 All right. Thanks, Arpit. Good morning, everyone. So, yeah, I'm Michael August. I'm a computer scientist at the Naval Information Warfare Center Pacific, representing the Department of the Navy. And today I'm going to talk about the DARPA Open Programmable Secure 5G program, or OPS 5G for short, as an example of collaboration between government and the open source community. And actually, the founder of the OPS 5G program was Dr. Jonathan Smith, and he presented at this forum last year. So, next slide, please. For the agenda, I'm going to briefly introduce DARPA, and I'm sure no intro needed. You just heard from Tom, but I'll give a little background there. And then talk about the OPS 5G program as well as some of the focus areas of the program. And then I'll get into the collaboration that we, the Navy, and DARPA have been having with the Linux Foundation in particular. And then I'll talk about the 5G Super Blueprint from LFN. And then what our plans are going forward for leveraging the 5G Super Blueprint into something called Mojito. And then I'll finish up with a call to action for the open source 5G community. So, next slide, please. So, this is just to give kind of a brief rap sheet of some of DARPA's accomplishments and their mission. I'm sure most of you have heard of DARPA, right, the Defense Advanced Research Projects Agency, with the ARPA Net being the precursor to the Internet as one of the most famous developments, right, coming out of DARPA. DARPA's mission is to make pivotal investments in breakthrough technologies for national security with enabling technologies you can see on the bottom of this chart leading to military capabilities, as you can see on the top. And a recent example of this, which is very relevant, can be seen in DARPA's investment over the past decade in nucleic acid-based vaccines, which you can see on the upper right side of this chart, which were critical to the rapid development and mass production of RNA vaccines for COVID-19. So, for example, in 2011, the ADEPT program developed nucleic acid vaccines and the accompanying RNA vaccine technology. And then following up to that program was the P3 program of the pandemic prevention platform in 2016, which provided for rapid discovery, testing, and manufacturing of antibody treatments to fight emerging diseases. So these programs began with the goal of finding rapid ways to protect American troops running into a new virus while in the field. But they ended up having positive impacts not just on our national security, but also for society at large. So that gives kind of a sampling of the scope and the impact that DARPA's investments can have, broadly. Next slide, please. So this is really a pioneering effort that we're doing with Ops 5G, because typically, with proprietary systems, a single manufacturer control the entire hardware and software stack. And that can make it easier and faster to develop the software for that proprietary system. But on the other hand, if you do an open source approach, open source really opens up the development of the internals of the system to various eyes. And so some of the advantages that that brings is code visibility and portability. And the portability provides or enables us to decouple the hardware and the software. And that increases the difficulty of a supply chain attack. And it also makes it easier for manufacturers to introduce new hardware into the market. So while open source is typically more portable, that portability necessitates the introduction of a hardware abstraction layer. So this is kind of the double-edged sword of open source. And as a result, the open source code development process can take longer than if you were to develop software for the proprietary system because of that increased complexity and then the need to support disparate types of hardware. And so the Ops 5G program really seeks to address this challenge by pursuing research leading to the development of a portable standards compliance network stack for 5G mobility that is both open source and secure by design. So with standardization, we get interoperability between systems. And then with open source, we get the modularity and flexibility within the system. So with that, I'll go a little more into Ops 5G on the next slide, please. So really the vision for the program is to augment open source software to obtain a secure 5G system. And in particular, to allow for implementations of a 5G system, which are secure, even though they're built with various components, which may or may not be trusted. So by decoupling the hardware and the software into a modular system, Ops 5G really seeks to provide a mechanism for rapid software development as well as security enhancements to the 5G system itself. And then the idea is to transition those developments back into the commercial network operators. One of the key aspects of 5G itself is programmability. And in particular, the introduction of software defined networking and network function virtualization. And that programmability means that you have a rapid means to adapt to network attacks. But at the same time, you can then introduce the possibility of hijacking or misuse of the network and then unforeseen ways by adversaries. So the Ops 5G program, it aims to take advantage of the network programmability to enhance network security and defenses, while at the same time preventing an adversary from taking advantage of that programmability. So now I'll talk about the four different focus areas or what are called technical areas within the Ops 5G program on the next slide. So the Ops 5G program is broken down into four different technical areas, TA is one through four as I referred to. And so I'll briefly talk about each one now. So for TA-1 standards meet software, the idea is to decrease the time required for updates to the Ops 5G open source software