Chapter 2 explored key factors underpinning difficult cyber challenges. This chapter goes on to list and discuss the list of cyber hard problems—well-defined problems where progress toward their solution would significantly improve the safety and resiliency of cyber and cyber-enabled systems, presented from the perspective of adopters and users.
___________________
1 T. Tucker, 2025, “A FAIR Framework for Effective Cyber Risk Management,” FAIR Institute, January 10, https://www.fairinstitute.org/blog/integrating-fair-models-a-unified-framework-for-cyber-risk-management.
___________________
2 U.S. Executive Office, 2021, “Improving the Nation’s Cybersecurity,” Executive Order 14028, https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity.
3 Office of the National Cyber Director (ONCD), 2023, “The National Cybersecurity Strategy,” March 2, https://bidenwhitehouse.archives.gov/oncd/national-cybersecurity-strategy.
___________________
4 Amazon Web Services Cloud Security, “Provable Security Resources,” https://aws.amazon.com/security/provable-security/resources, accessed February 6, 2025.
5 S. Flur, A. Reid, S. de Haas, B. Laurie, L. Church, and M. Johnson, 2020, “Towards Making Formal Methods Normal: Meeting Developers Where They Are,” HATRA 2020: Human Aspects of Types and Reasoning Assistants, https://research.google/pubs/towards-making-formal-methods-normal-meeting-developers-where-they-are.
___________________
6 Swift, “The Swift Programming Language: Memory Safety,” https://docs.swift.org/swift-book/documentation/the-swift-programming-language/memorysafety, accessed February 6, 2025.
7 Go, “Data Race Detector,” https://go.dev/doc/articles/race_detector, accessed February 6, 2025.
8 Netflix Technology Blog, 2024, “Enhancing Netflix Reliability with Service-Level Prioritized Load Shedding: Applying Quality Science Techniques at the Application Level,” Medium, June 24, https://netflixtechblog.com/tagged/chaos-engineering.
___________________
9 U.S. Executive Office of the President, 2021, “Improving the Nation’s Cybersecurity,” Executive Order 14028.
___________________
10 U.S. Government Accountability Office, 2023, “Cybersecurity: Launching and Implementing the National Cybersecurity Strategy,” GAO-23-106826, https://www.gao.gov/products/gao-23-106826.
11 ONCD, 2023, “The National Cybersecurity Strategy.”
___________________
12 G. Ho, A. Mirian, E. Luo, K. Tong, E. Lee, L. Liu, C.A. Longhurst, C. Dameff, S. Savage, and G.M. Voelker, 2025, “Understanding the Efficacy of Phishing Training in Practice,” 2025 IEEE Symposium on Security and Privacy 2025:76, https://www.computer.org/csdl/proceedings-article/sp/2025/223600a076/21B7RjYyG9q.
13 D. Lain, K. Kostiainen, and S. Čapkun, 2022, “Phishing in Organizations: Findings from a Large-Scale and Long-Term Study,” 2022 IEEE Symposium on Security and Privacy 842–859, https://www.computer.org/csdl/proceedings-article/sp/2022/131600b199/1FlQL20L5AI.
14 S. Vedantam, 2012, “To Read All Those Web Privacy Policies, Just Take a Month Off Work,” NPR: All Tech Considered, April 19, https://www.npr.org/sections/alltechconsidered/2012/04/19/150905465/to-read-all-those-web-privacy-policies-just-take-a-month-off-work.
15 R. Amos, G. Acar, E. Lucherini, M. Kshirsagar, A. Narayanan, and J. Mayer, 2021, “Privacy Policies Over Time: Curation and Analysis of a Million-Document Dataset,” WWW’21, April 19–23, https://oar.princeton.edu/bitstream/88435/pr1w562/1/PrivacyPolicies.pdf.
16 N. Statt, 2017, “Best Practices for Passwords Updated After Original Author Regrets His Advice: Fourteen Years Later, Bill Burr Says His Tips Were Misguided,” The Verge, August 7, https://www.theverge.com/2017/8/7/16107966/password-tips-bill-burr-regrets-advice-nits-cybersecurity.
17 B. Fulmer, M. Walters, and B. Arnold, 2019, “NIST’s New Password Rule Book: Updated Guidelines Offer Benefits and Risk,” ISACA, January 1, https://www.isaca.org/resources/isaca-journal/issues/2019/volume-1/nists-new-password-rule-book-updated-guidelines-offer-benefits-and-risk.
___________________
18 Conferences such as CHI and SOUPS address these issues. See Symposium on Usable Privacy and Security, 2024, “Twentieth Symposium on Usable Privacy and Security,” USENIX Security ‘24, August 11–13, https://www.usenix.org/conference/soups2024.
19 Association of Computing Machinery, 2025, “CHI Conference on Human Factors in Computing Systems,” https://chi2025.acm.org.
___________________
20 National Institute of Standards and Technology, 2024, “AI Risk Management Framework,” https://www.nist.gov/itl/ai-risk-management-framework.
___________________
21 A. Wei, N. Haghtalab, and J. Steinhardt, 2023, “Jailbroken: How Does LLM Safety Training Fail?” 37th Conference on Neural Information Processing Systems (NeurIPS 2023), https://papers.nips.cc/paper_files/paper/2023/file/fd6613131889a4b656206c50a8bd7790-Paper-Conference.pdf.
Readers will easily recognize that these hard problems are not independent of one another and cannot be solved individually. Therefore, in highlighting them, the committee also hopes that collective action can be organized across government, industry, and research communities to make progress addressing them.