A researcher is prototyping a next-generation, cost-effective disk-encryption device for protecting classified data in forward-deployed, tactical mission systems.

Cyber Operations and Analysis Technology

The U.S. government faces serious threats from sophisticated cyber adversaries who seek to access and disrupt systems and missions. We improve the security of these government systems through the development and deployment of innovative cybersecurity solutions. In particular, our group develops quantitative threat models to inform our cyber systems analyses and prototypes cyber defense techniques. We employ novel analytics to help us discover and characterize cyber threats. Our researchers have developed scalable cyber decision support tools that are used by the Department of Defense and Intelligence Community.

Featured Projects

CASCADE software uses complex systems modeling and simulation to explore thousands of adversarial action-reaction logic branches and predict probable outcomes. The software generates cyber solutions optimized for security, cost, and mission performance.
CASCADE software simulates cyber attacker and defender actions and recommends multiple courses of action to make systems and networks more secure.
CHARIOT software helps reduce the time that analysts spend searching vast amounts of online data by automatically flagging content that likely contains cyber discussions indicative of potential cyber attacks.
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat

Advancing Our Research


3 - 4
MIT Lincoln Laboratory, Lexington, MA

Featured Publications

Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity(280.86 KB)

Oct 12
Proceedings of ACM Conference on Computer and Communications Security (CCS)

Timely Rerandomization for Mitigating Memory Disclosures(215.65 KB)

Oct 12
Proceedings of ACM Conference on Computer and Communications Security (CCS)

A spectral framework for anomalous subgraph detection(2.65 MB)

Aug 15
IEEE Transactions on Signal Processing, vol. 63, no. 16, pp. 4191–4206

Our Staff

View the biographies of members of the Cyber Operations and Analysis Technology Group.