SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Digital Security by Design
Vision
The Digital Security by Design (DSbD) challenge will radically update the foundation of
the insecure digital computing infrastructure by creating a new, more secure hardware
and software ecosystem. Built on new security capabilities, the technology developed
through this programme will underpin future digital products and services.
The Challenge
The government’s Industrial Strategy Challenge Fund (ISCF)
brings together leading research and business to tackle the
big societal and industrial challenges today.
DSbD is a wave 3 Programme from the ISCF (run by UK
Research and Innovation) bringing £70m of government
funding matched by £117m of industry co-investment.
Until now, the improvements that DSbD will provide
have been blocked by the need to develop hardware
and software simultaneously. To move both at the same
time requires a revolution to the way these processes
currently work rather than just an evolution of the current
technology. This challenge pulls together the right strands
to move the entire sector in the same direction and
overcome this huge market barrier.
Foreword
Only once in every few generations is there an opportunity to
change something as fundamental as the changes DSbD are
making. Today’s computer can be traced back to the designs
developed in the UK during the 1940’s and 50’s. By as early as
the 1970’s, academics were documenting major issues in its
design with respect to the protection and security of data. UK
academic research has continued to lead the field in this area,
however, the supply chain demands for software compatibility
has meant we have been stuck with solutions designed without
security in mind.
The Arm technology developed in Cambridge UK has become
the underpinning technology for most digital devices and
services across the world. It is from this base that DSbD
creates a programme of activities that have the opportunity
to touch the lives of just about everyone in the world, without
needing to change the way in which they interact with
technology. This programme will ensure that the UK continues
to lead both in the core technologies and the business
opportunities this change will create.
 John Goodacre – Challenge Director
Programme Objectives
This programme has three key objectives to enable the
success and delivery of the vision:
1. Demonstrate a more secure hardware platform capable
of protecting the integrity and resilience of software in
response to significant market need for cyber security.
2. Enable more secure platforms, for services which make
extensive use of secured, personal data and create
investment in new scalable businesses, digital products
and services.
3. Accelerate the move towards digital transformation
of industry, with the accompanying investment in
productivity and improved reliability of digital services.
DSbD Advisory Group Chair
The DSbD challenge aims to ease the burden on developers
of ensuring their products are hard to exploit. Classes of
software attacks which have plagued the ecosystem for
decades can be mitigated in the underlying hardware.
Resilient computing platforms are required to provide
the confidence necessary to enable increasing uses of
connected devices across the UK and around the world.
Leadership in new areas of technology will demand strong
foundations. This project is essential in order to lay those
foundations, and to encourage development of the tools
and supporting components required to make maximum
use of the new protections. Paul Waller - NCSC
Outcomes
The challenge aims to achieve the following:
• UK industry are motivated for change
• The UK develop new skills and jobs aligned
with the new hardware and software
• Computer industry deploy new advanced
security architecture
• UK to lead the world in computer security
• Increased difficulty in cyber attacks
• Lower costs to digital security
• Increased research in digital security
• Production of scalable secured products and services
For more information visit the DSbD website or sign up to
the DSbD mailing list.
The Foundations
Technology –
Capability Hardware
University of Cambridge
Mainstream computer systems
are chronically insecure, in large part because the
conventional hardware architectures and C/C++ languages
provide only coarse-grained memory protection – so coding
errors become exploitable security vulnerabilities. CHERI
revises the hardware/software architectural interface with
hardware support for unforgeable _capabilities_, usable
for fine-grained memory protection and scalable software
compartmentalisation. CHERI aims to provide practically
deployable performance and compatibility, requiring
only minimal changes to existing software and hardware:
recompiling existing C/C++, with mild adaption, can protect
pointers with capabilities.
CHERI has been developed in a University of Cambridge / SRI
International hardware/software/semantics co-design project
since 2010. This combines hardware implementation, as FPGA
processors adapting MIPS and RISC-V; a complete software
