DARPA touts ‘formal methods' for nipping cyber disasters in the bud
Officials at the Defense Advanced Research Programs Agency have begun nudging Defense Department managers to utilize idling DARPA cybersecurity tools meant to preempt hacks and accidents in critical programs.
A series of high-profile incidents in recent years has highlighted a kind of passivity among defense officials in the face of the damage caused, according to Kathleen Fisher, the director of DARPA's Information Innovation Office. Believing that systems can't stave off catastrophic cyber incidents caused by software vulnerabilities, the department often focuses instead on reactive fixes, she said.
But proactive tools for building more resilient software already exist in the Pentagon's arsenal of countermeasures, she said at a demonstration day at the agency's Arlington, VA headquarters earlier this month.
'We have many critical mission systems that have these kinds of vulnerabilities in them, and the way we've learned to deal with them is after they've been attacked, after we've learned, 'OK, that's a bad one,' we then go and fix it,' Fisher said. 'We pay billions of dollars after the fact to go fix these problems.'
In 2017, Russia conducted a cyberattack against Ukraine that's now known as NotPetya.
While the attack targeted Ukraine's power infrastructure, it ended up spreading outside the country, affecting infrastructure and businesses across Europe, including a Danish logistics company, Maersk, which is responsible for about 20% of global container shipping. In seven minutes, the attack destroyed 50,000 of the firm's computers and nearly wiped out the active directory system tracking its container ships. The company estimated the damage at around $300 million.
Seven years later, in July 2024, faulty software from security firm CrowdStrike took millions of government and private sector computers offline, delaying thousands of commercial flights and canceling medical procedures as part of the global outage. The disruption was widespread, but the root cause was determined to be an accident — a software glitch that spread through a routine update.
Events like these — adversarial or accidental — have become more prevalent in recent years. And according to Fisher, they highlight troubling software vulnerabilities in critical infrastructure. In response, the Defense Department and the broader U.S. government have developed a sense of 'learned helplessness' when it comes to addressing software vulnerabilities.
Over the last 10 to 15 years, DARPA has proven that a software design approach called 'formal methods' can address these vulnerabilities before they're exploited by a coding error or an attack. Rather than validate the security of software code solely by testing it after it's already written, a formal-methods approach designs software through rigorous mathematical analysis, verifying its performance before and as it's being built.
Some of the tools DARPA has developed have made their way into DOD programs of record, but adoption has been limited. Now, as concerns grow about the cybersecurity of military weapon systems, the agency is trying to raise awareness in the defense acquisition community that these solutions exist and are available for use.
'We can imagine a world without these software vulnerabilities, where we can eliminate the sense of learned helplessness across DOD, where we can rapidly secure critical systems . . . and where we can create a sustainable ecosystem of formal-methods tools that are ready and off the shelf for people to use,' Fisher said.
One early DARPA program to showcase the utility of formal methods was the High-Assurance Cyber Military Systems effort, or HACMS. The program ran from 2012 to 2016 and culminated with two demonstrations, the first using a small quadcopter drone and then, in 2017, using Boeing's autonomous helicopter, the Unmanned Little Bird.
During the second demonstration, a red team of hackers tried unsuccessfully to infiltrate the aircraft, according to Darren Cofer, a principal fellow at Collins Aerospace, whose predecessor Rockwell Collins was a contractor on HACMS.
'In HACMS, we showed that formal methods could be used to eliminate important security vulnerabilities from embedded systems in real aircraft,' Cofer said during the DARPA demo day.
The agency has since pursued several other efforts to improve the usability of formal methods for DOD platforms. One of those programs, called SafeDocs, addresses vulnerabilities in parsers – software tools that convert data into a usable format. Another effort, Assured Micro Patching or AMP, provides a way to fix software bugs without the source code and ensure that the fix itself doesn't do more damage.
These tools have all transitioned to DOD programs in a limited capacity, and DARPA has several other ongoing efforts aimed at further improving formal methods. Fisher noted that because the problem hasn't been fully solved, there's a tendency for programs to hold off on adopting it. But DARPA sees potential for these technologies to be planted more widely now -- both to secure existing DOD software installed on legacy platforms and to design software for future systems.
'We have plenty of technology that's ready for prime time and we should go ahead and transition and use that technology now because it will dramatically improve the security of our systems,' she said. 'We can't afford to wait until we've solved the whole problem to use the technology that we've got now.'
How quickly and broadly the Defense Department adopts these tools depends on a number of factors — including funding and prioritization within the military services.
To help spread the word and address barriers to adoption, DARPA kicked off the Capstone program last year. Through a partnership with the Undersecretary of Defense for Research and Engineering and the Director of Operational Test and Evaluation, the agency is working with the services to identify platforms that could benefit from formal methods.
