Leveraging a crowd sourcing methodology to enhance supply chain integrity

Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell
{"title":"Leveraging a crowd sourcing methodology to enhance supply chain integrity","authors":"Han Lin, M. Schwartz, John T. Michalski, M. Shakamuri, P. Campbell","doi":"10.1109/CCST.2012.6393534","DOIUrl":null,"url":null,"abstract":"Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393534","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Supply chain integrity (SCI) is emerging as one of the top security issues facing critical systems. The government's reliance on commercial off-the-shelf (COTS) products is apparent, as is the threat of critical systems being designed and manufactured overseas. To date, few tools or capabilities exist to prevent or even detect these classes of attacks. Programs, such as DARPA Trust, exist to identify solutions; however, alternative strategies must be explored. It is extremely challenging to establish the trustworthiness of a supply chain for a product or system in today's globalized climate, especially given the complexity and variability of the hardware and software, and the diverse geographical areas where they are made. Counterfeit items, from individual chips to entire systems, have been found both in commercial and government sectors. Supply chain attacks can be inserted at any point during the product or system life cycle and can have detrimental effects to mission success. We hypothesize that wisdom of crowds techniques may be applicable to the analysis of supply chain integrity. Current supply chain security efforts are hindered by a lack of detailed information on a product's entire supply chain. End-users have virtually no access to supply chain information, and even major manufacturers may have difficulty getting access to their suppliers' sub-suppliers. Component testing and even reverse engineering can be used to mitigate risks, but these approaches are imperfect, time consuming, and expensive. This paper will discuss the development of a semi-automated supply chain integrity risk analysis framework to assist the supply chain security analysts in assessing the level of risk associated with a component of a mission critical system. This capability can provide the system designer a more rigorous and efficient approach to assess the security of the components in the design. By fusing all of these tools into a centralized framework, we hypothesis that we can create a capability that will enable analysts to more effectively interrogate the data and extract trending as well as critical information.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
利用众包方法提高供应链的完整性
供应链完整性(SCI)正成为关键系统面临的首要安全问题之一。政府对商用现货(COTS)产品的依赖是显而易见的,关键系统在海外设计和制造的威胁也是如此。到目前为止,几乎没有工具或功能可以防止甚至检测到这些攻击。DARPA信托基金等项目的存在是为了确定解决方案;然而,必须探索替代战略。在当今全球化的气候下,为产品或系统建立可信赖的供应链是极具挑战性的,特别是考虑到硬件和软件的复杂性和可变性,以及制造它们的不同地理区域。从单个芯片到整个系统,在商业和政府部门都发现了假冒产品。供应链攻击可以在产品或系统生命周期的任何时刻插入,并可能对任务成功产生不利影响。我们假设群体智慧技术可能适用于供应链完整性的分析。由于缺乏产品整个供应链的详细信息,目前的供应链安全工作受到阻碍。最终用户实际上无法访问供应链信息,甚至主要制造商也可能难以访问其供应商的子供应商。组件测试甚至逆向工程都可以用来降低风险,但是这些方法是不完美的,耗时的,并且昂贵的。本文将讨论半自动化供应链完整性风险分析框架的开发,以帮助供应链安全分析师评估与关键任务系统组件相关的风险水平。此功能可以为系统设计人员提供一种更严格和有效的方法来评估设计中组件的安全性。通过将所有这些工具融合到一个集中的框架中,我们假设我们可以创建一种功能,使分析人员能够更有效地查询数据并提取趋势以及关键信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Department of Defense Instruction 8500.2 “Information Assurance (IA) Implementation:” A retrospective Attack tree-based evaluation of physical protection systems vulnerability Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality A concept of automated vulnerability search in contactless communication applications Working towards an international ANPR Standard — An initial investigation into the UK standard
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1