Defense Advanced Research Projects AgencyTagged Content List

Cyber

Relating to digital systems and information

Showing 32 results for Cyber + Automation RSS
August 4, 2016,
Co-located with DEF CON 24, Paris Las Vegas Convention Center, 3655 S. Las Vegas Blvd.

GET LIVE UPDATES FROM THE CGC FLOOR!

 

DARPA will hold the world’s first all-computer Capture the Flag tournament live on stage (co-located with the DEF CON conference in Las Vegas) where automated systems may take the first steps toward a defensible, connected future. Seven teams from across the United States qualified to compete in the Final Event. For more information, please visit: http://archive.darpa.mil/cybergrandchallenge/.

April 20 – September 17, 2017,
Smithsonian National Museum of American History
In 2014, DARPA launched the Cyber Grand Challenge (CGC) to develop intelligent systems that might someday take over the painstaking and time-consuming work of searching through billions of lines of software code for vulnerabilities or intrusions. The Pittsburgh-based team ForAllSecure built Mayhem, which took first place in the CGC in August 2016. The Mayhem Cyber Reasoning System is now on display at the Smithsonian’s National Museum of American History in Washington, D.C. The exhibit will run through September 17, 2017.
May 20, 2017,
Smithsonian National Museum of American History
On May 20, DARPA is taking part in Military Invention Day at the Smithsonian National Museum of American History, an event produced by the Lemelson Center for the Study of Invention and Innovation. The event will showcase examples of today’s leading-edge military inventions alongside historical technologies from the Museum’s collections.
07/29/2016
Throughout game day, DARPA is roaming around the Paris Las Vegas Convention Center to capture attendees’ reflections on the historic experiment in cyber security unfolding before them.
The current standard method for validating a user’s identity for authentication on an information system requires humans to do something that is inherently unnatural: create, remember, and manage long, complex passwords. Moreover, as long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the user still in control of the keyboard. Thus unauthorized individuals may improperly obtain extended access to information system resources if a password is compromised or if a user does not exercise adequate vigilance after initially authenticating at the console.