ScienceDaily
Your source for the latest research news
Follow Facebook Twitter LinkedIn Subscribe RSS Feeds Newsletters
New:
  • Webb's Direct Image of Distant World
  • Universe's Coldest Fermions: Quantum Realm
  • Rethinking Indoor Air Chemistry
  • Full 3-D View of Binary Star-Planet System
  • MOXIE Experiment Produces Oxygen On Mars
  • Corals Pass Newly Acquired Mutations to ...
  • Discovery and Naming of Africa's Oldest Dinosaur
  • Team Developing Oral Insulin Tablet
  • Birth Cry: Baby Star in Small Magellanic Cloud
  • Tug-Of-War Between Merging Galaxies
advertisement
Follow all of ScienceDaily's latest research news and top science headlines!
Science News
from research organizations

1

2

Fighting the next generation of cyberattacks

Date:
April 16, 2015
Source:
University of Utah
Summary:
Computer scientists are developing software to detect so-called algorithmic attacks, an emerging hacking threat that is nearly impossible to find with existing security technology.
Share:
FULL STORY

The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation's computer systems.

advertisement

So the U.S. Department of Defense has given a $3 million grant to a team of computer scientists from the University of Utah and University of California, Irvine, to develop software that can hunt down a new kind of vulnerability that is nearly impossible to find with today's technology.

The team is tasked with creating an analyzer that can thwart so-called algorithmic attacks that target the set of rules or calculations that a computer must follow to solve a problem. Algorithmic attacks are so new and sophisticated that only hackers hired by nation states are likely to have the resources necessary to mount them, but perhaps not for long.

"The military is looking ahead at what's coming in terms of cybersecurity and it looks like they're going to be algorithmic attacks," says Matt Might, associate professor of computer science at the University of Utah and a co-leader on the team.

"Right now, the doors to the house are unlocked so there's no point getting a ladder and scaling up to an unlocked window on the roof," Might says of the current state of computer security. "But once all the doors get locked on the ground level, attackers are going to start buying ladders. That's what this next generation of vulnerabilities is all about."

Typically, software vulnerabilities today rely on programmers making mistakes while creating their programs and hackers will exploit those mistakes. For example, the software will receive a programming input crafted by a hacker and use it without automatically validating it first. That could result in a vulnerability giving the hacker access to the computer or causing it to leak information.

Algorithmic attacks don't need to find such conventional vulnerabilities. They can, for instance, secretly monitor how an algorithm is running or track how much energy a computer is using and use that information to glean secret data that the computer is processing. Algorithmic attacks can also disable a computer by forcing it to use too much memory or driving its central processing unit to overwork.

"These algorithmic attacks are particularly devious because they exploit weaknesses in how resources like time and space are used in the algorithm," says Suresh Venkatasubramanian, U associate professor of computer science and co-leader on the team.

Most hackers currently are not using algorithmic attacks because they are costly, extremely complex, and take the most amount of time. So attackers take the easier route of exploiting current vulnerabilities.

The team will be developing software that can perform an audit of computer programs to detect algorithmic vulnerabilities or "hot spots" in the code. This analyzer will perform a mathematical simulation of the software to predict what will happen in the event of an attack.

"Think of it as a spellcheck but for cybersecurity," Might says.

make a difference: sponsored opportunity

Story Source:

Materials provided by University of Utah. Note: Content may be edited for style and length.


Cite This Page:

  • MLA
  • APA
  • Chicago
University of Utah. "Fighting the next generation of cyberattacks." ScienceDaily. ScienceDaily, 16 April 2015. <www.sciencedaily.com/releases/2015/04/150416132023.htm>.
University of Utah. (2015, April 16). Fighting the next generation of cyberattacks. ScienceDaily. Retrieved September 4, 2022 from www.sciencedaily.com/releases/2015/04/150416132023.htm
University of Utah. "Fighting the next generation of cyberattacks." ScienceDaily. www.sciencedaily.com/releases/2015/04/150416132023.htm (accessed September 4, 2022).

  • RELATED TOPICS
    • Computers & Math
      • Computer Science
      • Computers and Internet
      • Computer Programming
      • Hacking
      • Computer Modeling
      • Information Technology
      • Software
      • Distributed Computing
advertisement

  • RELATED TERMS
    • Computer security
    • Computer software
    • Security engineering
    • Cyber security standards
    • Computer simulation
    • Malware
    • Computer insecurity
    • Application software
advertisement

  Print   Email   Share

advertisement

1

2

3

4

5
Most Popular
this week

SPACE & TIME
Seeing Universe's Most Massive Known Star
NASA's Webb Takes Its First-Ever Direct Image of Distant World
MOXIE Experiment Reliably Produces Oxygen on Mars
MATTER & ENERGY
Simple Method Destroys Dangerous 'Forever Chemicals,' Making Water Safe
Durable Coating Kills COVID Virus, Other Germs in Minutes
Diamonds and Rust at Earth's Core-Mantle Boundary
COMPUTERS & MATH
Social Media Experiment Reveals Potential to 'Inoculate' Millions of Users Against Misinformation
Using AI to Train Teams of Robots to Work Together
A New Neuromorphic Chip for AI on the Edge, at a Small Fraction of the Energy and Size of Today's Compute Platforms
advertisement

Strange & Offbeat
 

SPACE & TIME
Making Nanodiamonds out of Bottle Plastic
Full 3-D View of Binary Star-Planet System
Astronomers Show How Terrain Evolves on Icy Comets
MATTER & ENERGY
Quantum Materials: Entanglement of Many Atoms Discovered
A Sustainable Battery With a Biodegradable Electrolyte Made from Crab Shells
SU(N) Matter Is About 3 Billion Times Colder Than Deep Space
COMPUTERS & MATH
Swarms of Microrobots Could Be Solution to Unblocking Medical Devices in Body
Smart Microrobots Learn How to Swim and Navigate With Artificial Intelligence
In DNA, Scientists Find Solution to Engineering Transformative Electronics
Explore More
from ScienceDaily

