Defense Advanced Research Projects AgencyTagged Content List


Relating to digital systems and information

Showing 14 results for Cyber + Algorithms RSS
As new defensive technologies make old classes of vulnerability difficult to exploit successfully, adversaries move to new classes of vulnerability. Vulnerabilities based on flawed implementations of algorithms have been popular targets for many years. However, once new defensive technologies make vulnerabilities based on flawed implementations less common and more difficult to exploit, adversaries will turn their attention to vulnerabilities inherent in the algorithms themselves.
The advance of technology has evolved the roles of humans and machines in conflict from direct confrontations between humans to engagements mediated by machines. Originally, humans engaged in primitive forms of combat. With the advent of the industrial era, however, humans recognized that machines could greatly enhance their warfighting capabilities. Networks then enabled teleoperation, which eventually proved vulnerable to electronic attack and subject to constraint due to long signal propagation distances and times. The next stage in warfare will involve more capable autonomous systems, but before we can allow such machines to supplement human warfighters, they must achieve far greater levels of intelligence.
I2O Thrust Areas
This Broad Agency Announcement (BAA) seeks revolutionary research ideas for topics not being addressed by ongoing I2O programs or other published solicitations. Potential proposers are highly encouraged to review the current I2O programs ( and solicitations ( to avoid proposing efforts that duplicate existing activities or that are responsive to other published I2O solicitations.