stack, adapting widely used open-source software such as
Clang/LLVM, FreeBSD, FreeRTOS, and applications such as
WebKit, OpenSSH, and PostgreSQL; and formal modelling
and machine-checked proof of security properties of the
architecture.
See https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/
All this provides strong academic validation of the ideas.
We have been discussing their potential industrial deployment
with Arm since 2014, and DSbD and the Morello board will
create an industrial prototype, enabling the industrial evaluation
that is essential to deploying CHERI in mass-market systems.
This will protect all of us from a wide range of existing and
future security vulnerabilities.
Technology –
What is it?
Arm – Morello Programme
Arm is leading and contributing to
Innovate UK’s 5-year project, Digital Security by Design,
which we are calling the Morello Programme.
Arm’s contribution centres on developing and implementing
capability architectures, building on Cambridge/SRI CHERI
research, that will enable fine-grained protection of memory
to provide enhanced security for processor designs of the
future. This protection ensures that code can only access the
memory it is supposed to, and that even a successful break-in
remains contained.
Since this concept proposes an architecture that will allow a
radical shift in approach to combat constantly-evolving cyber
threats, it needs a wide-ranging set of skills and a number of
key partners in both academia and industry to move it from
the research labs to a pre-prototype testing phase.
The Morello programme involves extensive work, taking the
capability architecture from a research level and designing
and creating a small number of prototype evaluation boards
(the Morello dev board). Working with Morello project partners,
we will thoroughly test the proposition of Morello capability
architecture from how the hardware performs to how to write
software for it.
The result of this five-year program could be a complete shift
in both hardware design for computing devices and how the
software running on these devices is programmed, so that it
can take advantage of the new hardware features.
https://developer.arm.com/architectures/cpu-architecture/a-
profile/morello
www.ukri.org/innovation/industrial-strategy-challenge-fund/digital-security-by-design/Arm Dev Board
Breach
has full access
Breach
is contained to
a specifc area
Compartmentalization
Programme Activity
Activity 1 –
Enable
Developing and delivering a commercial-
grade hardware platform prototype. This
will have capability extensions built into
the processor architecture to make the
platform more secure. The hardware
platform will come with complete
toolchain and system software. This
will enable the hardware and software
development ecosystem to; experiment
with novel ideas, develop the required
new software infrastructure and develop
and demonstrate industrial prototype
systems for secured-by-design products
and services across a range of industry
sectors and market applications.
Activity 2 –
Use
Supporting multi-disciplinary research
and innovation to enable the uptake and
adoption across technological, economic
and societal fronts. Investigating
impact and opportunities of capability-
enabled hardware, this activity will
underpin the development of new
software infrastructure across the
stack. This activity will also enable an
understanding of the societal challenges,
policy/regulatory implications, cultural
aspects and broader human factors
underlying safety  security and privacy
 trust in digital systems.
Activity 3 -
Impact
Supporting market adoption of the
new technology and accompanying
ecosystem through the development
of business-led demonstrators. The
aim is to bring together key parts of a
value chain to work synergistically and
showcase the use of the new security
capability in an industry segment(s). This
will validate, in a real-world environment,
its ability to underpin and deliver more
secure products and services. Economic
benefit and market impact will drive the
business-led demonstrator activity from
the very start.
Upcoming Opportunities
Upcoming funding
opportunities:
• Technology Enabled Business
Led Demonstrator Round 1
competition closes on
15th April midday 2020
• Business Led Demonstrator
Round 2
Opens January 2021
• Collaborative RD
to develop system software
and to enable market use:
tooling and processes to utilise
the new security capabilities
Opens November 2020
Opportunities to get
involved in other ways:
• Engage with DSbD
Social Science Hub+
Coming September 2020
• Technology platform
prototype board will be available
to businesses for evaluation
in 2021
1. ENABLE 2. USE 3. IMPACT
TECHNOLOGY PLATFORM
PROTOTYPE:
deliver a proven secure by default
hardware evaluation board and
system software
COLLABORATIVE RD
TO ENABLE MARKET USE:
tooling and processes to utilise
the new security capabilities;
ommunity engagement
BUSINESS-LED DEMONSTRATORS:
sector-specific adoptions eg Iot,
connected vehicles, Ai, and/or financial
services to show-case real-world impact
and move the accepted norm
£49.8m £9m £11.2m

