National, Shared Software Assurance Facility, “SWAMP,” to Launch February 3, 2014

Cybercrime is a booming, estimated $100 billion industry in the United States and shows no signs of slowing down. Attackers have an arsenal of weapons at their disposal, including social engineering (e.g. phishing), penetrating weak security protocols and exploiting software vulnerabilities that can serve as an “open window” into an organization’s IT environment; closing those windows requires effective and accessible tools to identify and root out software vulnerabilities.

  • Share on TwitterShare on FacebookShare on Google+Share on LinkedInEmail a friend
The magnitude of our national software assurance problem requires a comprehensive approach backed by a powerful facility that addresses all dimensions of the problem – integrated education, better tools and wider adoption.

Madison, WI (PRWEB) February 04, 2014

The Software Assurance Marketplace, or the “SWAMP,” has created a resource to address this growing need that will be publicly available and free to the community on February 3, 2014. Supported by a $23.4 million grant from the Department of Homeland Security’s Science and Technology Directorate, the SWAMP provides a state-of-the-art facility that serves as an open resource for software developers, software assurance tool developers and software researchers who wish to collaborate and improve software assurance activities in a safe, secure environment. From the very early stages of a project and throughout its entire life cycle, the SWAMP offers continuous, automated access to a rich and evolving set of assessment capabilities.

Located in Madison, Wisconsin and designed by researchers from the Morgridge Institute for Research, the University of Wisconsin-Madison, Indiana University and the University of Illinois, Champaign-Urbana, the SWAMP provides a suite of assurance tools and software packages that serve to identity vulnerabilities and reduce false positives. According to SWAMP’s director and CTO, Miron Livny, “The magnitude of our national software assurance problem requires a comprehensive approach backed by a powerful facility that addresses all dimensions of the problem – integrated education, better tools and wider adoption.”

The initial operating capability of the SWAMP enables the assessment of Java, C and C++ software against five static analysis tools. Results are displayed via Secure Decisions’ CodeDx vulnerability results viewer, which was developed through DHS S&T’s Small Business Innovation Research program (SBIR). According to DHS software assurance program manager, Kevin Greene, “We see widespread adoption of the SWAMP as having a profound, positive impact on software systems and applications that powers our critical infrastructure. Better assurance practices lead to better security, it’s that simple.” He adds, “The SWAMP collaboration is a great example of the public and private sector coming together to advance improvements in software assurance activities to deal with emerging cyber threats.”

The SWAMP’s initial assurance tools include FindBugs, PMD, Clang, CppCheck and GCC and the choice of eight platforms. Over the five-year project, SWAMP will add multiple assessment capabilities including mobile, dynamic and binary analysis tools.

About the Software Assurance Marketplace
The “SWAMP” is a national software assurance resource funded by a grant from the Department of Homeland Security Science and Technology Directorate. Software developers, assurance tool developers, educators and IT professionals can use the SWAMP for free to perform vulnerability assessments.

To learn more about SWAMP, visit http://www.continuousassurance.org

To schedule an interview with SWAMP leadership or for more information, contact Karen Hitchcock at 608-513-6566, khitchcock(at)continuousassurance(dot)org.

To contact DHS Software Assurance Marketplace’s program manager, Kevin E. Greene: kevin.greene(at)hq(dot)dhs(dot)gov.

SWAMP is housed in and support by the Morgridge Institute for Research. Collaborators include Indiana University Center for Applied Cybersecurity Research, the University of Wisconsin Computer Sciences and the National Center for Supercomputing Applications through University of Illinois at Champaign-Urbana.