Defense Advanced Research Projects AgencyWork With UsOpportunities

Opportunities

Established in 1958 as part of the U.S. Department of Defense, DARPA pursues opportunities for transformational change rather than incremental advances. It does so collaboratively as part of a robust innovation ecosystem that includes academic, corporate, and governmental partners. To fulfill its mission, the Agency relies on diverse performers from throughout this ecosystem to apply multi-disciplinary approaches to both advance knowledge through basic research and create innovative technologies that address current and predicted practical problems through applied research. The list of selected opportunities displayed below is provided for convenience. For a complete listing of DARPA opportunities please visit the beta.SAM.gov website.. More

In addition to program-specific opportunities, each DARPA technical office maintains an “office-wide” Broad Agency Announcement (BAA) that covers a range of technical areas of interest to each particular office. The office-wide BAAs are refreshed on an annual basis and offer a mechanism for researchers to reach DARPA with ideas that they feel could be valuable to national security.

 

Response date: 8/30/2020
Information Innovation Office (I2O) Office-wide
I2O
This Broad Agency Announcement (BAA) seeks revolutionary research ideas for topics not being addressed by ongoing I2O programs or other published solicitations. Potential proposers are highly encouraged to review the current I2O programs (http://www.darpa.mil/about-us/offices/i2o) and solicitations (http://www.darpa.mil/work-with-us/opportunities) to avoid proposing efforts that duplicate existing activities or that are responsive to other published I2O solicitations.
Response date: 7/30/2020
Reverse Engineering of Deceptions (RED)
I2O
The Reverse Engineering of Deceptions (RED) effort will develop techniques that automatically reverse engineer the toolchains behind attacks such as multimedia falsification, adversarial machine learning (ML) attacks, or other information deception attacks. The tools by which those attacks are accomplished and the adversaries behind such attacks are often unclear; recovering the tools and processes used to create an attack provides information that may aid in identifying an adversary.
| ML |
Response date: 9/9/2020
Verified Security and Performance Enhancement of Large Legacy Software (V-SPELLS)
I2O
The goal of the V-SPELLS program is to create a developer-accessible capability for piece-by-piece enhancement of software components with new verified code that is both correct-by-construction and compatible-by-construction, i.e., safely composable with the rest of the system. V-SPELLS will create practical tools for developers to gain benefits of formal software verification in incremental software (re)engineering rather than only in clean-slate introduction. V-SPELLS tools will enable developers to deliver assured incremental modernization of legacy systems in a manner that leverages verification technologies and reduces rather than raises risk.
Response date: 9/30/2020
Cyberspace Operations and Information Operations Research and Development (COIO R&D)
I2O
The DARPA Information Innovation Office (I2O) requests information on potential performers for classified COIO R&D. Specifically, this RFI seeks information on potential performers who have the capability to rapidly develop state-of-the-art COIO technologies responsive to current and emerging cyber threats.
| Cyber |