SlideShare una empresa de Scribd logo
1 de 52
/51
BLOCKCHAIN FOR CYBER DEFENSE:
WILL IT BE AS GOOD AS YOU THINK?
Suhyeon Lee
Korea Univ. /
ROKA
Seungjoo Kim
Korea Univ.
This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the
ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-
00403)supervised by the IITP(Institute for Information &communications Technology Planning
&Evaluation
/51
Suhyeon Lee
Ph.D Student in Korea University
Captain in ROKA
Suhyeon Lee ( ) is a Ph.D student in Korea
university. I have 3 years experience as a researcher
in Agency for Defense Development.
As a security researcher, I am interested in network
security, cyber defense, and blockchain
• Cryblock 2019 @ IEEE Infocom speaker
“Countering Block Withholding Attack Efficiently”
• Cryblock 2020 @ ACM Mobicom speaker
“Proof-of-Stake at Stake: Predatory, Destructive Attack on
PoS Cryptocurrencies”
I like to get groundbreaking ideas from philosophy.
My favorite philosophers: Derrida, Nietzsche,
Foucault, Wittgenstein, etc.
orion-alpha at korea.ac.kr
2
/51
Seungjoo Kim
Professor in Korea University
Seungjoo Kim is a professor of School of Cybersecurity
in Korea University from 2011.
In addition to being a professor, he is positioning a head
of SANE(Security Assessment aNd Engineering) Lab, an
adviser of undergraduate hacking club 'CyKor', a
founder/advisory director of an international security &
hacking conference 'SECUINSIDE'. Since 2018, he has
been a review board member of Black Hat Asia.
His main research areas focus on trustworthy system
development methodology such as secure SDLC, RMF,
Common Criteria, CMVP, and blockchain etc. He is a
corresponding author.
skim71 at korea.ac.kr
3
/51
TOPICS
What is blockchain for cyber
defense
Challenges for blockchain in cyber
defense
Related military projects and
analysis
Takeaway
4
/51
TARGETS
Someone interested in blockchain
Someone interested in cyber
defense
Someone interested in how
blockchain can be hacked
Someone needs fresh ideas
→ It will be fun to know about blockchain
→ It will be fun to know about cyber defense perspectives
Someone who needs fresh ideas
5
/51
Blockchain for Cyber Defense, what is it?
6
/51
Blockchain, maybe you know
Hash-chained
Blocks
Distributed
Network
Decentralized
Consensus
Scalability
Security Decentralization
Features Trilemma
7
/51
Cyber Defense,
maybe you don’t know
8
/51
Cyber Defense, maybe you don’t know
Cyber security Information security
Threats to
information-
based assets
Threats using ICT Rossouw Von Solms and Johan Van Niekerk. From
information security to cyber security. computers &
security, 38:97–102, 2013 9
/51
Cyber Defense, maybe you don’t know
Cyber security Information security
National security
(or defense)
Cyber defense
Narrowly military defense
Widely national security
10
/51
Cyber Defense, maybe you don’t know
11
/51
Cyber Defense, maybe you don’t know
2007 Cyber attack
to Estonia
2010 Stuxnet to Iranian
nuclear facilities
2015 BlackEnergy to Ukranian
power gird
Therefore nation countries need cybersecurity technologies
12
/51
Blockchain looks secure, reliable
Single point of failure
Any Minority attacks
DDoS
13
/51
Blockchain looks secure, reliable
“Defense systems require high
security and high reliability…”
“It’s unhackable”
“Okay, then Defense needs it!”
14
/51
Related Projects - Preview
• Military Encrypted Messaging App Built on Blockchain
• Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs
• Decentralized Key Management using Blockchain
• Army Innovation Network -Information System
• Provenance Using Blockchain on Disconnected Networks
• Navy's Approved Multi-Factor Authentication for Personal Mobile Devices
• Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks
• Chinese soldiers reward system using cryptocurrency for good performance
• Blockchain-based system to record intelligence in Australia
