Previous Chapter: Summary
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

1
Introduction

CONTEXT

This report builds on two previous hard problems studies sponsored by the InfoSec Research Council in 1995 and 2005.1 A lot has changed since those reports were written, but many of their conclusions still apply now, some with even greater force and effect. Today, computing and communication technologies are near-universally integrated in every aspect of society, vastly improving lives but adding new threats, introducing new technology and uses that far outstrip the classic information security perspective of the past.

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued a report2 illustrating the increasing importance of cyber resilience. The introduction of that report states as follows:

Access to electricity, transportation, the internet, and a myriad of other services are of paramount importance to the Nation’s societal and economic well-being. Each day, critical infrastructure operations ensure that National Critical Functions (NCFs), which serve as the operational backbone for modern society, are running. The NCFs

___________________

1 The 1995 Infosec Research Council (IRC) Hard Problems report is not easily found, but the problems themselves are available in Appendix A, “Retrospective on the Original Hard Problem List,” of the 2005 Hard Problem List report. See IRC, 2005, Hard Problem List, November, https://www.nitrd.gov/documents/cybersecurity/documents/IRC_Hard_Problem_List.pdf.

2 Cybersecurity and Infrastructure Security Agency (CISA), “National Critical Functions: A Vital Framework for Cross-Cutting Risk Analysis,” Fact Sheet, https://www.cisa.gov/sites/default/files/publications/factsheet_national-critical-functions_508.pdf, accessed February 6, 2025.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

are the functions of government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating effect on security, national economic security, national public health or safety, or any combination thereof.

CISA, through the National Risk Management Center (NRMC), works with government and industry partners to identify and manage risks to the NCFs in a targeted, prioritized, and strategic manner to improve the resilience across the United States critical infrastructure.

Technological advances and hyperconnectivity have improved critical infrastructure operations and transformed the Nation’s 16 critical infrastructure sectors into a complex, interconnected ecosystem. At the same time, the integration of information and operational technologies and the complexity of supply chains has created new vectors through which adversaries can exploit vulnerabilities in assets, systems, and networks that enable America’s economic competitiveness and national security. Examples of NCFs include electricity generation that powers homes and businesses, transportation of commodities and people, and access to GPS data for cellular networks. An interruption to one NCF can have cascading consequences across industries and society.3

The goal of the 2005 cyber hard problems study was different from the present effort. The study was charged with producing “desirable research topics by identifying a set of key problems from a government perspective and in the context of IRC member missions” to “help guide the research program planning of the IRC member organizations.”4 By contrast, the scope of the present study is wider, expanded to “provide a current list of hard problems in cyber resiliency, building on earlier hard problems lists and expanding the scope from cybersecurity to cyber resilience” to “identify ways that the new list could be used to enhance community-wide coordination of R&D [research and development] activities.”5

This report benefits from the previous work but does not confine itself to identifying and prioritizing research hard problems, although it certainly does that. It also examines the ever more critical role of cyber in society in the context of its actual use (e.g., in NCFs, commerce, health care delivery, new mechanisms such as artificial intelligence [AI], and education). The scale, complexity, and impact of platforms, such social media,

___________________

3 Ibid.

4 IRC, 2005, Hard Problem List, p. 5.

5 The statement of task is reprinted in Appendix A.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

that are directly used by the general population dramatically increases the effectiveness of disinformation campaigns, adding a new societal dimension to cyber hard problems.

In addition to identifying research challenges, this report also attempts to provide a framework to assess the effectiveness of solving these new or previously identified cyber safety and reliability solutions within the context of the overall cybersecurity landscape as experienced by users in their everyday lives. The framework addresses such questions as the following: What expectations should consumers have about cybersecurity in a particular use context? What are the residual risks that have not been eliminated by technology? What can they do to better understand the risks and thoughtfully mitigate residual vulnerabilities? How can they know the extent to which prior use of attacked systems has resulted in loss, and if so, what can they do to protect themselves? What responsibilities do other parties have?

