Risk
12/9/2013
02:18 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%
Repost This

DoD Selects Raytheon And GrammaTech To Develop Binary Analysis Security Tool

Companies to develop tools and techniques to enable organizations to inspect software and firmware inside network-enabled devices

CAMBRIDGE, Mass., (Dec. 9, 2013) — Raytheon BBN Technologies and GrammaTech, Inc. are collaborating on a $4.8 million contract award under the Defense Advanced Research Projects Agency’s VET program. Raytheon BBN Technologies is a wholly owned subsidiary of Raytheon Company (NYSE: RTN)

The VET (Vetting Commodity IT Software and Firmware) program seeks to help U.S. government agencies address the threat of malicious code and hidden “backdoor” access in commodity IT devices. Mobile phones, network routers, computer workstations and other networked devices can be secretly modified to function in unintended ways or spy on users. The funding was awarded Sept. 26, 2013.

Under the program, GrammaTech and Raytheon BBN intend to develop tools and techniques to enable organizations to inspect the software and firmware that exist inside such network-enabled devices and protect them from attack. Raytheon BBN Technologies plans to develop techniques that enable analysts to prioritize elements of software and firmware to examine for hidden malicious functionality.

GrammaTech plans to develop the tools that actually examine the software and firmware to allow analysts to demonstrate that they do not have exploitable security vulnerabilities.

“Our scientists are developing new technology that aims to advance the state-of-the-art for analyzing machine code,” said Tim Teitelbaum, Ph.D., GrammaTech chief executive officer. "We are leveraging these advances to create a tool that could confirm the absence of broad classes of vulnerabilities.”

“The U.S. Department of Defense relies on equipment with components manufactured all over the world,” said Jack Marin, Ph.D., vice president for Cyber Security at Raytheon BBN Technologies. “Any backdoors, malicious code or other vulnerabilities hidden in those components could enable an adversary to do serious damage, including the exfiltration of sensitive data and the sabotage of critical operations. The VET program seeks to enable DoD analysts to vigorously vet software and firmware devices before they are connected to our critical networks.”

About GrammaTech: GrammaTech is the leading developer of software-assurance tools and advanced cyber-security solutions. Originally founded at Cornell University, GrammaTech’s software analysis solutions are used by software developers worldwide, spanning a myriad of industries including avionics, medical, industrial control, and other applications where reliability and security are paramount. With both static and dynamic analysis techniques that analyze source code as well as binary executables, GrammaTech provides superior static analysis for better software. For more about GrammaTech, visit us at www.grammatech.com.

About Raytheon: Raytheon Company, with 2012 sales of $24 billion and 68,000 employees worldwide, is a technology and innovation leader specializing in defense, security and civil markets throughout the world. With a history of innovation spanning 91 years, Raytheon provides state-of-the-art electronics, mission systems integration and other capabilities in the areas of sensing; effects; and command, control, communications and intelligence systems; as well as a broad range of mission support services. Raytheon is headquartered in Waltham, Mass. For more about Raytheon, visit us at www.raytheon.com and follow us on Twitter @Raytheon.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web