Defense Advanced Research Projects AgencyOur Research

Our Research

DARPA’s investment strategy begins with a portfolio approach. Reaching for outsized impact means taking on risk, and high risk in pursuit of high payoff is a hallmark of DARPA’s programs. We pursue our objectives through hundreds of programs. By design, programs are finite in duration while creating lasting revolutionary change. They address a wide range of technology opportunities and national security challenges. This assures that while individual efforts might fail—a natural consequence of taking on risk—the total portfolio delivers. More

For reference, past DARPA research programs can be viewed in the Past Programs Archive.

The Technologies for Host Resilience (THoR) Program aims to develop new methods to maintain and optimize force health in the face of new and emerging infectious diseases. The goal is to discover the molecular mechanisms for tolerance of infection in animals, and develop therapeutic strategies that modulate the resilience of humans against infection. This capability would support military readiness by enabling warfighters to weather the storm of infectious diseases in low-resource or remote settings where pathogen-specific therapeutics or intensive care unit capabilities may not be locally available. More
Effective 21st-century warfare requires the ability to conduct airborne intelligence, surveillance and reconnaissance (ISR) and strike mobile targets anywhere, around the clock. Current technologies, however, have their limitations. Helicopters are relatively limited in their distance and flight time. Fixed-wing manned and unmanned aircraft can fly farther and longer but require either aircraft carriers or large, fixed land bases with runways often longer than a mile. Moreover, establishing these bases or deploying carriers requires substantial financial, diplomatic and security commitments that are incompatible with rapid response. More
Imaging, radar, spectroscopy, and communications systems that operate in the millimeter-wave (MMW) and sub-MMW bands of the electromagnetic spectrum have been difficult to develop because of technical challenges associated with generating, detecting, processing and radiating the high-frequency signals associated with these wavelengths. More
The Topological Excitations in Electronics program aims to demonstrate the utility of topological excitations in various applications including memory, logic, sensors, and quantum information processing. Developing the ability to design materials with new controllable functionalities is crucial for the future of the Nation’s economic, energy, and defense security. More
New manufacturing technologies such as additive manufacturing have vastly improved the ability to create shapes and material properties previously thought impossible. Generating new designs that fully exploit these properties, however, has proven extremely challenging. Conventional design technologies, representations, and algorithms are inherently constrained by outdated presumptions about material properties and manufacturing methods. As a result, today’s design technologies are simply not able to bring to fruition the enormous level of physical detail and complexity made possible with cutting-edge manufacturing capabilities and materials. More
Conventional military radio frequency (RF) antenna systems typically employ coaxial cable as the signal conduit between the aperture and the transmit/receive electronics. For long cable lengths, high RF frequencies and wide bandwidths, the cable itself is a key limiter of signal fidelity and link efficiency. Coaxial cable bundles are also large and heavy, a critical drawback for mobile platforms. Photonic technologies, however, may provide low loss, reduced size and weight, immunity to electromagnetic interference, broad bandwidth and overall ability to remote antennas over distances not possible with conventional electronic approaches. More
Modern computing systems act as black boxes in that they accept inputs and generate outputs but provide little to no visibility of their internal workings. This greatly limits the potential to understand cyber behaviors at the level of detail necessary to detect and counter some of the most important types of cyber threats, particularly advanced persistent threats (APTs). APT adversaries act slowly and deliberately over a long period of time to expand their presence in an enterprise network and achieve their mission goals (e.g., information exfiltration, interference with decision making and denial of capability). More
The DoD has become increasingly reliant on intelligence, surveillance and reconnaissance (ISR) applications. With the advent of expanded ISR capabilities, there is a pressing need to dramatically expand the real-time processing of wide-area, high-resolution video imagery, especially for target recognition and tracking a large number of objects. Not only is the volume of sensor data increasing exponentially, there is also a dramatic increase in the complexity of analysis, reflected in the number of operations per pixel per second. These expanding processing requirements for ISR missions, as well as other DoD sensor applications, are quickly outpacing the capabilities of existing and projected computing platforms. More