• Blockchain to help secure aerospace and defense (A&D) supply chains
• French Military Police Record on Tezos Blockchain
• South Korean Military's Blockchain-Based Digital IDentification (DID)
…… and so on
15
/51
Will it be as good as
you think?
16
/51
Let’s go to the battleground
17
/51
What is waiting for us in the battleground?
War is the realm of uncertainty; three quarters of
the factors on which action in war is based are
wrapped in a fog of greater or lesser uncertainty. A
sensitive and discriminating judgment is called for; a
skilled intelligence to scent out the truth.
Carl von Clausewitz
@realClausewitz
18
/51
Can be more miserable
Mountain to go (expectation)
19
/51
Can be more miserable
Where are
Trees?
They burnt down
a year ago
Mountain
20
/51
Let’s assume you got an order to apply
Blockchain in Cyber Defense
“Adopt the blockchain Technology
and secure our networks”
“Aye Aye Sir!”
(There are trusted networks…)
21
/51
We encounter 3 challenges
Challenge 1:: Air-gapped Networks
Challenge 2:: Forced Dynamic Environment
Challenge 3:: Resource Shortage
22
/51
Challenge 1:: Air-gapped Networks
Software-based air-gap
Hardware-based air-gap
True air-gap
23
/51
Challenge 1:: Air-gapped Networks
Single point of failure
24
/51
Challenge 1:: Air-gapped Networks
1/N 1/N 1/N
They are partitioned, and decentralization is not effective
25
/51
Challenge 1:: Air-gapped Networks
→ Because of the air-gapped structure
of defense network, it may be hard to
adopt blockchain
26
/51
Challenge 2:: Forced Dynamic Environment
Wherever the military goes, communication must always exist.
27
/51
Challenge 2:: Forced Dynamic Environment
28
/51
Challenge 2:: Forced Dynamic Environment
29
/51
Challenge 2:: Forced Dynamic Environment
- Case : Sudden expansion
Total nodes: 8
Acceptable faulty nodes : (8-1)/3 = 2
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Too easy to make consensus!
The majority becomes the minority.
That is, now, your minority can make the consensus
30
/51
Challenge 2:: Forced Dynamic Environment
- Case : Sudden shrinkage
Total nodes: 8
Acceptable faulty nodes : (8-1)/3 = 3
Nearly impossible to make
consensus!
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 11
The minority becomes the majority.
That is, now, your majority can’t make the consensus
31
/51
Challenge 2:: Forced Dynamic Environment
- Case : Bombing & Partitioning
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
There’s no majority anymore. Furthermore…. 32
/51
Challenge 2:: Forced Dynamic Environment
- Case : Bombing & Partitioning
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Total nodes: 36
Acceptable faulty nodes : (36-1)/3 = 12
Total nodes: 18
Acceptable faulty
nodes : (18-1)/3 = 5
Consistency?
Furthermore, we will meet a fork problem. But we can’t just choose one. 33
/51
Challenge 2:: Forced Dynamic Environment
In more extreme situations,
→ Assumptions can be easily broken.
→ Weaknesses can be easily revealed.
→ Especially, deterministic consensus mechanisms
that CAN NOT guarantee liveness are….
34
/51
Challenge 3:: Resource Shortage
▪ The first problem is resource consumption.
Blockchain’s other name is “state replication system”
Influence on “Mission critical functions” should be checked
35
/51
Challenge 3:: Resource Shortage
▪ The first problem is resource consumption.
▪ The second problem is that solving resource
consumption is not easy.
Speed
Our ultimate goal in acquisitions should be
to deliver capability to the warfighter more
rapidly, but unfortunatelytoday it takes too
long to develop and field our systems.
-DEBORAHLEE JAMES,
SECRETARY OF THE AIR FORCE
Bureaucratic acquisition process
36
/51
What can you do?
▪ PoW…. We can’t waste energy
▪ PoS…. We don’t have coins
Let’s go to the private style → PBFT style
Challenge 3:: Resource Shortage
37
/51
What can you do?
▪ PoW…. We can’t waste energy
