Social Icons

Wednesday, May 13, 2015

US government grants $3 million to fight future cyberattacks

Algorithmic vulnerabilities, or the emerging hacking threat, can do a lot of damage on computer systems. It is considered as more complex, more challenging to detect and more effective at damaging different nation’s computer systems.

Additionally, it is extremely hard to detect with the existing security technology according to the Dyman & Associates Risk Management Projects.

These attacks can only be achieved by hackers hired by nation states which have resources essential to mount them, but perhaps not for very long.

Computer scientists at the University of Utah and University of California, Irvine are given $3 million by the U.S. Department of Defense to produce software that will detect or fight future cyberattacks.

The University of Utah team will be composed of 10 faculty members, postdoctoral and graduate students. Of the $3 million grant, which is over four years, $2 million will go to the Utah team and $1 million to the Irvine team.

The project is funded by the Defense Advanced Research Projects Agency (DARPA) in a new program called STAC, or Space/Time Analysis for Cybersecurity.

The team is tasked with creating an analyzer that can fight so-called algorithmic attacks that target the set of rules or calculations that a computer must follow to solve a problem.

The analyzer needs to perform a mathematical simulation to predict what’s going to happen in case there is an attack and it must conduct an examination of computer programs to detect algorithmic vulnerabilities or “hot spots” in the code. It is more like a spellcheck but for cybersecurity.

University of Utah’s associate professor of computer science and a co-leader on the team, Matt Might said that the military is looking ahead at what’s coming in regards of cybersecurity and it seems like they’re going to be algorithmic attacks. He also stated that the current state of computer security is a lot like doors unlocked into the house so there’s no point getting a ladder and scaling up to an unlocked window on the roof.

"But once all the doors get locked on the ground level, attackers are going to start buying ladders. That's what this next generation of vulnerabilities is all about."

Hackers will make use of programmers’ mistakes while creating their programs on the software. For instance, the software will get a programming input crafted by a hacker and use it without automatically validating it first which can result in a vulnerability giving the hacker access to the computer or causing it to leak information.

Algorithmic attacks are very different since they don’t need to find such conventional vulnerabilities. For instance, they can secretly track how much energy a computer is utilizing and use that information to gather sensitive data that the computer is processing, or they can secretly track how an algorithm is running within a computer. These attacks can also drive central processing unit (CPU) to overwork, or they can disable a computer by forcing it to use too much memory.

Suresh Venkatasubramanian, who is also a co-leader from the team, states that these algorithmic attacks are very devious because they could exploit weaknesses in how resources like space and time are utilized in the algorithm.

Algorithmic attacks are really complex, costly, and use the most amount of time, so most hackers these days are not using this kind of attacks however, they take the easier route of exploiting current vulnerabilities.


  1. The team is tasked with creating an analyzer that can fight so called algorithmic attacks that target the set of rules or calculations that a computer solve a problem and its more like a spellcheck but for cybersecurity algorithmic attack are really complex ,costly nowadays hackers is attacks easier route so safe to security. Its very useful information hacking attack and cybersecurity useful to all in related more information post!.

    fire and safety management course training chennai
    fire and safety training in chennai

    nebosh course in chennai
    nebosh courses in chennai
    Iosh course in chennai

  2. Thanks for spending your valuable time in delivering the most valuable content here.I loved the way you write and suggest my friends too for getting aware of your blogs.
    Pawn Shops in Alabama
    Pawn Loans in Alabama
    Pawn Brokers

  3. Very nice blog thanks for sharing this. your blog is so useful about our safety thanks dear great job I supported you keep it up this great work AOL Tech Support Number

  4. Thank you for sharing the information. It's a really very nice blog.

    Visit my site:
    AOL Search
    AOL Mail Tech Support
    AOL mail Help phone number

  5. I am very happy to read your article and such a nice article. Thanks for sharing information.

  6. I read your article and your article is very nice. Thank you for this article!
    Find a QuickBooks ProAdvisor

  7. great information on this post and i am read this post and such a awesome article thank you so much share with me.

  8. Hi
    A debt of gratitude is in order for perusing this blog I trust you discovered it bolsters and supportively data. I have perused your blog great data in this Facebook Tech Support Number blog. It was great learning from this blog. Your blog is a decent motivation for this blog.

  9. You know higher facebook is a social networking website online. But nowadays fb consumer one of a kind type of hassle face, Your account not operating properly, image upload, and text msg trouble Please touch our Facebook customer service number wide variety this is range. If you want any records Please visit our internet site.

  10. HP Printer Support Phone Number

    Brother Printer Support Phone Number
    Brother Printer Support Phone Number

    Dell Printer Support Phone Number

    Dell Printer Support Phone Number

    Lexmark Printer Support Phone Number
    Lexmark Printer Support Phone Number

    HP Printer Support phone Number
    HP Printer Support Phone Number

    Epson printer Support Phone Number
    Epson Printer Support Phone Number

    canon Printer Support phone Number
    Canon Printer Technical Support Phone Number

    HP Printer Installation Help
    HP Printer Installation help

  11. What if your printer is useful to you and you are dependent on it, it works really well, and after some time, you start noticing hiccups. Contact HP Printer support phone number and update the printer.

    hp printer support number
    HP Printer Error Codes

  12. Sage Support Phone Number +1-855-686-6166.

    If you’re looking for the Sage Support contact number. Then this is the best phone number+1-855-686-6166 to the Sage customer support. We have sourced this number to save your time searching over the internet for the Sage Support contact telephone number.

    Sage leading worldwide provide accounting software, ERP & Hrms solutions, Sage Customer Dial Number +1-855-686-6166 can get the help from AdvisorExpert for the issues related to Sage 50, Sage 100, Sage 300 , Sage Payroll, Sage Live, Sage One and other Sage accounting product.

    Sage Support Phone Number

    Sage Support Phone Number USA

    Sage Support Number

    Sage Support

    Sage Technical Support Phone Number

    Sage Technical Support Number

    Sage Technical Support

    Sage Tech Support Phone Number

    Sage Tech Support Number

    Sage Tech Support

    Quicken Support Phone Number +1-855-686-6166.

    We all in all understand that we are encountering a day by day reality with the end goal that the test is high and people are not leaving any stone to get accomplishment. If you buy something in the wake of putting your extra undertakings in and essentially to release and a short time later out of the blue you become familiar with how to use the Quicken Support Phone Number then you start finding the for that. Nothing can be terrible this that you are not prepared to get your Quicken Support Phone Number on the time. Anyway now you don’t have to worry over it since we are giving our Quicken Support Phone Number organizations as indicated by our client needs.

    Quicken Support Phone Number

    Quicken Support Number

    Quicken Support

    Quicken Technical Support Phone Number

    Quicken Technical Support Number

    Quicken Technical Support