The rapid pace of innovation in software and hardware over the past three decades has produced computational systems that, despite security improvements, remain stubbornly vulnerable to attack. Although clean-sheet design can produce fundamental security improvements that gradually diffuse into the installed base, this process can take years.
The objective of the Cyber Fault-tolerant Attack Recovery (CFAR) program is to produce revolutionary breakthroughs in defensive cyber techniques that can be deployed to protect existing and planned software systems in both military and civilian contexts without requiring changes to the concept of operations of these systems. To accomplish this, CFAR will exploit and extend several recent developments in computer science and technology:
CFAR seeks to enable the DoD to make legacy computer systems more secure by recompiling them. The resulting systems would operate identically to the originals, so there would be no retraining costs and no change to existing operations.
You are now leaving the DARPA.mil website that is under the control and
management of DARPA. The appearance of hyperlinks does not constitute
endorsement by DARPA of non-U.S. Government sites or the information,
products, or services contained therein. Although DARPA may or may not
use these sites as additional distribution channels for Department of
Defense information, it does not exercise editorial control over all of
the information that you may find at these locations. Such links are
provided consistent with the stated purpose of this website.
After reading this message, click to continue