Defense Advanced Research Projects AgencyTagged Content List

Algorithms

A process or rule set used for calculations or other problem-solving operations

Showing 8 results for Algorithms + Cyber RSS
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information is essential, particularly for national security. To ensure information advantage for the U.S. and its allies, the Information Innovation Office (I2O) sponsors basic and applied research in three thrust areas: Symbiosis, Analytics, and Cyber.
05/18/2015
Modern society depends on information and information depends on information systems. Timely, insightful, reliable, and relevant information is essential, particularly for national security. The Information Innovation Office (I2O) sponsors basic and applied research in three thrust areas to ensure information advantage for the U.S. and its allies:
04/08/2015
As modern software systems continue inexorably to increase in complexity and capability, users have become accustomed to periodic cycles of updating and upgrading to avoid obsolescence—if at some cost in terms of frustration. In the case of the U.S. military, having access to well-functioning software systems and underlying content is critical to national security, but updates are no less problematic than among civilian users and often demand considerable time and expense. That is why today DARPA announced it will launch an ambitious four-year research project to investigate the fundamental computational and algorithmic requirements necessary for software systems and data to remain robust and functional in excess of 100 years.
LADS will develop a new protection paradigm that separates security-monitoring functionality from the protected system, focusing on low-resource, embedded and Internet of Things (IoT) devices. The program will explore technologies to associate the running state of a device with its involuntary analog emissions across different physical modalities including, but not limited to, electromagnetic emissions, acoustic emanations, power fluctuations and thermal output variations.
As new defensive technologies make old classes of vulnerability difficult to exploit successfully, adversaries move to new classes of vulnerability. Vulnerabilities based on flawed implementations of algorithms have been popular targets for many years. However, once new defensive technologies make vulnerabilities based on flawed implementations less common and more difficult to exploit, adversaries will turn their attention to vulnerabilities inherent in the algorithms themselves.