Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 9 results for Cyber + Programming RSS
07/08/2015
Seven teams from around the country have earned the right to play in the final competition of DARPA’s Cyber Grand Challenge (CGC), a first-of-its-kind tournament designed to speed the development of automated security systems able to defend against cyberattacks as fast as they are launched. The winners successfully squared off against dozens of other teams for the opportunity to compete head to head next year for nearly $4 million in prizes—and the chance to help revolutionize cybersecurity going forward.
10/14/2019
There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. Much like commercial or personal computing devices, these systems utilize embedded software to execute and manage their operations. To fix certain security vulnerabilities, commercial and personal devices must undergo frequent updates, and are replaced every few years – or on occasion, more frequently when an update fails. Mission-critical systems are built to last for decades, and rarely have the same short upgrade cycles.
Office Director
Dr. William Scherlis assumed the role of office director for DARPA’s Information Innovation Office (I2O) in September 2019. In this role he leads program managers in the development of programs, technologies, and capabilities to ensure information advantage for the United States and its allies, and coordinates this work across the Department of Defense and U.S. government.
08/30/2020
This Broad Agency Announcement (BAA) seeks revolutionary research ideas for topics not being addressed by ongoing I2O programs or other published solicitations. Potential proposers are highly encouraged to review the current I2O programs (http://www.darpa.mil/about-us/offices/i2o) and solicitations (http://www.darpa.mil/work-with-us/opportunities) to avoid proposing efforts that duplicate existing activities or that are responsive to other published I2O solicitations.