NIST Workshop on
Software Measures and Metrics to Reduce Security Vulnerabilities
SwMM-RSV
![]() |
Tuesday, 12 July 2016 Green Auditorium National Institute of Standards and Technology Gaithersburg, Maryland, USA |
![]() |
Final Report
The final workshop report is available as NIST SP 500-320. It is available at DOI: 10.6028/NIST.SP.500-320.
Overview
The Federal Cybersecurity Research and Development Strategic Plan seeks to fundamentally alter the dynamics of security, reversing adversaries' asymmetrical advantages. Achieving this reversal is the mid-term goal of the plan, which calls for "sustainably secure systems development and operation." Part of the mid-term (3-7 years) goal is "the design and implementation of software, firmware, and hardware that are highly resistant to malicious cyber activities ..." and reduce the number of vulnerabilities in software by orders of magnitude. Measures of software play an important role.
Industry requires evidence to tell how vulnerable a piece of software is, what techniques are most effective in developing software with far fewer vulnerabilities, determine the best places to deploy countermeasures, or take any of a number of other actions. This evidence comes from measuring, in the broadest sense, or assessing properties of software. With useful metrics, it is straight-forward to determine which software development technologies or methodologies lead to sustainably secure systems.
The goal of this workshop is to gather ideas on how the Federal Government can best use taxpayer money to identify, improve, package, deliver, or boost the use of software measures and metrics to significantly reduce vulnerabilities. We call for position statements from one to three paragraph long. Position statements may be on any subject like the following:
- existing measures of software that can make a difference in three to seven years,
- means of validating software measures or confirming their efficacy (meta-measurements),
- quantities (properties) in software that can be measured,
- standards (in both étalon and norme senses) needed for software measurement,
- cost vs. benefit of software measurements,
- surmountable barriers to adoption of measures and metrics,
- areas or conditions of applicability (or non-applicability) of measures,
- software measurement procedures (esp. automated ones), or
- sources of variability or uncertainty in software metrics or measures.
The output of this workshop and other efforts is a plan for how best the Federal Government can employ taxpayer money to significantly curtail software vulnerabilities in the mid-term. See https://samate.nist.gov/DRSV2016/ for details.
Important Dates
22 May: deadline to submit statementsSubmissions are closed.8 June: invitations to present sentSent27 June: deadline for non-citizens to register (no on-site registration)5 July: deadline for US citizens to register (no on-site registration)12 July: Workshop
Registration
The workshop was at the U.S. National Institute of Standards and Technology (NIST) in Gaithersburg, Maryland.
Final Agenda
The program was a mix of presentations based on position statements and discussion. The workshop went from 9 am to 4:30 pm with breaks.
0900 Welcome, safety, and schedule, Paul E. Black, NIST
0910 Federal Cybersecurity Research and Development Strategic Plan, Greg Shannon, White House Office of Science and Technology Policy, Gregory_E_Shannon@ostp.eop.gov
0915 Opening Remarks, William F. Guthrie, Chief, Statistical Engineering Division, NIST, william.guthrie@nist.gov
0930 Measuring Software Analyzability, Andrew Walenstein, BlackBerry, awalenstein@blackberry.com
1000 Dealing with Code that is Opaque to Static Analysis, James Kupsch, University of Wisconsin-Madison, kupsch@cs.wisc.edu
1030 break
1050 Composing processes for secure development using process control measures, William Nichols, Software Engineering Institute, wrn@sei.cmu.edu
1110 Measure Early and Measure Often – SWAMP, Miron Livny, miron@cs.wisc.edu
1130 lunch
1300 CISQ Measures of Secure, Resilient Software, Dr. Bill Curtis, Executive Director, Consortium for IT Software Quality (CISQ), bill.curtis@it-cisq.org
1320 Mostly Sunny with a Chance of Cyber-doom, David Flater, NIST, david.flater@nist.gov
1340 Dynamically Proving That Security Issues Exist, Dr Andrew V. Jones, Vector Software, andrew.jones@vectorcast.com
1400 Charge to Breakout Groups, breakout into six groups
1420 break
1450 breakout reports: 6 × 5 minutes
1520 Toward Evidence-Based Low Defect Software Production, James Kirby Jr., US Naval Research Laboratory, james.kirby@nrl.navy.mil
1540 Using Malware Analysis to Reduce Design Weaknesses, Carol Woody, Ph.D., Software Engineering Institute, cwoody@cert.org
1600 Summary - Our Next Steps, Paul E. Black, NIST
1630 Workshop ends
General Chairs
Elizabeth Fong
(National Institute of Standards and Technology)
efong@nist.gov
Paul E. Black
(National Institute of Standards and Technology)
paul.black@nist.gov
Thomas D. Hurt
(Office of the Deputy Assistant Secretary of Defense
for Systems Engineering - Joint Federated Assurance Center (JFAC) lead)
thomas.d.hurt.civ@mail.mil
Program Committee
Paul E. Black
David Flater
Elizabeth Fong
D. Richard Kuhn
W. Timothy Polk
Cybersecurity National Action Plan (CNAP)
This page's URL is https://samate.nist.gov/SwMM-RSV2016.html.