RELATED STORIES

New Technique Offers Faster Security for Non-Volatile Memory Tech
Apr. 5, 2022 — Researchers have developed a technique that leverages hardware and software to improve file system security for next-generation memory technologies called non-volatile memories (NVMs). The new ...
Software Flaws Often First Reported on Social Media Networks, PNNL Researchers Find
May 4, 2020 — Software vulnerabilities are more likely to be discussed on social media before they're revealed on a government reporting site, a practice that could pose a national security threat, according to ...
Password Managers Vulnerable to Insider Hacking
Aug. 15, 2018 — A new study shows that communication channels between different parts and pieces of computer software are prone to security breaches. Anyone with access to a shared computer -- co-workers, family ...
Developing Reliable Quantum Computers
Feb. 22, 2018 — Quantum computers may one day solve algorithmic problems which even the biggest supercomputers today can't manage. But how do you test a quantum computer to ensure it is working reliably? Depending ...
advertisement


SD
  • SD
    • Home Page
    • Top Science News
    • Latest News
  • Home
    • Home Page
    • Top Science News
    • Latest News
  • Health
    • View all the latest top news in the health sciences,
      or browse the topics below:
      Health & Medicine
      • Allergy
      • Alternative Medicine
      • Birth Control
      • Cancer
      • Diabetes
      • Diseases
      • Heart Disease
      • HIV and AIDS
      • Obesity
      • Stem Cells
      • ... more topics
      Mind & Brain
      • ADD and ADHD
      • Addiction
      • Alzheimer's
      • Autism
      • Depression
      • Headaches
      • Intelligence
      • Psychology
      • Relationships
      • Schizophrenia
      • ... more topics
      Living Well
      • Parenting
      • Pregnancy
      • Sexual Health
      • Skin Care
      • Men's Health
      • Women's Health
      • Nutrition
      • Diet and Weight Loss
      • Fitness
      • Healthy Aging
      • ... more topics
  • Tech
    • View all the latest top news in the physical sciences & technology,
      or browse the topics below:
      Matter & Energy
      • Aviation
      • Chemistry
      • Electronics
      • Fossil Fuels
      • Nanotechnology
      • Physics
      • Quantum Physics
      • Solar Energy
      • Technology
      • Wind Energy
      • ... more topics
      Space & Time
      • Astronomy
      • Black Holes
      • Dark Matter
      • Extrasolar Planets
      • Mars
      • Moon
      • Solar System
      • Space Telescopes
      • Stars
      • Sun
      • ... more topics
      Computers & Math
      • Artificial Intelligence
      • Communications
      • Computer Science
      • Hacking
      • Mathematics
      • Quantum Computers
      • Robotics
      • Software
      • Video Games
      • Virtual Reality
      • ... more topics
  • Enviro
    • View all the latest top news in the environmental sciences,
      or browse the topics below:
      Plants & Animals
      • Agriculture and Food
      • Animals
      • Biology
      • Biotechnology
      • Endangered Animals
      • Extinction
      • Genetically Modified
      • Microbes and More
      • New Species
      • Zoology
      • ... more topics
      Earth & Climate
      • Climate
      • Earthquakes
      • Environment
      • Geography
      • Geology
      • Global Warming
      • Hurricanes
      • Ozone Holes
      • Pollution
      • Weather
      • ... more topics
      Fossils & Ruins
      • Ancient Civilizations
      • Anthropology
      • Archaeology
      • Dinosaurs
      • Early Humans
      • Early Mammals
      • Evolution
      • Lost Treasures
      • Origin of Life
      • Paleontology
      • ... more topics
  • Society
    • View all the latest top news in the social sciences & education,
      or browse the topics below:
      Science & Society
      • Arts & Culture
      • Consumerism
      • Economics
      • Political Science
      • Privacy Issues
      • Public Health
      • Racial Disparity
      • Religion
      • Sports
      • World Development
      • ... more topics
      Business & Industry
      • Biotechnology & Bioengineering
      • Computers & Internet
      • Energy & Resources
      • Engineering
      • Medical Technology
      • Pharmaceuticals
      • Transportation
      • ... more topics
      Education & Learning
      • Animal Learning & Intelligence
      • Creativity
      • Educational Psychology
      • Educational Technology
      • Infant & Preschool Learning
      • Learning Disorders
      • STEM Education
      • ... more topics
  • Quirky
    • Top News
    • Human Quirks
    • Odd Creatures
    • Bizarre Things
    • Weird World
Free Subscriptions

Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

  • Email Newsletters
  • RSS Feeds
Follow Us

Keep up to date with the latest news from ScienceDaily via social networks:

  • Facebook
  • Twitter
  • LinkedIn
Have Feedback?

Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?

  • Leave Feedback
  • Contact Us
About This Site  |  Staff  |  Reviews  |  Contribute  |  Advertise  |  Privacy Policy  |  Editorial Policy  |  Terms of Use
Copyright 1995-2022 ScienceDaily or by other parties, where indicated. All rights controlled by their respective owners.
Content on this website is for information only. It is not intended to provide medical or other professional advice.
Views expressed here do not necessarily reflect those of ScienceDaily, its staff, its contributors, or its partners.
Financial support for ScienceDaily comes from advertisements and referral programs, where indicated.
— CCPA: Do Not Sell My Information — GDPR: Privacy Settings —