Defense Advanced Research Projects AgencyTagged Content List

Automation Technologies

Automatic mechanical or digital operation

Showing 14 results for Automation + Trust RSS
March 26, 2020,
Webinar
DARPA will host a Proposers Day in support of recently announced BAA HR001120S0028, Air Combat Evolution (ACE) Technical Area 1 (TA-1) on March 26, 2020, via webinar from 8:00 AM to 12:00 PM, Eastern Time (ET). The purpose of this Proposers Day is to provide information on TA-1 of the ACE program; promote additional discussion on this topic; address questions from potential proposers; and provide a forum for potential proposers to interact with potential teaming partners.
May 14, 2019, 8:30 AM EDT,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential proposers on the objectives of the new Automated Rapid Certification Of Software (ARCOS) program and to facilitate teaming. The goal of ARCOS is to automate the evaluation of software assurance evidence so that certifiers can rapidly determine if system risk is acceptable. “Certification” is the process of determining that a system’s risk is acceptable.
June 8, 2018,
Executive Conference Center
DARPA’s Defense Sciences Office (DSO) is hosting a Proposers Day to provide information to potential proposers on the objectives of the Systematizing Confidence in Open Research and Evidence (SCORE) program. SCORE aims to develop and deploy automated tools to assign "confidence scores" to different social and behavioral science (SBS) research results and claims. Confidence scores are quantitative measures that should enable a DoD consumer of SBS research to understand the degree to which a particular claim or result is likely to be reproducible or replicable. The event will be available via a live webcast for those who would like to participate remotely.
The current standard method for validating a user’s identity for authentication on an information system requires humans to do something that is inherently unnatural: create, remember, and manage long, complex passwords. Moreover, as long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the user still in control of the keyboard. Thus unauthorized individuals may improperly obtain extended access to information system resources if a password is compromised or if a user does not exercise adequate vigilance after initially authenticating at the console.
To be effective, Department of Defense (DoD) cybersecurity solutions require rapid development times. The shelf life of systems and capabilities is sometimes measured in days. Thus, to a greater degree than in other areas of defense, cybersecurity solutions require that DoD develops the ability to build quickly, at scale and over a broad range of capabilities.