Defense Advanced Research Projects AgencyTagged Content List

Automation Technologies

Automatic mechanical or digital operation

Showing 35 results for Automation + Cyber RSS
04/13/2018
Norman A. Whitaker is a Microsoft distinguished scientist and managing director of Microsoft Research Special Projects. As head of that group, he provides a structure for projects with focused objectives aimed at altering and expanding what people imagine is possible with technology.
04/13/2018
Mike Walker is a Principal Researcher at Microsoft working on security AI. Prior to joining Microsoft, Mike led DARPA’s Cyber Grand Challenge, a two-year $58M contest to construct & compete the first prototypes of reasoning cyberdefense AI. In 2016 at the DEF CON hacking contest, these prototypes took their first flight into the game of hackers, Capture the Flag (CTF), landing zero-day exploits and writing patches in a fully autonomous battle.
01/01/2016
The 21st century has brought with it the ever more urgent need for automated, scalable, machine-speed vulnerability detection and patching as more and more systems—from household appliances to major military platforms—get connected to, and become dependent upon, the internet. Finding and countering bugs, hacks, and other cyber infection threats have effectively been artisanal: professional bug hunters, security coders, and other security pros work endless hours, searching millions of lines of code to find and fix vulnerabilities that those with ulterior motives can exploit. This is a sluggish process that can no longer can keep pace with the relentless stream of threats.
02/12/2013
In the world of network cyber security, the weak link is often not the hardware or the software, but the user. Passwords are often easily guessed or possibly written down, leaving entire networks vulnerable to attack. Mobile devices containing sensitive information are often lost or stolen, leaving a password as the single layer of defense.
10/22/2013
What if computers had a “check engine” light that could indicate new, novel security problems? What if computers could go one step further and heal security problems before they happen?