Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 106 results for Cyber RSS
Modern-day software operates within a complex ecosystem of libraries, models, protocols and devices. Ecosystems change over time in response to new technologies or paradigms, as a consequence of repairing discovered vulnerabilities (security, logical, or performance-related), or because of varying resource availability and reconfiguration of the underlying execution platform. When these changes occur, applications may no longer work as expected because their assumptions on how the ecosystem should behave may have been inadvertently violated.
The Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH) program will pursue innovative research into the design of new computer systems that are highly resistant to cyber-attack, can adapt after a successful attack to continue rendering useful services, learn from previous attacks how to guard against and cope with future attacks, and can repair themselves after attacks have succeeded. Exploitable vulnerabilities originate from a handful of known sources (e.g., memory safety); they remain because of deficits in tools, languages and hardware that could address and prevent vulnerabilities at the design, implementation and execution stages.
| Cyber | Trust |
The Computer Science Study Group (CSSG) supports university research in a number of I2O research focus areas in computer science and related fields. The goal is to enable the development of transformational technologies in these areas while informing a new generation of researchers of Department of Defense (DoD) computer science technology needs and priorities. The CSSG funds the participation of a select group of pre-tenure university professors in a multi-phase program of educational and research activities based on interaction with current and former senior DoD military and Government personnel.
| Cyber |
The Department of Defense (DoD) maintains information systems that depend on Commercial off-the-shelf (COTS) software, Government off-the-shelf (GOTS) software, and Free and open source (FOSS) software. Securing this diverse technology base requires highly skilled hackers who reason about the functionality of software and identify novel vulnerabilities.
The growth of the internet-of-things (IoT) and network-connected composed systems (e.g., aircraft, critical-infrastructure, etc.) has led to unprecedented technical diversity in deployed systems. From consumer IoT devices developed with minimal built-in security, which are often co-opted by malware to launch large distributed denial of service (DDoS) attacks on internet infrastructure, to remote attacks on Industrial Control System (ICS) devices, these newly connected, composed systems provide a vast attack surface. While the diversity of functionality and the scope of what can now be connected, monitored, and controlled over the Internet has increased dramatically, economies of scale have decreased platform diversity.