in response to new versions of the 5G standards documents that come out. So actually two performers on this technical area, SRI and Kaki, are focused on accelerating open source software development by providing a set of tools for performing machine translation of those 5G standards docs, such as those from 3GPP and Etsy. And what we find is that the structure of those documents actually enables machine extraction of information relevance to implementations of those standards. And that therefore it makes it possible to perform various automated processes such as compliance testing, proofs of correctness, integrity verification of the protocols. So in this way, translation of the standards documents into some kind of intermediate representation, as we can see here, or some kind of domain specific language, could accelerate the software development process. In addition, the TA-1 performers here, these two, have been tasked with looking at how to actually perform automatic code generation from that intermediate representation in order to automate the software development process to the maximum extent possible. So this is really a fascinating area of research. And so this technical area is really part of how OPS 5G program seeks to speed up the open source software development process for the open source 5G staff. So now I'll move on to TA-2. Next slide, please. So TA-2, a cross-scale 5G node and network security. This TA looks to achieve a usable, scalable, zero trust security architecture for devices ranging from small form factor, long lived IoT sensors out in the field to large servers in your data center. And so this architecture intends to have a minimum impact on the size, weight, and power as well as the price. And really it's focused on end-to-end security of the network. And that includes network access control, remote attestation, implementation of a software-based root of trust, as well as a variety of other techniques. And actually one of the performers is using energy harvesting from the RF itself, from the base station, to demonstrate the potential of intermittent computing on a very low power device. And you can use that actually to perform cryptographic operations intermittently as you're receiving power. So that's a feel for TA-2. Next slide. TA-3, secure slices. That's actually, I'm the lead in this area. So this technical area is focused on mitigating new attack surfaces that are introduced by virtualization and network slicing within the 5G stack, such as side channels and whatnot. And there are various cryptographic techniques, including fully homomorphic encryption where you can actually perform computation directly on encrypted data without ever decrypting the data. Threshold encryption, proxy re-encryption, these are various cryptographic techniques for distributing data and partitioning it amongst multiple participants, as well as forwarding data in a secure way. So all these cryptographic techniques that are novel are being brought to bear on this secure slicing problem. And also, there are a number of network obfuscations that the performer USC-ISI is developing in order to prevent adversaries from performing network traffic analysis-based attacks, wherein they could infer information about the network structure or communications between nodes in the network. So really, it's a very interesting array of techniques that are being brought to bear on network slicing security. The next slide, please. For TA-4, principle programmable defenses, the objective is to change programmability itself from a threat vector to an enable of security at scale. And so the two performers working on this area, Georgia Tech and Peraton, they're developing a pushback architecture to rapidly detect distributed denial of service attacks and then to rapidly mitigate against those attacks. And we're talking about it at a very large scale. And so we're doing simulations that are on the order of a billion nodes at this point in order to demonstrate the potential of that pushback architecture. So really fascinating work here. Next slide, please. And so really, in order to take advantage of these enhancements, the resulting from these four technical areas, the OPS 5G program wants to apply them to open source 5G projects. And so the founding program manager for OPS 5G, Dr. Jonathan Smith, he initiated an agreement for cooperative research and development between DARPA and the Linux foundation, which has been absolutely instrumental in moving the technology forward and I think will be instrumental in transitioning it going forward. So this has resulted in the development of US GovOps, as you can see on the left here, which is an open software initiative that's focused on accelerating the development of a 5G end-to-end stack. And so really our vision is that the Navy, being the independent test and evaluation team for OPS 5G, will take the deliverables from those OPS 5G performers that I just mentioned, and then test and evaluate them within our 5G test bed environment. And then we're, those performers are then going to take that tested the software and they're going to push it into the Linux foundation projects that comprise a 5G stack. And then we'll be taking the full 5G stack from Linux foundation and deploying that at various DoD sites throughout the country. So really there's, this is a great collaboration and I think it's going to be absolutely instrumental in pushing the security enhancements and that rapid software development out into the community and ultimately out into the the commercial network operators. So next slide please. So here's just a sampling of some of the, you know, projects, Linux foundation projects that the OPS 5G performers are contributing directly to. And so, you know, we have ONAP and Open Daylight. So for Open Daylight, we're looking to develop some OpenFlow plugins to