Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 99 results for Cyber RSS
01/01/2004
As part of the then three-year-old Quantum Information Science and Technology (QuIST) program, DARPA-funded researchers established the first so-called quantum key distribution network, a data-encryption framework for protecting a fiber-optic loop that connects facilities at Harvard University, Boston University, and the office of BBN Technologies in Cambridge, Mass.
01/22/2013
The Department of Defense (DoD) maintains one of the largest computer networks in the world. The network follows DoD personnel across the globe collecting, transferring and processing information in forms as diverse as data warehouses, in-the-field mobile devices and mission computers on board F-18’s. This network is also constantly changing in size and shape as new missions are undertaken and new technology is deployed. In military terms, that means the cyber terrain of the DoD network is constantly shifting.
02/12/2013
In the world of network cyber security, the weak link is often not the hardware or the software, but the user. Passwords are often easily guessed or possibly written down, leaving entire networks vulnerable to attack. Mobile devices containing sensitive information are often lost or stolen, leaving a password as the single layer of defense.
10/22/2013
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen?
12/04/2013
Ever more sophisticated cyber attacks exploit software vulnerabilities in the Commercial Off-the-Shelf (COTS) IT systems and applications upon which military, government and commercial organizations rely. The most rigorous way to thwart these attacks is formal verification, an analysis process that helps ensure that software is free from exploitable flaws and vulnerabilities. Traditional formal methods, however, require specially trained engineers to manually scour software—a process that up to now has been too slow and costly to apply beyond small software components.
| Cyber | Formal | Trust |