Defense Advanced Research Projects AgencyTagged Content List

Technologies for Trustworthy Computing and Information

Confidence in the integrity of information and systems

Showing 53 results for Trust RSS
August 28, 2019, 8:00 AM EDT,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential performers on the new Semantic Forensics (SemaFor) program. SemaFor seeks to develop innovative semantic technologies for automatically analyzing multi-modal media assets (i.e., text, audio, image, video) to defend against large-scale, automated disinformation attacks. Semantic detection algorithms will determine if media is generated or manipulated; attribution algorithms will infer if media originates from a particular organization or individual; characterization algorithms will reason about whether media was generated or manipulated for malicious purposes. The results of detection, attribution, and characterization algorithms will be used to develop explanations for system decisions and prioritize assets for analyst review. SemaFor technologies could help to identify, understand, and deter adversary disinformation campaigns.
June 8, 2018,
Executive Conference Center
DARPA’s Defense Sciences Office (DSO) is hosting a Proposers Day to provide information to potential proposers on the objectives of the Systematizing Confidence in Open Research and Evidence (SCORE) program. SCORE aims to develop and deploy automated tools to assign "confidence scores" to different social and behavioral science (SBS) research results and claims. Confidence scores are quantitative measures that should enable a DoD consumer of SBS research to understand the degree to which a particular claim or result is likely to be reproducible or replicable. The event will be available via a live webcast for those who would like to participate remotely.
The current standard method for validating a user’s identity for authentication on an information system requires humans to do something that is inherently unnatural: create, remember, and manage long, complex passwords. Moreover, as long as the session remains active, typical systems incorporate no mechanisms to verify that the user originally authenticated is the user still in control of the keyboard. Thus unauthorized individuals may improperly obtain extended access to information system resources if a password is compromised or if a user does not exercise adequate vigilance after initially authenticating at the console.
The Anomaly Detection at Multiple Scales (ADAMS) program creates, adapts and applies technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts. The initial application domain is insider threat detection in which malevolent (or possibly inadvertent) actions by a trusted individual are detected against a background of everyday network activity.
To be effective, Department of Defense (DoD) cybersecurity solutions require rapid development times. The shelf life of systems and capabilities is sometimes measured in days. Thus, to a greater degree than in other areas of defense, cybersecurity solutions require that DoD develops the ability to build quickly, at scale and over a broad range of capabilities.