support newer versions of OpenFlow directly with an Open Daylight. Also, some of our performers on OPS 5G are contributing to DPDK and FIDO, some of the DDoS, rapid DDoS detection and mitigation algorithms that I just referred to for FIDO, for example. And then also contributing to Intel SmartEdge Open, formerly Openness, and Zephyr real-time operating system. So a lot of work going on in this area. Next slide please. And so one of the things that the Linux foundation has done, which is great, they've spearheaded a 5G super blueprint, which can be seen here at a high level. And, you know, it encompasses the whole architecture for 5G, including O-RAN Alliance projects, MAGMA for the core, the underlying network function virtualization infrastructure, as well as blueprints from a crano for the edge and whatnot. So there are a lot of pieces that are coming together and are going to be integrated with this 5G super blueprint. Next slide please. So here's a more detailed look at that with the implementation architecture diagram with more of the component projects. So this really shows the components comprising the end-to-end full-stack architecture. And so that includes the management and orchestration, as you can see on the right there, the virtual infrastructure management, the SDN controllers, the virtualized infrastructure, which includes the virtualized compute, storage, networking, hardware acceleration. There's even a telecom grade edge stack. There's software for facilitating development of use case specific edge applications. There's various projects here. There's, you know, the ability with the software to communicate with IoT devices, you know, and even the operating system for constrained devices and Zephyr, and then, you know, 5G network functions based on the MAGMA open source core. So, you know, the architecture, though, is not starting from scratch. The parts of it already exist with the help of companies. So for example, FLEDGE is already integrated and tested on top of EVE. EDGEX Foundry and the Intel SmartEdge Open are already part of a 5G ready edge stack, which has been demonstrated. ONAP already has two releases of functionality that are ready to support 5G slicing capabilities. And Anokit, formerly the cloud infrastructure, a telco task force, you know, it already has developed Kubernetes and OpenStack architectures and reference implementations, you know, for telecom grade, the cloud environments. So really, you know, we're going to leverage this work that's already been done and the momentum coming from all these different projects. So the Ops 5G program will align with this super blueprint and then deploy it as part of a prototype network called Mojito. So I'll go into that on the next slide. And then I'll wrap up here. So, you know, our goal at DARPA and within the Navy is really to take that 5G super blueprint and deploy it at various sites within a DOD 5G prototype network, which we call Mojito or multi-site Ops 5G joint independent test option. And multiple DOD bases, each of which has a different use case, will leverage that full hardware and software stack that we're providing. And then the stack will consist of those super blueprint projects as well as the security enhancements that the Ops 5G performers are developing. And so really having the ability to leverage that 5G super blueprint and then contribute performer enhancements directly into the open source projects that comprise that super blueprint is going to be a huge advantage for us in order to accelerate the development of the full 5G stack. And it'll also promote the adoption of those security enhancements by companies that make use of the 5G super blueprint and the resulting software stack, which is great. You know, not just for the DOD, but for, you know, the nation in general. So next slide, please. So I'll wrap up here with just, you know, I'd like to encourage community participation in the development of the 5G super blueprint projects and in particular on some of the projects that I mentioned earlier. You know, one of the performers on Ops 5G is, as I mentioned, is planning to develop versions of open flow, you know, version 1.4 and 1.5, for example, which have features they need to do the rapid DDoS detection and mitigation. And they're going to be developing that as a plugin to open daylight, but they're not implementing all of the open flow version 1.4 and 1.5 functionality. So this is really where, you know, the community can come in and contribute. And so I think there's great, you know, opportunities here for community participation, as well with magma being our core, contributions to the core and, you know, in particular, the network slicing capabilities, that's something that we're very excited about. So if you're interested in participating, feel free to check out our website. It's at usgovops.org. That's usgovops.org. There's a sign up form there where you can get more information about how to participate. And so, you know, we really appreciate this opportunity to work with the Linux Foundation. And I think this is going to be a very fruitful collaboration going forward. So with that, thank you very much. And I'll open it up to any questions that you have. Excellent, Michael. I couldn't have said it better. So you basically went through the whole kind of end user use and we are really excited. And I think asking the community to help not just U.S. government, which is, you know, all of our duties, but more importantly, how these research can benefit globally back into the open source community, right? So that whole loop you're doing, yeah. No, excellent. And really appreciate, you know, such an awesome presentation. I'm sure the attendees have enjoyed it. So with that, I think we are at time for the break, if I'm not mistaken. But again, thank you, Michael. And we're going to take a break.