Leidos joins DARPA INGOTS project to use artificial intelligence (AI) to fix cyber security vulnerabilities

Feb. 20, 2025
INGOTS aims to harden systems against exploit chains by identifying and fixing these vulnerabilities before attackers can capitalize on them.

ARLINGTON, Va. – U.S. military researchers are asking a fifth company to use artificial intelligence (AI) to measure cyber security vulnerabilities in sophisticated and complex computer and weapons systems.

Officials of the U.S. Defense Advanced research Projects Agency (DARPA) in Arlington, Va., announced an $8.8 million contract Tuesday to Leidos Inc. in Reston, Va., for the Intelligent Generation of Tools for Security (INGOTS) project.

Sophisticated cyber attacks

INGOTS assumes that today's sophisticated cyber attacks link several vulnerabilities together into exploit chains that bypass software and hardware security measures to compromise critical, high-value devices.

Instead, INGOTS aims to harden systems against exploit chains by identifying and fixing these vulnerabilities before attackers can capitalize on them. INGOTS will characterize and measure interdependent exploitability to protect against the next generation of cyber security vulnerabilities.

Related: Wanted: new enabling technologies in artificial intelligence (AI), cyber warfare, and information security

Leidos joins Two Six Labs LLC in Arlington, Va.; RTX BBN Technologies in Cambridge, Mass.; Kudu Dynamics LLC in Chantilly, Va.; and Narf Industries LLC in San Francisco on the INGOTS project.

In late January Two Six Labs won an $18.6 million contract; RTX BBN Technologies won a $10.3 million contract; Kudu Dynamics won a $7.1 million contract; and Narf Industries won a $6.8 million contract.

Understanding cyber risk

Understanding cyber risk is critical, yet today crucial vulnerabilities go unfixed as resources are misallocated to lesser issues. The reason is that today’s metrics fail to capture factors that differentiate an innocuous software flaw from a potent vulnerability.

Without accurate ways to measure exploitability, developers and defenders must rely on empirical evidence like a manually developed proof-of-concept exploits to assess severity and rank vulnerabilities for remediation in order of importance.

Attempts to do this today are expensive, and not only require time and subject matter expertise, but also are unable to keep up with the speed and scale of the problem.

The INGOTS program aims to measure chainable vulnerabilities within widely used secure computing systems at speed and at scale before attackers can take advantage of unauthorized access, and create an automated process to triage vulnerabilities rapidly.

AI-related approaches

INGOTS will develop datasets that capture artifacts and features of vulnerabilities and exploits to drive program analysis and AI-related approaches for rapid risk assessment.

Rather than develop a automatic process, INGOTS aims to create a computer-human pipeline that enables human intervention with semi-automatic tools. Ultimately, the project seeks to reduce the level of human-intervention and expertise, and measure the severity of vulnerabilities can be measured at scale with near-full automation.

Related: Military researchers eye future project for on-system cyber security in bus-based embedded computing

The INGOTS 36-month program has four technical areas: -- vulnerability triage; severity analysis; data modeling; and integration. Several contractors will be involved. The project also will target three use cases: mobile operating systems; cellular baseband stack; and Wi-Fi and Bluetooth stacks.

Vulnerability triage will use machine automation to rank potential vulnerabilities within widely used secure computing systems. Severity analysis will develop theories, tools, and techniques for automating how to find and generate proofs of vulnerabilities. Data modeling will develop an architecture to analyze vulnerabilities automatically and manually. Transition will identify use cases and work with the Pentagon to establish how to deploy enabling technologies developed in the INGOTS project.

For more information contact Leidos online at www.leidos.com; Two Six Labs at https://twosixtech.com; RTX BBN at https://www.rtx.com/who-we-are/we-are-rtx/transformative-technologies/bbn; Kudu Dynamics at www.kududyn.com; Narf Industries at https://narfindustries.com; or DARPA at https://www.darpa.mil/research/programs/intelligent-generation-tools-security.

About the Author

John Keller | Editor-in-Chief

John Keller is the Editor-in-Chief, Military & Aerospace Electronics Magazine--provides extensive coverage and analysis of enabling electronics and optoelectronic technologies in military, space and commercial aviation applications. John has been a member of the Military & Aerospace Electronics staff since 1989 and chief editor since 1995.

Voice your opinion!

To join the conversation, and become an exclusive member of Military Aerospace, create an account today!