▪ PoS…. We don’t have coins
Let’s go to the private style → PBFT style
⇒ But not flexible & Goto Challenge 2 again!
Challenge 3:: Resource Shortage
38
/51
Challenge 3:: Resource Shortage
→ Mission is always first.
However, due to the military environment,
support is not so timely and sufficient.
39
/51
Related Projects
• Data Integrity*
• Supply Chain Management
• Internet-of-Things
• Communications
• Identification & Authentication
Total 42
14 (33%)
12 (29%)
8 (19%)
11 (26%)
5 (12%)
* Projects only concerned to data integrity
- One project can belong to multiple categories
40
/51
Related Projects
[Caution]
•About related projects, detailed information
about many real military projects are
classified
•Our comments are based on limited
information
41
/51
Related Projects
• Data Integrity
- French military police records on Tezos
- US DoD project “Sharing of defense research,
development, testing, and evaluation - Data
distribution using blockchain”
- US DoD project “Provenance using blockchain on
disconnected networks”
42
/51
Related Projects
•Supply Chain Management
-US DoD project “Blockchain supply
chain enhancement for trusted and
assured FPGA and ASICs”
Blockchain on supply chain management is
also actively researched for efficiency not
only for security
43
/51
Related Projects
• Internet-of-Things
- US DHS project “Combining blockchain
technology with critical infrastructure”
It’s sensors and cameras that protect the integrity and
authenticity of critical infrastructure. Blockchain projects
on IoT may suffer from Challenge #3, Resource Shortage.
44
/51
Related Projects
• Communications
- US DARPA project “Building an encrypted
msg system based on blockchain technology”
If it is related to messages in tactical networks,
Challenge #2, Forced Dynamic Environments and
Challenge #3, Resource Shortage should be considered.
45
/51
Related Projects
• Identification & Authentication
- US DHS project “Decentralized key
management using blockchain”
- South Korea project “blockchain-based DID”
46
/51
Related Projects
• Military Encrypted Messaging App Built on Blockchain
• Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs
• Decentralized Key Management using Blockchain
• Army Innovation Network -Information System
• Provenance Using Blockchain on Disconnected Networks
• Navy's Approved Multi-Factor Authentication for Personal Mobile Devices
• Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks
• Chinese soldiers reward system using cryptocurrency for good performance
• Blockchain-based system to record intelligence in Australia
• Blockchain to help secure aerospace and defense (A&D) supply chains
• French Military Police Record on Tezos Blockchain
• South Korean Military's Blockchain-Based Digital IDentification (DID)
…… and so on
47
/51
Related Projects
1. General purpose
2. Domain-specific purposes
“Something interesting”
48
/51
Then, Alternatives?
Hash-chained
Blocks
Distributed
Network
Decentralized
Consensus
Features
We don’t need to choose a perfect blockchain structure
49
/51
Takeaway
- Cyber defense makes more challenges and
requirements for blockchain.
• Air-gaps, Sudden expansion, shrinkage, partitioning..
- Blockchain’s resource consumption can be a
problem, but defense environments are not flexible
to assign more enough resources.
- We don’t need to cling to blockchain if it’s not adaptable.
Otherwise, it will bring more issues.
50
/51
Get in Touch
We welcome any questions and discussions
Suhyeon Lee
orion-alpha at korea.ac.kr
Seungjoo Kim
skim71 at korea.ac.kr
51
/51
Thank you
Suhyeon Lee
Korea Univ. /
ROKA
Seungjoo Kim
Korea Univ.
This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the
ITRC(Information Technology Research Center) support program(IITP-2020-2015-0-
00403)supervised by the IITP(Institute for Information &communications Technology Planning
&Evaluation

