Cyperphysical Security

Competencies

Internet of Things (IoT) systems are comprised of networked components that connect the physical and digital worlds, such as sensors, actuators, controllers, and computing devices. Much of today’s critical infrastructure depends on this technology. Smart power grids, nuclear power plants, military command centers, smart city installations, transportation systems, smart homes and smart offices belong to this category.

These systems were initially designed to be functional, reliable and interoperable across different manufacturers and standards. Security was an afterthought. As a result, these systems present a rich “attack surface,” or group of exposed vulnerabilities that can be exploited in a security attack. The potential consequences of a security attack are not just limited to data breaches or lost productivity – human lives may be at risk.

At PARC, our mission is to develop innovative security mechanisms to detect, diagnose and prevent attacks on cyber-physical systems. Our researchers approach this challenge from multiple perspectives, ranging from cryptographic protocols and novel designs of networking and distributed systems to adversarial machine learning algorithms and model-based reasoning.

 

SCIBORG:  Reducing network attack risks while maximizing business opportunity

PARC: When you implement a remediation instruction from your security tool, how do you know that you haven’t impacted something else in the network?

Customer CISO: That’s the problem.

 

The challenge: Network complexity makes it difficult to optimize a secure configuration without hampering business productivity

Complexity leads to vulnerability: As networked ecosystems become larger, more complex, and increasingly cloud-based, there are more opportunities for misconfiguration, leading to vulnerabilities and potential data breaches. Systems can easily become so complex that humans are unable to process and evaluate all the data, components, dependencies, relationships, privileges, exceptions, connected systems, devices, and circumstances that can make a system vulnerable.  Unmanageable system complexity leads to more paths for attackers to exploit.

Endless, Laborious Fixes: Prioritizing, tracking and documenting vulnerabilities is laborious, and attack path evaluation may occur infrequently. Some companies only do what is necessary to meet minimum compliance requirements.

Current tools fall short: Many organizations use attack prevention and detection tools, which emphasize security but do not optimize network configuration. And network configuration tools emphasize efficiency, but not necessarily security.

The bottom line: Companies struggle to securely configure their systems, many of which are complex and involve many components, without sacrificing business functionality.

 

The SCIBORG Solution:

SCIBORG serves as a “configuration recommendation engine”, providing the best configuration for an organization’s entire system of systems, given the unique requirements and landscape. It provides actionable recommendations, prioritizing business requirements from the start, so that an organization can be secure AND maintain business functionality.

 

  • Graph-based solution enables emphasis on relationships, dependencies, systems of systems
  • Allows you to focus on managing your business requirements
  • Ability to run scenarios: See what the effect will be elsewhere in the network if user makes a recommended change
  • Can reduce manual effort and risk of human error
  • Offers actionable recommendations tailored to the organization
  • Potential to be real time/continuous – important since inventory, business requirements, and vulnerabilities are all in a constant state of change
  • Differentiation and accuracy due to use of multiple metrics in solver/reasoner (probability/likelihood, utility, impact value…)
    • Flexibility for user to define/adjust utility, change the relative weights of variables – may help to address future types of attacks
    • Ability to extend to consider additional variables (e.g. age of a vulnerability)

 

“Given an initial or default configuration, SCIBORG tells a system operator which configuration parameter values should be changed, what the new values should be, why those changes should be made, and what security gains are made as a result.”

Shantanu Rane, PI

 

Use Cases:

  • Networked devices
  • Industrial IoT
  • Multi-cloud systems

Sciborg frameworks

 

 

Contact PARC

Additional information

Focus Areas

Our work is centered around a series of Focus Areas that we believe are the future of science and technology.

FIND OUT MORE
Licensing & Commercialization Opportunities

We’re continually developing new technologies, many of which are available for Commercialization.

FIND OUT MORE
News

PARC scientists and staffers are active members and contributors to the science and technology communities.

FIND OUT MORE