The definition of cyber resilience in this report encompasses all the components of technology, operations, human performance, and policy, including traditional authentication and access control (to allow permitted operations and to prevent the unwanted sharing or corruption of information) and vulnerabilities caused by malfunctioning hardware, software, infrastructure, operations, people (like phishing), or services.6 Therefore, the goal is to identify a framework to ensure the confidentiality and integrity of cyber processes and the underlying data as well as the resilience and availability of the critical functions they provide.

PROCESS FOR EVALUATING AND DELIBERATING THE CYBER HARD PROBLEMS

The cyber hard problems the committee focused on are well-defined problems whose solution would significantly improve the safety and resiliency of cyber and cyber-enabled systems. It did not focus on problems that were “interesting” but whose solution would not materially improve the safety and resiliency of cyber and cyber-enabled systems. As a related matter, unlike previous hard problem lists, this study was not restricted to research problems or even “technology problems.” The committee also considered hard problems related to policy, incentives, and the deployment and operation and use of cyber systems by humans.

In selecting hard problems, the committee spoke with the sponsor, reviewed prior lists, and evaluated how efforts to solve earlier “hard problems” led (or failed to lead) to identifiable improvements. The committee considered problems identified by committee members, previously identified problems that remain fundamentally unsolved

___________________

6 See the Glossary in Appendix D.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

(or where there has been insufficient progress toward a solution), and suggestions from leading experts in cybersecurity. Since the selection criteria emphasized impact, it heavily weighed priorities in the National Cybersecurity Strategy,7 the effect of the barriers created by the hard problems on NCFs,8 past security incidents, emerging new technology that is likely to become widespread, and problems with foundational effects on critical infrastructure.

Finally, to avoid a long laundry list of problems making the list inactionable, the committee selected only the most significant problems where progress toward solution would have the greatest impact.

HARD PROBLEMS FROM THE 1995 AND 2005 INFOSEC RESEARCH COUNCIL REPORTS

The 2005 InfoSec Research Council cyber hard problems study identified the following eight hard problems:9

  1. Global-Scale Identity Management: Global-scale identification, authentication, access control, authorization, and management of identities and identity information
  2. Insider Threat: Mitigation of insider threats in cyberspace to an extent comparable to that of mitigation in physical space
  3. Availability of Time-Critical Systems: Guaranteed availability of information and information services, even in resource-limited, geospatially distributed, on demand (ad hoc) environments
  4. Building Scalable Secure Systems: Design, construction, verification, and validation of system components and systems ranging from crucial embedded devices to systems composing millions of lines of code
  5. Situational Understanding and Attack Attribution: Reliable understanding of the status of information systems, including information concerning possible attacks, who or what is responsible for the attack, the extent of the attack, and recommended responses
  6. Information Provenance: Ability to track the pedigree of information in very large systems that process petabytes of information

___________________

7 Office of the National Cyber Director, 2023, “The National Cybersecurity Strategy,” The White House, March 2, https://bidenwhitehouse.archives.gov/oncd/national-cybersecurity-strategy.

8 CISA, “National Critical Functions Set.” https://www.cisa.gov/national-critical-functions-set, accessed February 6, 2025.

9 IRC, 2005, Hard Problem List, p. 5.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
  1. Security with Privacy: Technical means for improving information security without sacrificing privacy
  2. Enterprise-Level Security Metrics: Ability to effectively measure the security of large systems with hundreds to millions of users

The hard problems above are not homogeneous in nature. In some cases, solving the problem calls for research into new security mechanisms (global identity management); in some cases, it calls for new analytical techniques (security metrics); and in other cases, it requires a combination of new mechanisms, operations, and design methodologies (building secure systems). The heterogeneity of the hard problems is already visible in the 1995 InfoSec Research Council report. There, the “Functional Hard Problems of 1995” are summarized here:10

