Defense Advanced Research Projects AgencyTagged Content List

Physical Security

Relating to the selective release of information and access to facilities

Showing 20 results for Security RSS
08/01/2019
This month, DARPA will bring a demonstration version of a secure voting ballot box equipped with hardware defenses in development on the System Security Integrated Through Hardware and Firmware (SSITH) program to the DEF CON 2019 Voting Machine Hacking Village (Voting Village). The SSITH program is developing methodologies and design tools that enable the use of hardware advances to protect systems against software exploitation of hardware vulnerabilities. To evaluate progress on the program, DARPA is incorporating the secure processors researchers are developing into a secure voting ballot box and turning the system loose for public assessment by thousands of hackers and DEF CON community members.
10/14/2019
There are a vast number of diverse computing devices used to run the critical infrastructure our national security depends on – from transportation systems to electric grids to industrial equipment. Much like commercial or personal computing devices, these systems utilize embedded software to execute and manage their operations. To fix certain security vulnerabilities, commercial and personal devices must undergo frequent updates, and are replaced every few years – or on occasion, more frequently when an update fails. Mission-critical systems are built to last for decades, and rarely have the same short upgrade cycles.
January 23, 2019,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential proposers on the objectives of the new Guaranteed Architecture for Physical Security (GAPS) program. GAPS will develop hardware and software architectures that can provide physically provable guarantees around high-risk transactions, or where data moves between systems of different security levels. DARPA wants to ensure that these transactions are isolated and that the systems they move across are enabled with the necessary data security assertions. The intended outputs of this program are hardware and software co-design tools that allow data separation requirements to be defined during design, and protections that can be physically enforced at system runtime.
April 21, 2017,
Booz Allen Hamilton Conference Center
DARPA will host a Proposers Day in support of the System Security Integrated Through Hardware and Firmware (SSITH), on Friday, April 21, 2017 at the Booz Allen Hamilton Conference Center (3811 N. Fairfax Drive, Suite 600, Arlington, VA 22203) from 8:00am to 5:00pm EDT.
Modern computing systems are incapable of creating sufficient security protections such that they can be trusted with the most sensitive data while simultaneously being exposed to untrusted data streams. In certain places, the Department of Defense (DoD) and commercial industry have adopted a series of air-gaps – or breaks between computing systems – to prevent the leakage and compromise of sensitive information.