Defense Advanced Research Projects AgencyOur Research

Our Research

DARPA’s investment strategy begins with a portfolio approach. Reaching for outsized impact means taking on risk, and high risk in pursuit of high payoff is a hallmark of DARPA’s programs. We pursue our objectives through hundreds of programs. By design, programs are finite in duration while creating lasting revolutionary change. They address a wide range of technology opportunities and national security challenges. This assures that while individual efforts might fail—a natural consequence of taking on risk—the total portfolio delivers. More

For reference, past DARPA research programs can be viewed in the Past Programs Archive.

System-of-Systems (SoS) architectures are increasingly central in managing defense, national security and urban infrastructure applications. However, it is difficult to model and currently impossible to systematically design such complex systems using existing tools, which has led to inferior performance, unexpected problems and weak resilience. More
Commercial Test and Measurement equipment has advanced greatly with the emergence of sophisticated cellular and wireless local area network technology and can be used to intercept, analyze and exploit our military communications signals. More
A rapidly increasing percentage of the world’s population is connected to the global information environment. At the same time, the information environment is enabling social interactions that are radically changing how and at what rate information spreads. Both nation-states and nonstate actors have increasingly drawn upon this global information environment to promote their beliefs and further related goals. More
The Department of Defense (DoD) maintains information systems that depend on Commercial off-the-shelf (COTS) software, Government off-the-shelf (GOTS) software, and Free and open source (FOSS) software. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities. More
The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch large distributed denial of service (DDoS) attacks on internet infrastructure, to remote attacks on Industrial Control System (ICS) devices, these newly connected, composed systems provide a vast attack surface. While the diversity of functionality and the scope of what can now be connected, monitored, and controlled over the Internet has increased dramatically, economies of scale have decreased platform diversity. More
Recent technological advances have made the longstanding dream of on-orbit robotic servicing of satellites a near-term possibility. The potential advantages of that unprecedented capability are enormous. Instead of designing their satellites to accommodate the harsh reality that, once launched, their investments could never be repaired or upgraded, satellite owners could use robotic vehicles to physically inspect, assist, and modify their on-orbit assets. That could significantly lower construction and deployment costs while dramatically extending satellite utility, resilience, and reliability. More
Dominance of the radio frequency (RF) spectrum is critical to successful U.S. military operations. Today, we do this using discrete radar, electronic warfare (EW), and communication payloads that are separately designed, procured, and integrated on platforms. These payloads typically use dedicated apertures, are realized with tightly coupled hardware and software, and are not well-coordinated in their use of spectrum. This rigid and constrained approach makes it difficult and time-consuming to adopt new technology, adapt to rapidly changing adversary threats, maneuver functions effectively in spectrum, and create comprehensive compact RF systems. More
The Cross-Domain Maritime Surveillance and Targeting (CDMaST) program seeks to identify and implement architectures consisting of novel combinations of manned and unmanned systems to deny ocean environments to adversaries as a means of projecting power. By exploiting promising new developments in unmanned systems along with emerging long-range weapon systems, the program aims to develop an advanced, integrated undersea and above-sea warfighting capability able to execute long-range attacks against submarines and ships over large contested maritime areas. More