Lecture on Cyber Survivability at Doolittle Institute
Introduction
- Speaker: Juanita Riley, Lead Senior Computer Scientist, Weapon Cyber Section, AFRL Munitions Directorate
- Host: Devin Lamonica, Innovation and Collaboration Facilitator, Doolittle Institute
- Purpose: Strengthen and broaden Science and Technology collaborations among industry, academia, and DoD.
Overview of the Munitions Directorate
- Located at Eglin Air Force Base.
- Mission: Discover, develop, integrate, demonstrate, and transition conventional air launch weapons.
- Supports transition of technologies through technology transfer, innovation collaboration, and STEM workforce development.
2023 Priority Areas
-
Digital Material Management
- Integration of digital methodologies across a weapon system's lifecycle to accelerate capability introduction.
- Cyber Survivability Concerns: Securing digital tools and data that produce digital twins.
-
Foundational Weapon S&T
- Consideration of operational and functional threats during design.
- Importance of embedded security in software and algorithm development.
-
Network Collaborative Autonomous Weapons
- Ensures safety, trust, and functional correctness in autonomous systems.
-
S&T Enablers for Special Operation Forces
- Require stealthier, more clandestine munitions.
- Need for RF exploitation beyond anomaly detection.
Cyber Survivability
- Cyber Security: Prevention of adversary access.
- Cyber Resiliency: Ability to withstand and recover from cyber attacks.
- Three Pillars: Prevent, Mitigate, Recover.
Cyber Portfolio Areas
-
Assured Autonomy
- Ensures safety, trust, functional correctness in autonomous systems.
- Addresses manipulation attacks and the evolution of learning algorithms.
-
Embedded Systems Assurance
- Continuous verification and attestation of components.
- Zero Trust Architecture for untrusted hardware.
-
Secure Network Communications
- Secure information sharing across multiple domains (ground, space, air).
-
Cyber Deception and Anti-Fragility
- Cyber deception to disguise capabilities from adversaries.
- Anti-fragility to recover systems to an improved state post-attack.
-
Hardware and Software Assurance
- Testing of binaries, object code, and continuous cyber testing.
- Scrutinizing open source and standardized security components.
Common Proposal Challenges
- Risk and New Attack Surfaces: Need to clarify risks associated with new technologies.
- Testing: Continuous and early testing to identify vulnerabilities early.
- Combining Offensive and Defensive Cyber Capabilities: Necessity of integrating offensive measures within defensive strategies.
- Supply Chain Understanding: Knowledge of component origins and potential vulnerabilities.
Cyber Principles
- Balance of risk versus benefit when developing and acquiring cyber capabilities.
- Continuous questioning to ensure a return on investment in cyber development.
Open Questions and Answers
- TRL Requirements: Up to TRL 6, more advanced projects should go to program offices.
- Resiliency amid Physical Attacks: Communication resilience in case of satellite attacks.
- Stealthy Communication Needs: Interest in stealthy communication solutions, especially for special operations environments.
Conclusion
- Encouragement to reach out for potential collaboration and proposal submissions.
- Continuous adaptation to emerging threats and vulnerabilities.
Additional Resources
- Information and presentations accessible through the Doolittle Institute website.
- Presentation recording and materials available on the Doolittle Institute's YouTube channel.
Note: Feedback form available for shaping future events.