The Key to Securing Legacy Computing Systems

DARPA News  April 10, 2023 For a cyber-attack to be successful, one must conduct a sequence of exploits to move from the initial system access, through privilege escalation and lateral motion steps, until reaching the ultimate target. With processor hardware enhancements, fine-grained software compartmentalization would not significantly impact the system’s speed and efficiency. The challenge, however, is in the billions of lines of existing software, all of which would be impossibly time-consuming to rewrite in safer programming languages. Through its new Compartmentalization and Privilege Management (CPM) program, DARPA is seeking proposals to develop tools that can automatically restructure a software […]