DARPA is providing some matching funds to make the tools available and, according to program manager Steve Kuhn, expects to identify the platforms by May. Once the Capstone programs are selected, the agency will help identify and fix software vulnerabilities within them and capture lessons learned to be compiled in a best practice guide that all programs will be able to access.
DARPA's hope, Kuhn said, is that the guide will help DOD program offices see how resilient software tools are being applied and offer a resource that helps with that implementation.
'Part of the strategy that we've been embarking on is really an adoption plan that brings these resilient software tools to both our defense industrial base, our partners and the services themselves,' Kuhn said. 'We're not going to fix everything, but can we really capture what it takes to bring these tools to the masses?'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
16 hours ago
- Yahoo
SEEQC Announces Collaboration With IBM Under DARPA's Quantum Benchmarking Initiative
Collaboration Boosts New York's Quantum Ecosystem to Advance U.S. Quantum Computing Leadership ELMSFORD, N.Y., June 11, 2025 /PRNewswire/ -- SEEQC, a leader in scalable and energy-efficient quantum technologies, today announced a strategic technical collaboration with IBM as part of the U.S. Defense Advanced Research Projects Agency's (DARPA) Quantum Benchmarking Initiative (QBI). The collaboration will explore integrating SEEQC's Single Flux Quantum (SFQ) chip-based control layer technologies with IBM's leading-edge quantum systems architecture. SEEQC envisions using its SFQ technologies to shrink and consolidate external racks of classical control hardware by transferring certain elements to a system-on-a-chip that operates adjacent to quantum chips within an ultra-cold dilution refrigerator. "SEEQC's work with IBM highlights both companies' contributions to the U.S. Government's investments into large-scale quantum computing capabilities," said John Levy, CEO and Co-Founder of SEEQC. "Our leading SFQ chip-based digital control technology improves the energy efficiency and functionality of quantum computing systems, and we're excited to build on our team's research." While SEEQC explores how SFQ control chips could enhance quantum system performance and reduce energy use in future systems, IBM will continue to progress on its IBM Quantum Development Roadmap, including its work to deliver a large-scale, fault-tolerant quantum computer. "IBM is on track with our IBM Quantum Roadmap to realize a fault-tolerant quantum computer by 2029," says Jay Gambetta, IBM Fellow and VP, IBM Quantum. "Controlling and scaling such large-scale quantum systems is a difficult engineering problem with many unresolved research questions. We are excited to collaborate with SEEQC, investigate these questions, and accelerate the progress toward our 2029 goal." While both companies maintain a global presence, SEEQC and IBM are deeply rooted in New York State's quantum ecosystem. SEEQC designs and tests its SFQ chips at its headquarters in Elmsford, while the IBM Quantum team primarily works out of the Thomas J. Watson Research Center in Yorktown Heights. "This collaboration between IBM and SEEQC showcases the strength of Westchester County's and New York State's ecosystem of expertise in quantum information sciences," said Deborah Novick, Director at the Westchester County Office of Economic Development and co-lead of the NY QUANTUM Consortium. "I am excited to see how the two organizations help advance quantum computing as part of DARPA's QBI." The Quantum Benchmarking Initiative reflects DARPA's broader mission to develop rigorous performance metrics and enable the design of practical, useful quantum computers for national and global challenges. The SEEQC-IBM collaboration exemplifies how New York's quantum ecosystem contributes to the entire "commercialization continuum" — from fundamental research and chip fabrication, to system integration and deployment. About SEEQCSEEQC is pioneering energy-efficient, scalable quantum computing through its proprietary Single Flux Quantum (SFQ) technology. Headquartered in Elmsford, New York, SEEQC designs and manufactures next-generation quantum control systems that integrate classical and quantum components on a single chip. Learn more at Media Contacts: SEEQCDavis Richardson, Paradox Public Relations dr@ IBMChris Nay, IBM Communications cnay@ View original content: SOURCE SEEQC Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data
Yahoo
16 hours ago
- Yahoo
SEEQC Announces Collaboration With IBM Under DARPA's Quantum Benchmarking Initiative