Weitere ähnliche Inhalte

Was ist angesagt?

SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
South Tyrol Free Software Conference
 
2015 HPSR Cyber Risk Report
2015 HPSR Cyber Risk Report2015 HPSR Cyber Risk Report
2015 HPSR Cyber Risk Report
Angela Gunn
 

Was ist angesagt? (19)

Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019Cloud computing_LKYSPP GSP 2019
Cloud computing_LKYSPP GSP 2019
 
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
SFScon21 - Cédric Thomas - The OW2 Market Readiness Levels method. A tool for...
 
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
IRJET-Testing Uncertainty of Cyber-Physical Systems in IoT Cloud Infrastructu...
 
Whitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sectorWhitepaper - Attracting Developers to the Defence sector
Whitepaper - Attracting Developers to the Defence sector
 
Ofc2019 automating 400 g-flyer
Ofc2019 automating 400 g-flyerOfc2019 automating 400 g-flyer
Ofc2019 automating 400 g-flyer
 
Safe code CSA cloud final1213
Safe code CSA cloud final1213Safe code CSA cloud final1213
Safe code CSA cloud final1213
 
OSS - enterprise adoption strategy and governance
OSS -  enterprise adoption strategy and governanceOSS -  enterprise adoption strategy and governance
OSS - enterprise adoption strategy and governance
 
De Mystifying Smart Grid Rankin
De Mystifying Smart Grid RankinDe Mystifying Smart Grid Rankin
De Mystifying Smart Grid Rankin
 
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - PhdassistanceComputer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
2015 HPSR Cyber Risk Report
2015 HPSR Cyber Risk Report2015 HPSR Cyber Risk Report
2015 HPSR Cyber Risk Report
 
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
Critical Infrastucture Protection: a strategic opportunity for countries’ mod...
 
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges ...
 
13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)13th International Conference on Networks & Communications (NeCoM 2021)
13th International Conference on Networks & Communications (NeCoM 2021)
 
Lectra acma 2010_final
Lectra acma 2010_finalLectra acma 2010_final
Lectra acma 2010_final
 
Webinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your OrganizationWebinar–Building A Culture of Secure Programming in Your Organization
Webinar–Building A Culture of Secure Programming in Your Organization
 
Nanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An ApproachNanotechnology in 5G Wireless Communication Network: An Approach
Nanotechnology in 5G Wireless Communication Network: An Approach
 
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
Le potentiel du Machine Learning et de l’analyse prédictive à portée de votre...
 
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication ModelsAnalysis on IoT Challenges, Opportunities, Applications and Communication Models
Analysis on IoT Challenges, Opportunities, Applications and Communication Models
 

Ähnlich wie Digital Security by Design Vision

The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
 
WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015
Michael Cihra
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
Sorin Ciornei
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
 

Ähnlich wie Digital Security by Design Vision (20)

Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
Creating a Step Change in Cyber Security | ISCF DSbD Business-led Demonstrato...
 
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
Digital Security by Design: Challenge Positioning - John Goodacre, Challenge ...
 
Industrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the CloudIndustrial Control Systems Go Mobile in the Cloud
Industrial Control Systems Go Mobile in the Cloud
 
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1Industrial Control System Applications go Mobile in the Cloud 20150825 v1
Industrial Control System Applications go Mobile in the Cloud 20150825 v1
 
Digital Engineering A Short Overview
Digital Engineering A Short OverviewDigital Engineering A Short Overview
Digital Engineering A Short Overview
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
The Industrial Internet Of Things - Potential Of Connected Products And Services
The Industrial Internet Of Things - Potential Of Connected Products And ServicesThe Industrial Internet Of Things - Potential Of Connected Products And Services
The Industrial Internet Of Things - Potential Of Connected Products And Services
 
WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015WEFUSA_IndustrialInternet_Report2015
WEFUSA_IndustrialInternet_Report2015
 
Cisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_finalCisco Co-Innovation EMEAR Brochure_final
Cisco Co-Innovation EMEAR Brochure_final
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
IT Fundamentals
IT FundamentalsIT Fundamentals
IT Fundamentals
 
Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...Cloud based security threats with present challenges and opportunities for ma...
Cloud based security threats with present challenges and opportunities for ma...
 
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair MonetisationData Decentralisation: Efficiency, Privacy and Fair Monetisation
Data Decentralisation: Efficiency, Privacy and Fair Monetisation
 
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
Digital Security by Design: Information on current EPSRC & ESRC Calls - Maria...
 
1rst ARCADIA bronchure
1rst ARCADIA bronchure1rst ARCADIA bronchure
1rst ARCADIA bronchure
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
Become a cloud security expert
Become a cloud security expertBecome a cloud security expert
Become a cloud security expert
 
Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...Securing Manufacturing: How we can improve speed and efficiency while protect...
Securing Manufacturing: How we can improve speed and efficiency while protect...
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 

Mehr von KTN

Mehr von KTN (20)

Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy Competition Briefing - Open Digital Solutions for Net Zero Energy
Competition Briefing - Open Digital Solutions for Net Zero Energy
 
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
An Introduction to Eurostars - an Opportunity for SMEs to Collaborate Interna...
 
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
Prospering from the Energy Revolution: Six in Sixty - Technology and Infrastr...
 
UK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technologyUK Catalysis: Innovation opportunities for an enabling technology
UK Catalysis: Innovation opportunities for an enabling technology
 
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
Industrial Energy Transformational Fund Phase 2 Spring 2022 - Competition Bri...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
Horizon Europe ‘Culture, Creativity and Inclusive Society’ Consortia Building...
 
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call TopicsSmart Networks and Services Joint Undertaking (SNS JU) Call Topics
Smart Networks and Services Joint Undertaking (SNS JU) Call Topics
 
Building Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest BriefingBuilding Talent for the Future 2 – Expression of Interest Briefing
Building Talent for the Future 2 – Expression of Interest Briefing
 
Connected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort WorkshopConnected and Autonomous Vehicles Cohort Workshop
Connected and Autonomous Vehicles Cohort Workshop
 
Biodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British LandscapeBiodiversity and Food Production: The Future of the British Landscape
Biodiversity and Food Production: The Future of the British Landscape
 
Engage with...Performance Projects
Engage with...Performance ProjectsEngage with...Performance Projects
Engage with...Performance Projects
 
How to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal WebinarHow to Create a Good Horizon Europe Proposal Webinar
How to Create a Good Horizon Europe Proposal Webinar
 
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
Horizon Europe Tackling Diseases and Antimicrobial Resistance (AMR) Webinar a...
 
Engage with...Custom Interconnect
Engage with...Custom InterconnectEngage with...Custom Interconnect
Engage with...Custom Interconnect
 
Engage with...ZF
Engage with...ZFEngage with...ZF
Engage with...ZF
 
Engage with...FluxSys
Engage with...FluxSysEngage with...FluxSys
Engage with...FluxSys
 
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition BriefingMade Smarter Innovation: Sustainable Smart Factory Competition Briefing
Made Smarter Innovation: Sustainable Smart Factory Competition Briefing
 
Driving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills HubDriving the Electric Revolution – PEMD Skills Hub
Driving the Electric Revolution – PEMD Skills Hub
 
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing WebinarMedicines Manufacturing Challenge EDI Survey Briefing Webinar
Medicines Manufacturing Challenge EDI Survey Briefing Webinar
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Digital Security by Design Vision