Más contenido relacionado

Similar a Blockchain for Cyber Defense: Will It Be As Good As You Think?

The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testersyasirabdullah15
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniquesyasirabdullah15
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertjmbrrvgzhr
 
Security testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingSecurity testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingHaribabu Nandyal Padmanaban
 
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemBlockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemFerdin Joe John Joseph PhD
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Rishab garg
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspacemark-smith
 
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...Michael Rosenblum
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Tương Hoàng
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Blockchain presentation-tech ontap-tv-v1
Blockchain presentation-tech ontap-tv-v1Blockchain presentation-tech ontap-tv-v1
Blockchain presentation-tech ontap-tv-v1Tony Vernall
 
Introduction to Computer Security.ppt
Introduction to Computer Security.pptIntroduction to Computer Security.ppt
Introduction to Computer Security.pptKojaSb
 

Similar a Blockchain for Cyber Defense: Will It Be As Good As You Think? (20)

The Role of Security and Penetration Testers
The Role of Security and Penetration TestersThe Role of Security and Penetration Testers
The Role of Security and Penetration Testers
 
Foot printing and Reconnaissance Techniques
Foot printing and Reconnaissance TechniquesFoot printing and Reconnaissance Techniques
Foot printing and Reconnaissance Techniques
 
CEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expertCEH Hacking Overview from beginner to expert
CEH Hacking Overview from beginner to expert
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Security testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration TestingSecurity testing fundamentals - must need basics to learn Penetration Testing
Security testing fundamentals - must need basics to learn Penetration Testing
 
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General ProblemBlockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
Blockchain Technology - Week 10 - CAP Teorem, Byzantines General Problem
 
Ethical Hacking and Network Defense
Ethical Hacking and Network Defense Ethical Hacking and Network Defense
Ethical Hacking and Network Defense
 
Technologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible CyberspaceTechnologies and Policies for a Defensible Cyberspace
Technologies and Policies for a Defensible Cyberspace
 
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...
Managing the Earthquake: Surviving Major Database Architecture Changes (rev.2...
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Blockchain presentation-tech ontap-tv-v1
Blockchain presentation-tech ontap-tv-v1Blockchain presentation-tech ontap-tv-v1
Blockchain presentation-tech ontap-tv-v1
 
Introduction to Computer Security.ppt
Introduction to Computer Security.pptIntroduction to Computer Security.ppt
Introduction to Computer Security.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 
hel1.ppt
hel1.ppthel1.ppt
hel1.ppt
 

Más de Seungjoo Kim

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리Seungjoo Kim
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. SyllabusSeungjoo Kim
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...Seungjoo Kim
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto BlockchainSeungjoo Kim
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart ContractSeungjoo Kim
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and MetaverseSeungjoo Kim
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other AltcoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark CoinsSeungjoo Kim
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...Seungjoo Kim
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Seungjoo Kim
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Seungjoo Kim
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCSeungjoo Kim
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessSeungjoo Kim
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Seungjoo Kim
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLSeungjoo Kim
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -Seungjoo Kim
 

Más de Seungjoo Kim (20)

블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리블록체인의 본질과 동작 원리
블록체인의 본질과 동작 원리
 
[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
 
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Te...
 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
 
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
 
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
[Blockchain and Cryptocurrency] 05. Ethereum and Smart Contract
 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
 
Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)Kid Blockchain - Everything You Need to Know - (Part 2)
Kid Blockchain - Everything You Need to Know - (Part 2)
 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
 
Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화Post-Coronavirus 시대 보안 패러다임의 변화
Post-Coronavirus 시대 보안 패러다임의 변화
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
프라이버시 딜레마 - HTTPS 차단, 약인가 독인가? -
 

Último

Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfrs7054576148
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Último (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Blockchain for Cyber Defense: Will It Be As Good As You Think?