Collaboration Boosts New York's Quantum Ecosystem to Advance U.S. Quantum Computing Leadership ELMSFORD, N.Y., June 11, 2025 /PRNewswire/ -- SEEQC, a leader in scalable and energy-efficient quantum technologies, today announced a strategic technical collaboration with IBM as part of the U.S. Defense Advanced Research Projects Agency's (DARPA) Quantum Benchmarking Initiative (QBI). The collaboration will explore integrating SEEQC's Single Flux Quantum (SFQ) chip-based control layer technologies with IBM's leading-edge quantum systems architecture. SEEQC envisions using its SFQ technologies to shrink and consolidate external racks of classical control hardware by transferring certain elements to a system-on-a-chip that operates adjacent to quantum chips within an ultra-cold dilution refrigerator. "SEEQC's work with IBM highlights both companies' contributions to the U.S. Government's investments into large-scale quantum computing capabilities," said John Levy, CEO and Co-Founder of SEEQC. "Our leading SFQ chip-based digital control technology improves the energy efficiency and functionality of quantum computing systems, and we're excited to build on our team's research." While SEEQC explores how SFQ control chips could enhance quantum system performance and reduce energy use in future systems, IBM will continue to progress on its IBM Quantum Development Roadmap, including its work to deliver a large-scale, fault-tolerant quantum computer. "IBM is on track with our IBM Quantum Roadmap to realize a fault-tolerant quantum computer by 2029," says Jay Gambetta, IBM Fellow and VP, IBM Quantum. "Controlling and scaling such large-scale quantum systems is a difficult engineering problem with many unresolved research questions. We are excited to collaborate with SEEQC, investigate these questions, and accelerate the progress toward our 2029 goal." While both companies maintain a global presence, SEEQC and IBM are deeply rooted in New York State's quantum ecosystem. SEEQC designs and tests its SFQ chips at its headquarters in Elmsford, while the IBM Quantum team primarily works out of the Thomas J. Watson Research Center in Yorktown Heights. "This collaboration between IBM and SEEQC showcases the strength of Westchester County's and New York State's ecosystem of expertise in quantum information sciences," said Deborah Novick, Director at the Westchester County Office of Economic Development and co-lead of the NY QUANTUM Consortium. "I am excited to see how the two organizations help advance quantum computing as part of DARPA's QBI." The Quantum Benchmarking Initiative reflects DARPA's broader mission to develop rigorous performance metrics and enable the design of practical, useful quantum computers for national and global challenges. The SEEQC-IBM collaboration exemplifies how New York's quantum ecosystem contributes to the entire "commercialization continuum" — from fundamental research and chip fabrication, to system integration and deployment. About SEEQCSEEQC is pioneering energy-efficient, scalable quantum computing through its proprietary Single Flux Quantum (SFQ) technology. Headquartered in Elmsford, New York, SEEQC designs and manufactures next-generation quantum control systems that integrate classical and quantum components on a single chip. Learn more at Media Contacts: SEEQCDavis Richardson, Paradox Public Relations dr@ IBMChris Nay, IBM Communications cnay@ View original content: SOURCE SEEQC
Yahoo
17 hours ago
- Yahoo
Elekta appoints Jakob Just-Bomholt as CEO
This story was originally published on MedTech Dive. To receive daily news and insights, subscribe to our free daily MedTech Dive newsletter. Name: Jakob Just-Bomholt New title: CEO, Elekta Previous title: CEO, 3Shape Elekta has appointed Jakob Just-Bomholt as president and CEO. Just-Bomholt will take up the positions on Sept. 1, filling a vacancy created in March when the cancer radiotherapy company's board decided a new leader was needed to improve profitability and growth. Stockholm-based Elekta competes with Siemens Healthineers' Varian in the radiotherapy market. Elekta is looking to its new Evo radiation therapy machine to strengthen its position. However, while the device is on the market in Europe, helping drive 3% global sales growth in the most recent quarter, Elekta has yet to launch Evo in the U.S. The company has said U.S. customers are waiting for Evo, suppressing sales. Just-Bomholt will oversee Elekta's attempt to recover in the U.S. and in China, where sales have been hit by the anti-corruption drive, and build on momentum in Europe. The executive stepped down as CEO of 3Shape, a Danish digital dental scanning firm, earlier this year. The privately held 3Shape said in a statement at the time that Just-Bomholt spent 'five successful years' as CEO. Laurent Leksell, Elekta's founder and chairman, said in a statement that Just-Bomholt is well-suited to his new role. Leksell cited Just-Bomholt's strategic leadership, international experience and ability to drive profitable growth and global expansion as evidence he is the right person for the job. Just-Bomholt is set to begin onboarding in August, working with interim CEO Jonas Bolander to transition into the CEO post on Sept. 1. Bolander has spent his time as interim CEO 'stabilizing and simplifying the business,' the executive said on an earnings call late last month, and oversaw a change in Elekta's plans for bringing Evo to the U.S. market. Elekta withdrew its filing for clearance of Evo, and as of the May 28 earnings call, was in the process of resubmitting its application. Bolander said the change in filing strategy is intended to better align with the Food and Drug Administration's approval process, with a greater focus on cybersecurity. The interim CEO expects the delay to have a 'limited' impact on the overall product launch. Recommended Reading Elekta CEO Gustaf Salford to leave after board sees need for new leader Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data