  • 1. Digital Security by Design Vision The Digital Security by Design (DSbD) challenge will radically update the foundation of the insecure digital computing infrastructure by creating a new, more secure hardware and software ecosystem. Built on new security capabilities, the technology developed through this programme will underpin future digital products and services.
  • 2. The Challenge The government’s Industrial Strategy Challenge Fund (ISCF) brings together leading research and business to tackle the big societal and industrial challenges today. DSbD is a wave 3 Programme from the ISCF (run by UK Research and Innovation) bringing £70m of government funding matched by £117m of industry co-investment. Until now, the improvements that DSbD will provide have been blocked by the need to develop hardware and software simultaneously. To move both at the same time requires a revolution to the way these processes currently work rather than just an evolution of the current technology. This challenge pulls together the right strands to move the entire sector in the same direction and overcome this huge market barrier. Foreword Only once in every few generations is there an opportunity to change something as fundamental as the changes DSbD are making. Today’s computer can be traced back to the designs developed in the UK during the 1940’s and 50’s. By as early as the 1970’s, academics were documenting major issues in its design with respect to the protection and security of data. UK academic research has continued to lead the field in this area, however, the supply chain demands for software compatibility has meant we have been stuck with solutions designed without security in mind. The Arm technology developed in Cambridge UK has become the underpinning technology for most digital devices and services across the world. It is from this base that DSbD creates a programme of activities that have the opportunity to touch the lives of just about everyone in the world, without needing to change the way in which they interact with technology. This programme will ensure that the UK continues to lead both in the core technologies and the business opportunities this change will create. John Goodacre – Challenge Director Programme Objectives This programme has three key objectives to enable the success and delivery of the vision: 1. Demonstrate a more secure hardware platform capable of protecting the integrity and resilience of software in response to significant market need for cyber security. 2. Enable more secure platforms, for services which make extensive use of secured, personal data and create investment in new scalable businesses, digital products and services. 3. Accelerate the move towards digital transformation of industry, with the accompanying investment in productivity and improved reliability of digital services. DSbD Advisory Group Chair The DSbD challenge aims to ease the burden on developers of ensuring their products are hard to exploit. Classes of software attacks which have plagued the ecosystem for decades can be mitigated in the underlying hardware. Resilient computing platforms are required to provide the confidence necessary to enable increasing uses of connected devices across the UK and around the world. Leadership in new areas of technology will demand strong foundations. This project is essential in order to lay those foundations, and to encourage development of the tools and supporting components required to make maximum use of the new protections. Paul Waller - NCSC Outcomes The challenge aims to achieve the following: • UK industry are motivated for change • The UK develop new skills and jobs aligned with the new hardware and software • Computer industry deploy new advanced security architecture • UK to lead the world in computer security • Increased difficulty in cyber attacks • Lower costs to digital security • Increased research in digital security • Production of scalable secured products and services For more information visit the DSbD website or sign up to the DSbD mailing list. The Foundations Technology – Capability Hardware University of Cambridge Mainstream computer systems are chronically insecure, in large part because the conventional hardware architectures and C/C++ languages provide only coarse-grained memory protection – so coding errors become exploitable security vulnerabilities. CHERI revises the hardware/software architectural interface with hardware support for unforgeable _capabilities_, usable for fine-grained memory protection and scalable software compartmentalisation. CHERI aims to provide practically deployable performance and compatibility, requiring only minimal changes to existing software and hardware: recompiling existing C/C++, with mild adaption, can protect pointers with capabilities. CHERI has been developed in a University of Cambridge / SRI International hardware/software/semantics co-design project since 2010. This combines hardware implementation, as FPGA processors adapting MIPS and RISC-V; a complete software stack, adapting widely used