  1. Intrusion and Misuse Detection: Commercial systems are still riddled with false positives and false negatives, especially in high-volume situations such as networking. Years of experience has shown that the general problem of intrusion detection leaves adversaries too much room to maneuver, and that the general approaches to intrusion detection are completely blind to certain classes of attack, such as life-cycle attacks. More research is yet to be done. This remains an unsolved problem.
  2. Intrusion and Misuse Response: Given progress, and the degree to which response depends on detection, the emphasis of this area has been refocused on insider threat detection and detection of covert channels.
  3. Security of Foreign and Mobile Code: Although difficult research remains, proof-carrying code and sandboxing represent important advances in limiting the potential negative effects of foreign and mobile code. However, even domestic production of software is being outsourced to firms offshore. Moreover, even at reputable software companies, insiders can be bought to plant malicious code into key products used by the U.S. government.
  4. Controlled Sharing of Sensitive Information: Progress in digital rights management may ease policy specification challenges by empowering end users to set policies as required on information as it is being created. However, without a foundation of trustworthy enforcement mechanisms for enforcing separation, the value of this will be substantially diminished.
  5. Application Security: Application security has seen important progress toward intrusion-tolerant applications that are able to function despite flawed

___________________

10 The 1995 IRC Hard Problems report is not easily found, but the problems themselves are available as Appendix A, “Retrospective on the Original Hard Problem List,” in IRC, 2005, Hard Problem List.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
  1. components. These systems can be designed to be less reliant on an underlying trustworthy computing base (TCB) than traditional applications. However, research remains to make these techniques work in distributed, asynchronous, time-critical environments. One of the most painful lessons has been that there will always be situations where the TCB is critical. So, developing truly trustworthy TCBs is still required for building scalable secure systems.
  2. Denial of Service: Although research remains, progress has been made toward assuring the availability of information systems against denial-of-service attacks. Technology now exists to mitigate distributed denial-of-service attacks. Moreover, progress from traditional fault tolerance can now help mitigate other denial-of-service attacks. However, this technology is generally only available to large service companies.
  3. Communications Security: The foundation of secure communications is the cryptography and an infrastructure for managing cryptographic keys. Here, practical solutions are economical and in general use. However, secure communications require authenticating security principals, including people as well as computers and programs. Despite progress in secure communications, authentication, which is a critical aspect of these systems, is seldom done properly.
  4. Security Management Infrastructure: Although research remains, industry has already begun acquiring emerging security response management technologies. Additional research into security response management requires better situational awareness and attack attribution. The remaining work is captured in the operational security hard problem (CHP10) in Chapter 3.
  5. Information Security for Mobile Warfare: Both homeland defenders and the military now depend on mobile and secure networked computing, particularly given risks of attack and the need for fire, police, rescue, and recovery personnel, to be able to securely coordinate crisis response via information systems, services, and networks. This is largely an implementation and standards problem and not a “basic technology” problem.

Despite progress, many of the problems identified in 1995 and 2005 remain unsolved as a practical matter and are exacerbated by scale, interconnection, and globalization. There are also many new hard problems that arise from societal, technological, infrastructure, and economic progress since 2005 as well as the increased impact of globalization.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

PROGRESS OVER THE PAST 20 YEARS

When the Department of Homeland Security (DHS) developed its first (2009) roadmap for cybersecurity research,11 it cited and drew directly from the 1995 and 2005 hard problem lists prepared by the InfoSec Research Council. Additionally, according to perspectives offered by participants in the previous cyber hard problems lists, the lists were used by individual program officers to defend funding research on a problem on that list.12 Solicitations for work with an impact on such a problem was convincingly argued to be worthy of funding. There were also a number of convenings and other activities indirectly influenced by the lists and the process of developing them, including the DHS 2009 Roadmap for Cybersecurity Research.13,14

Concrete progress has been made on some of the hard problems in the 1995 and 2005 reports. This progress is attributable to a number of factors, including research and development investments in deployable and more usable technology.

