Network World recently interviewed Kevin Greene from the Cyber Security Division of the Science and Technology Directorate of the Department of Homeland Security and Wayne Jackson, CEO at Sonatype. Read the article about the SWAMP to learn more about how the project started and where the SWAMP is heading.
Tag Archives: DHS S&T
SWAMP launches IOC
For immediate release: February 3, 2014
National, Shared Software Assurance Facility, “SWAMP,” to Launch February 3, 2014
Madison, WI—Cybercrime is a booming, estimated $100 billion industry in the United States and shows no signs of slowing down. Attackers have an arsenal of weapons at their disposal, including social engineering (e.g. phishing), penetrating weak security protocols and exploiting software vulnerabilities that can serve as an “open window” into an organization’s IT environment. Closing those windows requires effective and accessible tools to identify and root out software vulnerabilities.
The Software Assurance Marketplace, or the “SWAMP,” has created a resource to address this growing need that will be publicly available and free to the community on February 3, 2014. Supported by a $23.4 million grant from the Department of Homeland Security’s Science and Technology Directorate, the SWAMP provides a state-of-the-art facility that serves as an open resource for software developers, software assurance tool developers and software researchers who wish to collaborate and improve software assurance activities in a safe, secure environment. From the very early stages of a project and throughout its entire life cycle, the SWAMP offers continuous, automated access to a rich and evolving set of assessment capabilities.
Located in Madison, Wisconsin and designed by researchers from the Morgridge Institute for Research, the University of Wisconsin-Madison, Indiana University and the University of Illinois, Champaign-Urbana, the SWAMP provides a suite of assurance tools and software packages that serve to identity vulnerabilities and reduce false positives. According to SWAMP’s director and CTO, Miron Livny, “The magnitude of our national software assurance problem requires a comprehensive approach backed by a powerful facility that addresses all dimensions of the problem – integrated education, better tools and wider adoption.”
The initial operating capability of the SWAMP enables the assessment of Java, C and C++ software against five static analysis tools. Results are displayed via Secure Decisions’ CodeDx vulnerability results viewer, which was developed through DHS S&T’s Small Business Innovation Research program (SBIR). According to DHS software assurance program manager, Kevin Greene, “We see widespread adoption of the SWAMP as having a profound, positive impact on software systems and applications that powers our critical infrastructure. Better assurance practices lead to better security, it’s that simple.” He adds, “The SWAMP collaboration is a great example of the public and private sector coming together to advance improvements in software assurance activities to deal with emerging cyber threats.”
The SWAMP’s initial assurance tools include FindBugs, PMD, Clang, CppCheck and GCC and the choice of eight platforms. Over the five-year project, SWAMP will add multiple assessment capabilities including mobile, dynamic and binary analysis tools.
About the Software Assurance Marketplace
The “SWAMP” is a national software assurance resource funded by a grant from the Department of Homeland Security Science and Technology Directorate. Software developers, assurance tool developers, educators and IT professionals can use the SWAMP for free to perform vulnerability assessments.
To learn more about SWAMP, visit continuousassurance.org.
To schedule an interview with SWAMP leadership or for more information, contact Irene Landrum at firstname.lastname@example.org.
To contact DHS Software Assurance Marketplace’s program manager, Kevin E. Greene: email@example.com.
SWAMP is housed in and support by the Morgridge Institute for Research. Collaborators include Indiana University Center for Applied Cybersecurity Research, the University of Wisconsin Computer Sciences and the National Center for Supercomputing Applications through University of Illinois at Champaign-Urbana.