open-source software such as Clang/LLVM, FreeBSD, FreeRTOS, and applications such as WebKit, OpenSSH, and PostgreSQL; and formal modelling and machine-checked proof of security properties of the architecture. See https://www.cl.cam.ac.uk/research/security/ctsrd/cheri/ All this provides strong academic validation of the ideas. We have been discussing their potential industrial deployment with Arm since 2014, and DSbD and the Morello board will create an industrial prototype, enabling the industrial evaluation that is essential to deploying CHERI in mass-market systems. This will protect all of us from a wide range of existing and future security vulnerabilities. Technology – What is it? Arm – Morello Programme Arm is leading and contributing to Innovate UK’s 5-year project, Digital Security by Design, which we are calling the Morello Programme. Arm’s contribution centres on developing and implementing capability architectures, building on Cambridge/SRI CHERI research, that will enable fine-grained protection of memory to provide enhanced security for processor designs of the future. This protection ensures that code can only access the memory it is supposed to, and that even a successful break-in remains contained. Since this concept proposes an architecture that will allow a radical shift in approach to combat constantly-evolving cyber threats, it needs a wide-ranging set of skills and a number of key partners in both academia and industry to move it from the research labs to a pre-prototype testing phase. The Morello programme involves extensive work, taking the capability architecture from a research level and designing and creating a small number of prototype evaluation boards (the Morello dev board). Working with Morello project partners, we will thoroughly test the proposition of Morello capability architecture from how the hardware performs to how to write software for it. The result of this five-year program could be a complete shift in both hardware design for computing devices and how the software running on these devices is programmed, so that it can take advantage of the new hardware features. https://developer.arm.com/architectures/cpu-architecture/a- profile/morello www.ukri.org/innovation/industrial-strategy-challenge-fund/digital-security-by-design/Arm Dev Board Breach has full access Breach is contained to a specifc area Compartmentalization
  • 3. Programme Activity Activity 1 – Enable Developing and delivering a commercial- grade hardware platform prototype. This will have capability extensions built into the processor architecture to make the platform more secure. The hardware platform will come with complete toolchain and system software. This will enable the hardware and software development ecosystem to; experiment with novel ideas, develop the required new software infrastructure and develop and demonstrate industrial prototype systems for secured-by-design products and services across a range of industry sectors and market applications. Activity 2 – Use Supporting multi-disciplinary research and innovation to enable the uptake and adoption across technological, economic and societal fronts. Investigating impact and opportunities of capability- enabled hardware, this activity will underpin the development of new software infrastructure across the stack. This activity will also enable an understanding of the societal challenges, policy/regulatory implications, cultural aspects and broader human factors underlying safety security and privacy trust in digital systems. Activity 3 - Impact Supporting market adoption of the new technology and accompanying ecosystem through the development of business-led demonstrators. The aim is to bring together key parts of a value chain to work synergistically and showcase the use of the new security capability in an industry segment(s). This will validate, in a real-world environment, its ability to underpin and deliver more secure products and services. Economic benefit and market impact will drive the business-led demonstrator activity from the very start. Upcoming Opportunities Upcoming funding opportunities: • Technology Enabled Business Led Demonstrator Round 1 competition closes on 15th April midday 2020 • Business Led Demonstrator Round 2 Opens January 2021 • Collaborative RD to develop system software and to enable market use: tooling and processes to utilise the new security capabilities Opens November 2020 Opportunities to get involved in other ways: • Engage with DSbD Social Science Hub+ Coming September 2020 • Technology platform prototype board will be available to businesses for evaluation in 2021 1. ENABLE 2. USE 3. IMPACT TECHNOLOGY PLATFORM PROTOTYPE: deliver a proven secure by default hardware evaluation board and system software COLLABORATIVE RD TO ENABLE MARKET USE: tooling and processes to utilise the new security capabilities; ommunity engagement BUSINESS-LED DEMONSTRATORS: sector-specific adoptions eg Iot, connected vehicles, Ai, and/or financial services to show-case real-world impact and move the accepted norm £49.8m £9m £11.2m