Loren Data's SAM Daily™

fbodaily.com
Home Today's SAM Search Archives Numbered Notes CBD Archives Subscribe
FBO DAILY ISSUE OF SEPTEMBER 18, 2009 FBO #2855
SOLICITATION NOTICE

A -- Securely Taking On New Executable Software of Uncertain Provenance (STONESOUP) Broad Agency Announcement - Solicitation / Broad Agency Announcement

Notice Date
9/16/2009
 
Notice Type
Combined Synopsis/Solicitation
 
NAICS
541712 — Research and Development in the Physical, Engineering, and Life Sciences (except Biotechnology)
 
Contracting Office
Office of the Director of National Intelligence, Intelligence Advanced Research Projects Activity, Washington, District of Columbia, 20511, United States
 
ZIP Code
20511
 
Solicitation Number
IARPA-BAA-09-08(baa)
 
Archive Date
12/2/2010
 
Point of Contact
Carl E. Landwehr,
 
E-Mail Address
dni-iarpa-baa-09-08@ugov.gov
(dni-iarpa-baa-09-08@ugov.gov)
 
Small Business Set-Aside
N/A
 
Description
IARPA-BAA-09-08 20090916 OCI Certification Template in.doc format IARPA-BAA-09-08 20090916 Academic Institution Acknowledgement Template in.doc format IARPA-BAA-09-08 20090916 Volume 2 Cost Cover Sheet Template in.doc format IARPA-BAA-09-08 20090916 Volume 1 Tech/Mgt Cover Sheet Template in.doc format IARPA-BAA-09-08 20090916 STONESOUP BAA in.pdf format Software vulnerabilities are a major security problem today. Attackers exploit these vulnerabilities to subvert computers and steal valuable information, to extort funds under threat of system damage or shutdown, or to turn an unwitting user's computer into a -bot,‖ which the attacker can subsequently direct to attack other systems, to distribute spam, or to pursue other purposes the attacker may have. A large fraction of these vulnerabilities originate in the source or object code of programs rather than in the software design. Yet tools to help an end user determine whether a new program is safe to run or contains exploitable vulnerabilities are largely lacking. Instead, users must typically depend on the provenance of the software they receive: Did it come from a company we trust? Was it developed using a process in which we have confidence? Are the people who built it friendly to us? The problem with relying on provenance is that software is now developed all over the world and is often assembled out of component parts from many sources, so its origin is uncertain. It is increasingly difficult to know who built a particular software component or system, what their motivations may be, and what process they used in its construction. This program aims to establish confidence in software based on properties determined by examining the software directly, independent of where it came from or what process was used to develop it. Evaluating software to assure it has desired security properties is today a cumbersome and labor-intensive process. Current evaluation techniques in support of software system certification often require the creation of extensive documentation that is frequently used only by evaluators. Certification processes might not require examination of source code, where most vulnerabilities are introduced. The machine code that a computer actually executes is rarely subject to rigorous analysis. Further, software producers can issue updates and fixes at a rate faster than current processes can evaluate their effects. Recently, a market has developed in tools that can automatically detect weaknesses in source or object code programs. However, while current tools show promise, they typically generate reports of weaknesses that are intended for manual review by a software developer or security expert, not an end user. Moreover, these tools produce significant numbers of false positives, greatly magnifying the effort required to triage vulnerability reports, and false negatives, allowing vulnerabilities to slip through the cracks. The goal of the STONESOUP program is to develop and demonstrate technology that provides comprehensive, automated techniques that allow end users to safely execute new software of uncertain provenance. The envisioned technology will use advanced automated software analysis techniques to identify vulnerabilities or to assure their absence; it will combine the analysis with methods for confining software execution so that identified weaknesses cannot be exploited; and it will diversify software components so any residual vulnerabilities will be more difficult for attackers to discover or exploit. The combination of these techniques can provide true defense-in-depth against attempts to exploit vulnerable software. Tools that can operate on programs written in common, type-safe languages, specifically C# or Java (source or bytecode), in legacy, harder-to-analyze languages, specifically C or C++, as well as object code programs available only in binary format for x86 (Windows or Linux), are of interest to the program. IARPA is seeking innovative solutions for the STONESOUP Program. The use of a BAA solicitation allows a wide range of innovative ideas and concepts. The STONESOUP Program is envisioned to begin March 2010 and end by February 2014. The IARPA Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Program is soliciting proposals to develop and demonstrate technology that provides comprehensive, automated techniques that allow end users to safely execute new software of uncertain provenance. The envisioned technology will use advanced automated software analysis techniques to identify vulnerabilities or to assure their absence; it will combine the analysis with methods for confining software execution so that identified weaknesses cannot be exploited; and it will diversify software components so any residual vulnerabilities will be more difficult for attackers to discover or exploit.
 
Web Link
FBO.gov Permalink
(https://www.fbo.gov/notices/beca9e1689ff778ae5ab58dadb96e59f)
 
Record
SN01957309-W 20090918/090917000701-beca9e1689ff778ae5ab58dadb96e59f (fbodaily.com)
 
Source
FedBizOpps Link to This Notice
(may not be valid after Archive Date)

FSG Index  |  This Issue's Index  |  Today's FBO Daily Index Page |
ECGrid: EDI VAN Interconnect ECGridOS: EDI Web Services Interconnect API Government Data Publications CBDDisk Subscribers
 Privacy Policy  © 1994-2020, Loren Data Corp.