Defense Advanced Research Projects AgencyTagged Content List


Relating to digital systems and information

Showing 113 results for Cyber RSS
Embedded computing systems are ubiquitous in critical infrastructure, vehicles, smart devices, and military systems. Conventional wisdom once held that cyberattacks against embedded systems were not a concern since they seldom had traditional networking connections on which an attack could occur. However, attackers have learned to bridge air gaps that surround the most sensitive embedded systems, and network connectivity is now being extended to even the most remote of embedded systems.
| Cyber | Formal | Trust |
The rapid pace of innovation in software and hardware over the past three decades has produced computational systems that, despite security improvements, remain stubbornly vulnerable to attack. Although clean-sheet design can produce fundamental security improvements that gradually diffuse into the installed base, this process can take years.
DARPA’s Cyber Grand Challenge is a first-of-its-kind tournament designed to speed the development of automated security systems able to defend against cyberattacks as fast as they are launched.
Networks within the United States and abroad face increasingly broad-spectrum cyber threats from numerous actors and novel attack vectors. Malicious activity also crosscuts organizational boundaries, as nefarious actors use networks with less protection to pivot into networks containing key assets. Detection of these threats requires adjustments to network and host sensors at machine speed. Additionally, the data required to detect these threats may be distributed across devices and networks. In all of these cases, the threat actors are using technology to perpetrate their attacks and hide their activities and movement, both physical and virtual, inside DoD, commercial, and Internet Access Provider (IAP) networks.
In the current art, users with significant computing requirements have typically depended on access to large, highly shared data centers to which they backhaul their data (e.g., images, video, or network log files) for processing. However, in many operational scenarios, the cost and latency of this backhaul can be problematic, especially when network throughput is severely limited or when the user application requires a near real-time response. In such cases, users’ ability to leverage computing power that is available “locally” (in the sense of latency, available throughput, or similar measures that are relevant to the user or mission) could substantially improve application performance while reducing mission risk.