  • 1. /51 BLOCKCHAIN FOR CYBER DEFENSE: WILL IT BE AS GOOD AS YOU THINK? Suhyeon Lee Korea Univ. / ROKA Seungjoo Kim Korea Univ. This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0- 00403)supervised by the IITP(Institute for Information &communications Technology Planning &Evaluation
  • 2. /51 Suhyeon Lee Ph.D Student in Korea University Captain in ROKA Suhyeon Lee ( ) is a Ph.D student in Korea university. I have 3 years experience as a researcher in Agency for Defense Development. As a security researcher, I am interested in network security, cyber defense, and blockchain • Cryblock 2019 @ IEEE Infocom speaker “Countering Block Withholding Attack Efficiently” • Cryblock 2020 @ ACM Mobicom speaker “Proof-of-Stake at Stake: Predatory, Destructive Attack on PoS Cryptocurrencies” I like to get groundbreaking ideas from philosophy. My favorite philosophers: Derrida, Nietzsche, Foucault, Wittgenstein, etc. orion-alpha at korea.ac.kr 2
  • 3. /51 Seungjoo Kim Professor in Korea University Seungjoo Kim is a professor of School of Cybersecurity in Korea University from 2011. In addition to being a professor, he is positioning a head of SANE(Security Assessment aNd Engineering) Lab, an adviser of undergraduate hacking club 'CyKor', a founder/advisory director of an international security & hacking conference 'SECUINSIDE'. Since 2018, he has been a review board member of Black Hat Asia. His main research areas focus on trustworthy system development methodology such as secure SDLC, RMF, Common Criteria, CMVP, and blockchain etc. He is a corresponding author. skim71 at korea.ac.kr 3
  • 4. /51 TOPICS What is blockchain for cyber defense Challenges for blockchain in cyber defense Related military projects and analysis Takeaway 4
  • 5. /51 TARGETS Someone interested in blockchain Someone interested in cyber defense Someone interested in how blockchain can be hacked Someone needs fresh ideas → It will be fun to know about blockchain → It will be fun to know about cyber defense perspectives Someone who needs fresh ideas 5
  • 6. /51 Blockchain for Cyber Defense, what is it? 6
  • 7. /51 Blockchain, maybe you know Hash-chained Blocks Distributed Network Decentralized Consensus Scalability Security Decentralization Features Trilemma 7
  • 9. /51 Cyber Defense, maybe you don’t know Cyber security Information security Threats to information- based assets Threats using ICT Rossouw Von Solms and Johan Van Niekerk. From information security to cyber security. computers & security, 38:97–102, 2013 9
  • 10. /51 Cyber Defense, maybe you don’t know Cyber security Information security National security (or defense) Cyber defense Narrowly military defense Widely national security 10
  • 11. /51 Cyber Defense, maybe you don’t know 11
  • 12. /51 Cyber Defense, maybe you don’t know 2007 Cyber attack to Estonia 2010 Stuxnet to Iranian nuclear facilities 2015 BlackEnergy to Ukranian power gird Therefore nation countries need cybersecurity technologies 12
  • 13. /51 Blockchain looks secure, reliable Single point of failure Any Minority attacks DDoS 13
  • 14. /51 Blockchain looks secure, reliable “Defense systems require high security and high reliability…” “It’s unhackable” “Okay, then Defense needs it!” 14
  • 15. /51 Related Projects - Preview • Military Encrypted Messaging App Built on Blockchain • Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs • Decentralized Key Management using Blockchain • Army Innovation Network -Information System • Provenance Using Blockchain on Disconnected Networks • Navy's Approved Multi-Factor Authentication for Personal Mobile Devices • Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks • Chinese soldiers reward system using cryptocurrency for good performance • Blockchain-based system to record intelligence in Australia • Blockchain to help secure aerospace and defense (A&D) supply chains • French Military Police Record on Tezos Blockchain • South Korean Military's Blockchain-Based Digital IDentification (DID) …… and so on 15
