A key management approach for unmanned aerial systems utilizes cryptographic protocols for dynamic group keying to secure the command and control channels while limiting the receipt of the sensor broadcasts to authorized users.

Secure Resilient Systems and Technology

Our group develops architectures and technologies for ensuring security and resiliency of mission-critical cyber-physical systems, from drones and satellites to high-performance secure cloud computing. We pursue innovative research and development through the problem analysis, rapid prototyping, and field testing phases, to ultimately deliver our technological solutions for Department of Defense and Intelligence Community uses. Our group is made up of top scientists, engineers, and support staff who share a common passion for solving some of the hardest technical problems relevant to national security.

Featured Projects

an illustration of satellite in space with Earth's blue surface in the background.
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of Defense.
3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
an illustration of a key lock protecting lines and nodes.
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.

Advancing Our Research

Featured Publications

Keeping Safe Rust safe with Galeed

Dec 6
Annual Computer Security Applications Conf., ACSAC, December 2021, pp. 824-36.

Practical principle of least privilege for secure embedded systems

May 18
2021 IEEE 27th Real-Time and Embedded Technology and Applications Symp., RTAS. 18-21 May 2021.

A cybersecurity moonshot

May 1
IEEE Secur. Priv., Vol. 19, No. 3, May-June 2021, pp. 8-16.

Our Staff

View the biographies of members of the Secure Resilient Systems and Technology Group.