, including social engineering—or phishing—penetrating weak security protocols and exploiting software vulnerabilities that can serve as an "open window" into an organization's IT environment. Closing those windows requires effective and accessible tools to identify and root out .

The Software Assurance Marketplace, or the SWAMP, has created a resource to address this growing need that was made publicly available and free to the software community this week.

Supported by a $23.4 million grant from the Department of Homeland Security's Science and Technology Directorate, the SWAMP provides a state-of-the-art facility that serves as an open resource for , software assurance tool developers and software researchers who wish to collaborate and improve software assurance activities in a safe, secure environment. From the very early stages of a project and throughout its entire life cycle, the SWAMP offers continuous, automated access to a rich and evolving set of assessment capabilities.

"We're pleased Indiana University's resources could be leveraged in the creation of this state-of-the-art facility that can now serve as an open resource to help improve the safety and quality of software ecosystems by creating access to assurance tools, testing and reporting," said CACR Deputy Director and SWAMP Chief Security Officer Von Welch. Welch serves as the principal investigator for IU's work with SWAMP.

Located in Madison, Wis., and designed by researchers from the Morgridge Institute for Research, the University of Wisconsin-Madison, IU and the University of Illinois, Champaign-Urbana, the SWAMP provides a suite of assurance tools and software packages that serve to identity vulnerabilities and reduce false positives. According to SWAMP's director and chief technology officer, Miron Livny, "The magnitude of our national software assurance problem requires a comprehensive approach backed by a powerful facility that addresses all dimensions of the problem—integrated education, better tools and wider adoption."

The initial operating capability of the SWAMP enables the assessment of Java, C and C++ software against five static analysis tools. Results are displayed via Secure Decisions' CodeDx vulnerability results viewer, which was developed through the Small Business Innovation Research program of the Department of Homeland Security's Science and Technology Directorate.

"We see widespread adoption of the SWAMP as having a profound, positive impact on software systems and applications that powers our critical infrastructure," said DHS software assurance program manager Kevin Greene. "Better assurance practices lead to better security. It's that simple."

"The SWAMP collaboration is a great example of the public and private sector coming together to advance improvements in assurance activities to deal with emerging cyber threats," he added.

The SWAMP's initial assurance tools include FindBugs, PMD, Clang, CppCheck and GCC and the choice of eight platforms. Over the five-year project, SWAMP will add multiple assessment capabilities including mobile, dynamic and binary analysis tools.

Explore further: CACR: MacDefender shows Apple users no longer immune from cyberattacks

Related Stories

NIST improves tool for hardening software against cyber attack

November 23, 2011

(PhysOrg.com) -- Computer scientists at the National Institute of Standards and Technology (NIST) have dramatically enlarged a database designed to improve applications that help programmers find weaknesses in software. This ...

Games help improve software security

December 5, 2013

Ever more sophisticated cyber attacks exploit software vulnerabilities in the Commercial Off-the-Shelf (COTS) IT systems and applications upon which military, government and commercial organizations rely. The most rigorous ...

Apple denies 'backdoor' NSA access

January 1, 2014

Apple said Tuesday it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone.

Recommended for you

Interactive tool lifts veil on the cost of nuclear energy

August 24, 2015

Despite the ever-changing landscape of energy economics, subject to the influence of new technologies and geopolitics, a new tool promises to root discussions about the cost of nuclear energy in hard evidence rather than ...

Smart home heating and cooling

August 28, 2015

Smart temperature-control devices—such as thermostats that learn and adjust to pre-programmed temperatures—are poised to increase comfort and save energy in homes.

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.