  • 16. /51 Will it be as good as you think? 16
  • 17. /51 Let’s go to the battleground 17
  • 18. /51 What is waiting for us in the battleground? War is the realm of uncertainty; three quarters of the factors on which action in war is based are wrapped in a fog of greater or lesser uncertainty. A sensitive and discriminating judgment is called for; a skilled intelligence to scent out the truth. Carl von Clausewitz @realClausewitz 18
  • 19. /51 Can be more miserable Mountain to go (expectation) 19
  • 20. /51 Can be more miserable Where are Trees? They burnt down a year ago Mountain 20
  • 21. /51 Let’s assume you got an order to apply Blockchain in Cyber Defense “Adopt the blockchain Technology and secure our networks” “Aye Aye Sir!” (There are trusted networks…) 21
  • 22. /51 We encounter 3 challenges Challenge 1:: Air-gapped Networks Challenge 2:: Forced Dynamic Environment Challenge 3:: Resource Shortage 22
  • 23. /51 Challenge 1:: Air-gapped Networks Software-based air-gap Hardware-based air-gap True air-gap 23
  • 24. /51 Challenge 1:: Air-gapped Networks Single point of failure 24
  • 25. /51 Challenge 1:: Air-gapped Networks 1/N 1/N 1/N They are partitioned, and decentralization is not effective 25
  • 26. /51 Challenge 1:: Air-gapped Networks → Because of the air-gapped structure of defense network, it may be hard to adopt blockchain 26
  • 27. /51 Challenge 2:: Forced Dynamic Environment Wherever the military goes, communication must always exist. 27
  • 28. /51 Challenge 2:: Forced Dynamic Environment 28
  • 29. /51 Challenge 2:: Forced Dynamic Environment 29
  • 30. /51 Challenge 2:: Forced Dynamic Environment - Case : Sudden expansion Total nodes: 8 Acceptable faulty nodes : (8-1)/3 = 2 Total nodes: 36 Acceptable faulty nodes : (36-1)/3 = 12 Too easy to make consensus! The majority becomes the minority. That is, now, your minority can make the consensus 30
  • 31. /51 Challenge 2:: Forced Dynamic Environment - Case : Sudden shrinkage Total nodes: 8 Acceptable faulty nodes : (8-1)/3 = 3 Nearly impossible to make consensus! Total nodes: 36 Acceptable faulty nodes : (36-1)/3 = 11 The minority becomes the majority. That is, now, your majority can’t make the consensus 31
  • 32. /51 Challenge 2:: Forced Dynamic Environment - Case : Bombing & Partitioning Total nodes: 18 Acceptable faulty nodes : (18-1)/3 = 5 Total nodes: 36 Acceptable faulty nodes : (36-1)/3 = 12 Total nodes: 18 Acceptable faulty nodes : (18-1)/3 = 5 There’s no majority anymore. Furthermore…. 32
  • 33. /51 Challenge 2:: Forced Dynamic Environment - Case : Bombing & Partitioning Total nodes: 18 Acceptable faulty nodes : (18-1)/3 = 5 Total nodes: 36 Acceptable faulty nodes : (36-1)/3 = 12 Total nodes: 18 Acceptable faulty nodes : (18-1)/3 = 5 Consistency? Furthermore, we will meet a fork problem. But we can’t just choose one. 33
  • 34. /51 Challenge 2:: Forced Dynamic Environment In more extreme situations, → Assumptions can be easily broken. → Weaknesses can be easily revealed. → Especially, deterministic consensus mechanisms that CAN NOT guarantee liveness are…. 34
  • 35. /51 Challenge 3:: Resource Shortage ▪ The first problem is resource consumption. Blockchain’s other name is “state replication system” Influence on “Mission critical functions” should be checked 35
  • 36. /51 Challenge 3:: Resource Shortage ▪ The first problem is resource consumption. ▪ The second problem is that solving resource consumption is not easy. Speed Our ultimate goal in acquisitions should be to deliver capability to the warfighter more rapidly, but unfortunatelytoday it takes too long to develop and field our systems. -DEBORAHLEE JAMES, SECRETARY OF THE AIR FORCE Bureaucratic acquisition process 36
  • 37. /51 What can you do? ▪ PoW…. We can’t waste energy ▪ PoS…. We don’t have coins Let’s go to the private style → PBFT style Challenge 3:: Resource Shortage 37
