Defense Advanced Research Projects AgencyTagged Content List

Technologies for Trustworthy Computing and Information

Confidence in the integrity of information and systems

Showing 3 results for Trust + Opportunities RSS
March 14, 2019, 9:00 AM ET,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential proposers on the objectives of the new Artificial Social Intelligence for Successful Teams (ASIST) program. ASIST will explore human-machine teaming and machine social intelligence in a teaming context. DARPA envisions computer-based agents that observe their surroundings; build and maintain rich representations of the environment, team, and individuals; infer teammates’ goals (non-verbal behavior); predict teammates’ actions; and assist teams by planning interventions and executing them at appropriate times. During demonstrations in a virtual testbed, ASIST agents will operate in increasingly complex environments and will have to adapt to challenges such as a change in strategy.
May 14, 2019, 8:30 AM EDT,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential proposers on the objectives of the new Automated Rapid Certification Of Software (ARCOS) program and to facilitate teaming. The goal of ARCOS is to automate the evaluation of software assurance evidence so that certifiers can rapidly determine if system risk is acceptable. “Certification” is the process of determining that a system’s risk is acceptable.
January 23, 2019,
DARPA Conference Center
The Information Innovation Office is holding a Proposers Day meeting to provide information to potential proposers on the objectives of the new Guaranteed Architecture for Physical Security (GAPS) program. GAPS will develop hardware and software architectures that can provide physically provable guarantees around high-risk transactions, or where data moves between systems of different security levels. DARPA wants to ensure that these transactions are isolated and that the systems they move across are enabled with the necessary data security assertions. The intended outputs of this program are hardware and software co-design tools that allow data separation requirements to be defined during design, and protections that can be physically enforced at system runtime.