Want to fight cyberthreats? Start with clean code

FOR IMMEDIATE RELEASE:
August 8, 2018

Want to fight cyberthreats? Start with clean code

MADISON, WI – (August 8, 2018) – Barton Miller has a surprise for his University of Wisconsin-Madison class of 250 software programming undergraduates this fall: No code assignment is complete until it’s declared weakness-free by a suite of software analysis tools.

“You’re not going to get extra points,” he says. “It’s just that you can turn in your code only when it comes through clean.”

That may sound stringent, but Miller is confident it won’t be such a chore. His students will be directed to the Software Assurance Marketplace, or SWAMP, a powerful software assurance platform designed to make the detection of potential software weakness as quick and painless as possible.

The SWAMP offers more than 30 open-source and commercial static code analysis tools fully integrated into its automated platform. Leading commercial tool providers in the SWAMP include Synopsys, Parasoft, and GrammaTech, all household names with programmers.

“For the students, using the SWAMP is to feel the freedom that they are not handcuffed to a single tool,” Miller says, likening the SWAMP experience to taking multiple medications to manage a chronic disease. “Each medication may not solve the whole problem, but it may have a strength that other medications don’t have.”

Launched five years ago, the SWAMP is now coming into its own as a free, portable, one-stop source for programmers to tighten up their code — and, in turn, shore up the most frequent target of cyberattacks. The project is funded by the Department of Homeland Security and is led by the Morgridge Institute for Research in close collaboration with partners at UW-Madison, Indiana University, and the University of Illinois.

Miller’s classroom experiment represents an important front for the SWAMP as it aims to advance continuous assurance on software security. Software assurance is for the most part missing from the undergraduate coding curriculum and is often relegated to separate security-based courses. Miller, a UW-Madison computer science professor and chief scientist of the SWAMP, says the goal is to create “turnkey resources” such as video tutorials for computer science instructors to plug it into their courses.

Experience gained this fall from Miller’s course will be used as a blueprint for integrating software assurance into lecture-size coding courses at other institutions. The SWAMP platform was designed to support “scaling-out” in support of wide-scale usage.

Miron Livny, SWAMP director and chief technology officer, says that partnering with the educational community is key because the software security challenge has strong behavioral elements that need to be addressed in the beginning stages of software development teaching. Raising awareness early among future developers, and providing integrated tools like the SWAMP, will help make software assurance a continuous activity in the software life-cycle.

Von Welch, director of Indiana University’s Center for Applied Cybersecurity Research and SWAMP chief information security officer, says the greatest contribution of the SWAMP has been to provide empowerment in what seems like an unwinnable scenario.

“The whole ecosystem of software has just exploded with iPhones and Android phones and software doing a lot for our lives these days,” he says. “It’s easy to be sort of abstractly aware of the security challenge, but we’re giving developers a tool to do something concrete about it.”

The project also yielded an application called “SWAMP-in-a-Box,” which enables developers to deploy the platform locally on their private network to address security and privacy concerns. In 2018 to date, more than 34,000 software assessments have been run in the SWAMP, covering hundreds of millions of lines of code.

Companies and organizations also have been active in the SWAMP. Partners on specialized assurance projects include the Department of Defense, defense contractors, and commercial companies certifying software.

Cyberattacks are only getting worse as software proliferates into every corner of life. Operating systems that once could support a few thousand applications can now support as many as 3 million. Things got remarkably bad in 2017 with 159,700 cyberattacks targeting businesses —nearly doubling the previous year’s total, according to the Online Trust Alliance.

One example from last year serves as a “poster child” for business catastrophe, Miller says. Dutch-based Maersk Shipping, representing almost one-fifth of all the world’s cargo shipping, was hit with the “NotPetya” ransomware virus that wiped out all 45,000 of the company’s computers. The result snarled global shipping traffic and cost the company $300 million in repairs.

“One of the challenges in cybersecurity right now is the attackers get unlimited attempts,” adds Welch. “Cyber attackers have this sort of invulnerability and anonymity and they’re doing it from across the world. When they keep attacking, it’s like the idea of monkeys typing randomness until they eventually produce Shakespeare.”

