Defense Advanced Research Projects AgencyTagged Content List

Technologies for Trustworthy Computing and Information

Confidence in the integrity of information and systems

Showing 22 results for Trust RSS
01/26/2017
DARPA's Microsystem Technology Office (MTO) is developing a portfolio of technology-driven protections to increase microelectronics security and broaden access to the most advanced microelectronics products. To accomplish these goals, MTO programs aim to obscure the design of sensitive devices to make reverse engineering difficult and to protect intellectual property, verify the function and origin of microelectronic devices, and better manage the supply chain.
02/12/2013
In the world of network cyber security, the weak link is often not the hardware or the software, but the user. Passwords are often easily guessed or possibly written down, leaving entire networks vulnerable to attack. Mobile devices containing sensitive information are often lost or stolen, leaving a password as the single layer of defense.
12/04/2013
Ever more sophisticated cyber attacks exploit software vulnerabilities in the Commercial Off-the-Shelf (COTS) IT systems and applications upon which military, government and commercial organizations rely. The most rigorous way to thwart these attacks is formal verification, an analysis process that helps ensure that software is free from exploitable flaws and vulnerabilities. Traditional formal methods, however, require specially trained engineers to manually scour software—a process that up to now has been too slow and costly to apply beyond small software components.
| Cyber | Formal | Trust |
03/06/2014
During the past decade information technologies have driven the productivity gains essential to U.S. economic competitiveness, and computing systems now control significant elements of critical national infrastructure. As a result, tremendous resources are devoted to ensuring that programs are correct, especially at scale. Unfortunately, in spite of developers’ best efforts, software errors are at the root of most execution errors and security vulnerabilities.
09/04/2015
See that black speck on the Lincoln’s penny-minted nostril? And on the right, notice another three of those specks comfortably framed by the eye of a needle? Those semiconductor chiplets, or “dielets” as DARPA Program Manager Kerry Bernstein calls them, could become Lilliputian electronic tamper-watching sentinels affixed to virtually every chip built into commercial and military systems.