Defense Advanced Research Projects AgencyTagged Content List

Automation Technologies

Automatic mechanical or digital operation

Showing 29 results for Automation + Cyber RSS
The 21st century has brought with it the ever more urgent need for automated, scalable, machine-speed vulnerability detection and patching as more and more systems—from household appliances to major military platforms—get connected to, and become dependent upon, the internet. Finding and countering bugs, hacks, and other cyber infection threats have effectively been artisanal: professional bug hunters, security coders, and other security pros work endless hours, searching millions of lines of code to find and fix vulnerabilities that those with ulterior motives can exploit. This is a sluggish process that can no longer can keep pace with the relentless stream of threats.
In the world of network cyber security, the weak link is often not the hardware or the software, but the user. Passwords are often easily guessed or possibly written down, leaving entire networks vulnerable to attack. Mobile devices containing sensitive information are often lost or stolen, leaving a password as the single layer of defense.
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen?
Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA’s Cyber Grand Challenge—a first-of-its-kind tournament designed to speed the development of automated security systems able to defend against cyberattacks as fast as they are launched. DARPA also announced today that it has reached an agreement to hold the 2016 Cyber Grand Challenge final competition in conjunction with DEF CON, one of the largest computer security conferences in the world.
Across the United States, 3200 separate organizations own and operate electrical infrastructure. The widely dispersed nature of the nation’s electrical grid and associated control systems has a number of advantages, including a reduced risk that any single accident or attack could create a widespread failure from which it might take weeks to recover. Since the late 1990’s, however, cost pressures have driven the integration of conventional information technologies into these independent industrial control systems, resulting in a grid that is increasingly vulnerable to cyber-attack, either through direct connection to the Internet or via direct interfaces to utility IT systems.