  • 38. /51 What can you do? ▪ PoW…. We can’t waste energy ▪ PoS…. We don’t have coins Let’s go to the private style → PBFT style ⇒ But not flexible & Goto Challenge 2 again! Challenge 3:: Resource Shortage 38
  • 39. /51 Challenge 3:: Resource Shortage → Mission is always first. However, due to the military environment, support is not so timely and sufficient. 39
  • 40. /51 Related Projects • Data Integrity* • Supply Chain Management • Internet-of-Things • Communications • Identification & Authentication Total 42 14 (33%) 12 (29%) 8 (19%) 11 (26%) 5 (12%) * Projects only concerned to data integrity - One project can belong to multiple categories 40
  • 41. /51 Related Projects [Caution] •About related projects, detailed information about many real military projects are classified •Our comments are based on limited information 41
  • 42. /51 Related Projects • Data Integrity - French military police records on Tezos - US DoD project “Sharing of defense research, development, testing, and evaluation - Data distribution using blockchain” - US DoD project “Provenance using blockchain on disconnected networks” 42
  • 43. /51 Related Projects •Supply Chain Management -US DoD project “Blockchain supply chain enhancement for trusted and assured FPGA and ASICs” Blockchain on supply chain management is also actively researched for efficiency not only for security 43
  • 44. /51 Related Projects • Internet-of-Things - US DHS project “Combining blockchain technology with critical infrastructure” It’s sensors and cameras that protect the integrity and authenticity of critical infrastructure. Blockchain projects on IoT may suffer from Challenge #3, Resource Shortage. 44
  • 45. /51 Related Projects • Communications - US DARPA project “Building an encrypted msg system based on blockchain technology” If it is related to messages in tactical networks, Challenge #2, Forced Dynamic Environments and Challenge #3, Resource Shortage should be considered. 45
  • 46. /51 Related Projects • Identification & Authentication - US DHS project “Decentralized key management using blockchain” - South Korea project “blockchain-based DID” 46
  • 47. /51 Related Projects • Military Encrypted Messaging App Built on Blockchain • Blockchain Supply Chain Enhancement for Trusted and Assured FPGA and ASICs • Decentralized Key Management using Blockchain • Army Innovation Network -Information System • Provenance Using Blockchain on Disconnected Networks • Navy's Approved Multi-Factor Authentication for Personal Mobile Devices • Supporting Continuity of Operations (COOP) through Resilient Blockchain Frameworks • Chinese soldiers reward system using cryptocurrency for good performance • Blockchain-based system to record intelligence in Australia • Blockchain to help secure aerospace and defense (A&D) supply chains • French Military Police Record on Tezos Blockchain • South Korean Military's Blockchain-Based Digital IDentification (DID) …… and so on 47
  • 48. /51 Related Projects 1. General purpose 2. Domain-specific purposes “Something interesting” 48
  • 50. /51 Takeaway - Cyber defense makes more challenges and requirements for blockchain. • Air-gaps, Sudden expansion, shrinkage, partitioning.. - Blockchain’s resource consumption can be a problem, but defense environments are not flexible to assign more enough resources. - We don’t need to cling to blockchain if it’s not adaptable. Otherwise, it will bring more issues. 50
  • 51. /51 Get in Touch We welcome any questions and discussions Suhyeon Lee orion-alpha at korea.ac.kr Seungjoo Kim skim71 at korea.ac.kr 51
  • 52. /51 Thank you Suhyeon Lee Korea Univ. / ROKA Seungjoo Kim Korea Univ. This research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program(IITP-2020-2015-0- 00403)supervised by the IITP(Institute for Information &communications Technology Planning &Evaluation