<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="stratmliso.xsl"?>
<StrategicPlan xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:stratml="urn:ISO:std:iso:17469:tech:xsd:stratml_core"><Name>CLEAN-SLATE DESIGN OF RESILIENT, ADAPTIVE, SECURE HOSTS (CRASH)</Name><Description>Exploitable vulnerabilities originate from a handful of known sources (e.g., memory safety); they remain because of deficits in tools, languages and hardware that could address and prevent vulnerabilities at the design, implementation and execution stages. Often, making a small change in one of these stages can greatly ease the task in another. The CRASH program will encourage such cross layer co-design and participation from researchers in any relevant area.</Description><OtherInformation/><StrategicPlanCore><Organization><Name>Defense Advanced Research Projects Agency</Name><Acronym>DARPA</Acronym><Identifier>_46ad30a4-ad5d-11df-9c96-10167a64ea2a</Identifier><Description/><Stakeholder StakeholderTypeType="Generic_Group"><Name>Computer Tool Researchers</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Computer Language Researchers</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Computer Hardware Researchers</Name><Description/></Stakeholder></Organization><Vision><Description/><Identifier>_794cd9ce-08ac-11e5-8b78-349ade3234da</Identifier></Vision><Mission><Description>To encourage innovative, cross-layer participation the co-design of new computer systems</Description><Identifier>_794cda6e-08ac-11e5-8b78-349ade3234da</Identifier></Mission><Value><Name/><Description/></Value><Goal><Name>Resistance</Name><Description>Resist cyber-attacks.</Description><Identifier>_794cdaf0-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator>1</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/><Objective><Name/><Description/><Identifier>_794cdb86-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator/><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Adaptation</Name><Description>Adapt after a successful attack to continue rendering useful services.</Description><Identifier>_794cdbfe-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator>2</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/><Objective><Name/><Description/><Identifier>_794cdc76-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator/><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Learning</Name><Description>Learn from previous attacks.</Description><Identifier>_794cdcf8-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator>3</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/><Objective><Name/><Description/><Identifier>_794cdd70-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator/><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Prevention &amp; Coping</Name><Description>Guard against and cope with future attacks.</Description><Identifier>_794cdde8-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator>4</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/><Objective><Name/><Description/><Identifier>_794cde60-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator/><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal><Goal><Name>Self-Repair</Name><Description>Repair after attacks have succeeded.</Description><Identifier>_794cded8-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator>5</SequenceIndicator><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/><Objective><Name/><Description/><Identifier>_794cdf64-08ac-11e5-8b78-349ade3234da</Identifier><SequenceIndicator/><Stakeholder StakeholderTypeType=""><Name/><Description/></Stakeholder><OtherInformation/></Objective></Goal></StrategicPlanCore><AdministrativeInformation><PublicationDate>2015-06-01</PublicationDate><Source>http://www.darpa.mil/Our_Work/I2O/Programs/Clean-slate_design_of_Resilient_Adaptive_Secure_Hosts_%28CRASH%29.aspx</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></StrategicPlan>