Security of communication channels can now be regarded largely as a solved research problem because of excellent, widely accepted, and available cryptographic standards and technology.15 Still, even today’s solutions are marred by failures in implementation and operation, including poor key management, weakness in random number generation, attacks on the certificate infrastructure (to which there have already been technical responses such as certificate pinning), attacks on Internet routing due to misconfiguration, and insecurity in the Internet’s Domain Name System. Insider risk also continues to affect the ability to solve this problem.16

Global identity management has made progress. There is a practical regime for two-factor authentication, and account recovery is routinely available for many commercial applications like health care. Access control for resources that may be widely shared under specified policy remains a problem—not because new mechanisms are needed, but because current implementations are inadequate (for reasons of safety, scale, interoperability, or simply the effort required to use them) for massive multi-user commercial services.

Denial-of-service attacks are no longer a significant threat to larger service providers and edge providers because of investment in multi-geographical presence, big pools of address space, and technology developed to identify and exclude attackers.

___________________

11 Department of Homeland Security (DHS), 2009, A Roadmap for Cybersecurity Research, November, https://www.dhs.gov/sites/default/files/publications/CSD-DHS-Cybersecurity-Roadmap_0.pdf.

12 Carl Landwehr, personal communication, December 16, 2024.

13 DHS, 2009, A Roadmap for Cybersecurity Research.

14 Tomas Vagoun, personal communication, December 16, 2024.

15 This includes the ongoing evolution of cryptography in response to new technology development such as quantum computing.

16 Federal Bureau of Investigation, “John Anthony Walker Sr. Spy Case,” https://www.fbi.gov/history/artifacts/john-anthony-walker-jr-spy-case, accessed February 6, 2025.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

However, small providers typically do not have access to the technology and do not have the operational scale to achieve the same level of safety.

Significant progress has been made in developing systems that eliminate specific vulnerabilities by using type-safe languages (like Rust), fuzzing techniques, and safer libraries. Other problems remain—for example, some network protocols can still be abused as amplifiers of traffic directed at targets.

Operational security has increased in importance, yet most companies and infrastructure cannot practically recover from catastrophic failures and have not implemented the operational procedures to guarantee they can do so economically, as demonstrated by the Colonial Pipeline attack and several public ransomware attacks. (Some pay ransom as the least expensive solution to recover.) End-of-support and end-of-life offerings from vendors either leave organizations vulnerable or force them to incur additional cost by replacing the affected technology.17

Patching remains a challenge. Internet of Things (IoT) devices and embedded systems, unlike most “big information technology [IT]” systems, do not provide a practical mechanism for patching. Even for “big IT,” patch testing, incremental deployment, and rollback in the case of a flawed patch is sometimes still aspirational, as demonstrated by the wide consequence of a failed CrowdStrike patch to its detection logic for Windows.18

THE CURRENT CYBER LANDSCAPE

In the 1980s, as a precursor of the 1995 Infosec Research Council report, a typical microprocessor (e.g., the Motorola 68000) had 68,000 transistors; by 2000, it was millions of transistors, and by 2024 it is tens of billions of transistors. The 1978 “Tour of Unix”19,20 described an operating system that had about 10,000 lines of C code, developed by a very small team. A modern operating system now consists of tens of millions of lines of code supplied by many different providers, much of it in binary-only device drivers. In the 1980s, computers ran a few critical applications built by a handful of (often domestic) suppliers, many of whom also supplied the hardware. Modern computers run thousands of applications, sourced from many unidentified providers worldwide. Complexity drives capability, but just as effectively it inhibits the ability to assess security.

___________________

17 A. Culafi, 2025, “Zyxel Won’t Patch End-of-Life Routers Against Zero-Day Attacks,” TechTarget, February 5, https://www.techtarget.com/searchsecurity/news/366618782/Zyxel-wont-patch-end-of-life-routers-against-zero-day-attacks.

18 Georgetown University, 2024, “Is Global Tech Infrastructure Too Vulnerable? Professor Responds to CrowdStrike, Microsoft Outage,” July 25, https://www.georgetown.edu/news/ask-a-professor-crowdstrike-outage.

19 Wikipedia, “A Commentary on the UNIX Operating System,” article, https://en.wikipedia.org/wiki/A_Commentary_on_the_UNIX_Operating_System, accessed February 19, 2025.

