Defense Advanced Research Projects AgencyTagged Content List

Physical Security

Relating to the selective release of information and access to facilities

Showing 27 results for Security RSS
April 21, 2017,
Booz Allen Hamilton Conference Center
DARPA will host a Proposers Day in support of the System Security Integrated Through Hardware and Firmware (SSITH), on Friday, April 21, 2017 at the Booz Allen Hamilton Conference Center (3811 N. Fairfax Drive, Suite 600, Arlington, VA 22203) from 8:00am to 5:00pm EDT.
July 29, 2020, from 12:00 PM to 4:00 PM (ET),
The Information Innovation Office (I2O) is holding a Proposers Day to provide information to potential proposers on the objectives of the Verified Security and Performance Enhancement of Large Legacy Software (V-SPELLS) program in anticipation of a planned Broad Agency Announcement. The goal of the V-SPELLS program is to create a developer-accessible capability for piece-by-piece enhancement of software components with new verified code that is both correct-by-construction and compatible-by-construction, i.e., safely composable with the rest of the system.
The Automatic Implementation of Secure Silicon (AISS) program aims to ease the burden of developing secure chips. AISS seeks to create a novel, automated chip design flow that will allow security mechanisms to scale consistently with the goals of a chip design. The target design flow will provide a means of rapidly evaluating architectural alternatives that best address the required design and security metrics, as well as varying cost models to optimize the economics versus security trade-off. The target system on chip (SoC) – will be automatically generated, integrated, and optimized, and will consist of two partitions – an application specific processor partition and a security partition implementing the on-chip security features. By bringing greater automation to the chip design process, the burden of security inclusion can be profoundly decreased.
Modern computing systems are incapable of creating sufficient security protections such that they can be trusted with the most sensitive data while simultaneously being exposed to untrusted data streams. In certain places, the Department of Defense (DoD) and commercial industry have adopted a series of air-gaps – or breaks between computing systems – to prevent the leakage and compromise of sensitive information.
5G is the latest in a series of evolutions in public mobile networking, with widespread coverage and access on a subscription basis. 5G networks are characterized by improved capabilities across a variety of measures, including throughputs, latencies, numbers of devices, and battery life. 5G is used to attach small special purpose devices comprising the Internet of Things (IoT) to the Internet, and the important and growing number of services provided by the World Wide Web.