ABOUT THE SWAMP

The Software Assurance Marketplace is a joint effort of four research institutions – The Morgridge Institute for Research, Indiana University, the University of Illinois at Urbana-Champaign, and the University of Wisconsin-Madison – to advance the capabilities and to increase the adoption of software assurance technologies through open continuous assurance capabilities and a shared facility. The SWAMP project is funded by the Department of Homeland Security Science & Technology Directorate. Services include access to high throughput computing capacity, over 30 software assurance tools, and a library of more than 280 open-source code samples with known vulnerabilities to help developers improve the quality of their static and dynamic testing tools. For more information, visit https://continuousassurance.org.

###

Contact:
Brian Mattmiller
Morgridge Institute for Research
608-316-4332
bmattmiller@morgridge.org

https://morgridge.org/story/want-to-fight-cyberthreats/
https://news.wisc.edu/want-to-fight-cyberthreats-start-with-clean-code/

SWAMP is at Black Hat!

Black Hat USA 2018 August 4-9, 2018 Mandalay Bay, Las VegasThe Software Assurance Marketplace will be at Black Hat USA 2018 this week. Register here to meet us in Las Vegas!

The SWAMP team will be joining the DHS Science and Technology booth #1336 in the business hall on Wednesday, August 8 and Thursday, August 9. We will be demoing SWAMP software, providing information about our project, and answering your questions. You are invited to stop by the DHS S&T booth for a 10-minute presentation at the following times:

  • Wednesday, August 8 – 12:15-12:30pm & 5:15-5:30pm
  • Thursday, August 9 – 12:15-12:30pm

SWAMP Plug-Ins Updates

Updates are now available for the following pieces of SWAMP open-source software!

  • Java-CLI version 1.5.3
  • SWAMP-Jenkins-Plugin version 1.2.2
  • SWAMP-Eclipse-Plugin version 1.1.3

These updates address a cookie expiration issue that was impacting plug-ins used with SWAMP-in-a-Box instances that did not have the time set to current.

SWAMP plug-ins can be found in the Jenkins and Eclipse marketplaces and on GitHub: https://github.com/mirswamp.

SWAMP is coming to OSCON 2018!

O'Reilly Open Source Convention in Portland 2018
The SWAMP will be at OSCON 2018 this week, and we want to see you in Portland, OR! Use our discount code, SWAMP25, to save 25% on your Gold, Sliver, or Bronze OSCON pass, if you still need to register for the conference.

The Software Assurance Marketplace will be in Booth #322 on July 18-19. Our team will be demoing the latest enhancements to SWAMP and SWAMP-in-a-Box. Please stop by to hear about what the SWAMP project and continuous software assurance have to offer!

Upcoming SWAMP Events

It’s going to be a busy summer and fall for the SWAMP team. We have several events coming up, and we’d like for you to join us!

  • The SWAMP team will be exhibiting at OSCON 2018 in Portland, OR on July 18-19.
    • Register here, and get 25% off of your Gold, Sliver, or Bronze OSCON pass using our discount code, SWAMP25.
  • SWAMP will be at the BlackHat USA 2018 conference on August 8-9. Register here. We will be part of the DHS Science & Technology booth (#1336) and will be giving demos of SWAMP software from the business hall at the following times:
    • Wednesday, August 8 – 12:15-12:30pm & 5:15-5:30pm
    • Thursday, August 9 – 12:15-12:30pm
  • Bart Miller and Elisa Heymann will be teaching a tutorial at the IEEE Cybersecurity Development Conference (SecDev) held on September 30-October 2 in Cambridge, MA. “Secure Coding Practices, Automated Assessment Tools and the SWAMP” is scheduled on September 30 from 1:30pm to 5:00pm (view the agenda).
  • Bart Miller and Elisa Heymann will be presenting at the O’Reilly Velocity conference in London on October 30-November 2. Their session, “Critical Infrastructure Software Security: A Maritime Shipping Study Case,” will be at 1:15–1:55pm on Friday, November 2. Register here.
  • On November 11-12, Bart Miller and Elisa Heymann will be giving a tutorial at Supercomputing 2018 in Dallas, TX. Learn more about security programming and software assurance tools, including hands-on activities in the SWAMP!

Comment Period for Static Analysis Results Interchange Format (SARIF) v2.0

Over the past several months, members of the SWAMP team at UW-Madison have been contributing on the OASIS​ SARIF Technical Committee to establish a new standard. The Static Analysis Results Interchange Format (SARIF) version 2.0 is now available for public review and comment until July 24, 2018. Your input is welcome and encouraged! More information about the review process can be found here.

« Older Entries Recent Entries »