20 K. Thompson, 1978, “Unix Implementation,” Bell System Technical Journal 57(6):part 2.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

In 1995 (and even 2005), it was rare for people to interact with their physicians and medical records on their personal computers; relatively rare to do banking using a personal computer; relatively rare to take a course remotely; and relatively rare to interact on social media, watch a movie, or obtain most news online. Now such virtual interactions are commonplace, accelerated by the COVID-19 pandemic, and cyber access to services far outpaces traditional service delivery modes. Cyber increasingly controls physical infrastructure (e.g., Colonial Pipeline), transportation, electric service (transmission and distribution), automated factories, medical devices, and even water and sewer service. All of these operate on legacy technology that interacts with more recent, complex technology over the Internet. All are vulnerable to attack. Physical infrastructure increasingly employs sensors and actuators to operate cyber-physical systems (CPS), including critical infrastructure, home maintenance, medical devices, autonomous vehicles, and automated manufacturing. These CPS often employ security practices that are 10 or 15 years behind IT systems. They are often bespoke and are largely opaque. Both the hardware and software supply chains for CPS are far more diverse than IT—both specialized and global. This further complicates any attempt to address the cybersecurity and resilience challenges posed by these complex systems.21,22

Today, very nearly all residents of middle- and high-income countries have access to broadband, smartphones, and personal computers. This was not the case in 1995 or even 2005. The world’s population uses this infrastructure to obtain critical services previously obtained in other ways and to control home and office devices.

A few cloud services, such as Amazon Web Services, Microsoft’s Azure, and Google Cloud, host corporate applications at centralized data centers located throughout the world. While the operational safety is probably better than most in-house operations, it is opaque to most customers. In 1998 and even 2005, most IT support was an internal function, and outsourcing was comparatively rare. Today, a large fraction of commercial computing has migrated to cloud infrastructure operated by a small number of providers, making them a potentially critical failure node.

The nature and sophistication of attackers has also changed. Attacks on U.S. systems come from around the globe, from actors that are often funded or otherwise supported covertly by nation states. The astonishing accumulation of personal information available from data brokers and collected from a fusion of advertising and social media has made social engineering attacks much more effective. The advent of Bitcoin

___________________

21 National Academies of Sciences, Engineering, and Medicine (NASEM), 2022, Cybersecurity in Transit Systems, The National Academies Press.

22 NASEM, 2020, Communications, Cyber Resilience, and the Future of the U.S. Electric Power System: Proceedings of a Workshop, The National Academies Press.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.

and other cryptocurrencies has provided a relatively safe channel for ransom, extortion, and other illicit payments.23

Additionally, the last 20 years has seen the rise of social media and the concomitant rise of globally sourced, globally distributed disinformation with little regulation and even less effective protection against it.

To summarize,

  • The scale and diversity of services people use every day is vast, where even a single mobile device can have a software payload drawing on thousands of providers.
  • Modern cyber systems are among the most complex systems ever fielded and are poorly understood by those using them, including cybersecurity experts.
  • Everything is digitized, and many of the data are broadly shared.
  • Cyber technology is a broadly diffused set of monocultures.
  • Cyber systems sense and control much of the physical world.
  • Cloud systems are critical and run an enormous fraction of workloads and service.

Many new hard problems are inspired by these tectonic changes. Chapter 2 explores some of these cross-cutting drivers making hard problems persistently hard.

___________________

23 G. Miliefsky, 2024, “Why Do Hackers Love Cryptocurrency?” Cyber Defense Magazine, June 6, https://www.cyberdefensemagazine.com/why-do-hackers-love-cryptocurrency.

Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 9
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 10
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 11
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 12
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 13
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 14
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 15
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 16
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 17
Suggested Citation: "1 Introduction." National Academies of Sciences, Engineering, and Medicine. 2025. Cyber Hard Problems: Focused Steps Toward a Resilient Digital Future. Washington, DC: The National Academies Press. doi: 10.17226/29056.
Page 18
Next Chapter: 2 Key Considerations for Cyber Resiliency
Subscribe to Email from the National Academies
Keep up with all of the activities, publications, and events by subscribing to free updates by email.