A researcher is prototyping a next-generation, cost-effective disk-encryption device for protecting classified data in forward-deployed, tactical mission systems.

Cyber Operations and Analysis Technology

The U.S. government faces serious threats from sophisticated cyber adversaries who seek to access and disrupt systems and missions. We improve the security of these government systems through the development and deployment of innovative cybersecurity solutions. In particular, our group develops quantitative threat models to inform our cyber systems analyses and prototypes cyber defense techniques. We employ novel analytics to help us discover and characterize cyber threats. Our researchers have developed scalable cyber decision support tools that are used by the Department of Defense and Intelligence Community.

Featured Projects

CASCADE software uses complex systems modeling and simulation to explore thousands of adversarial action-reaction logic branches and predict probable outcomes. The software generates cyber solutions optimized for security, cost, and mission performance.
CASCADE software simulates cyber attacker and defender actions and recommends multiple courses of action to make systems and networks more secure.
CHARIOT software helps reduce the time that analysts spend searching vast amounts of online data by automatically flagging content that likely contains cyber discussions indicative of potential cyber attacks.
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat

Advancing Our Research

Events

Dec
3 - 4
MIT Lincoln Laboratory, Lexington, MA

Featured Publications

Balancing security and performance for agility in dynamic threat environments

Jun 28
46th IEEE/IFIP Int. Conf. on Dependable Systems and Networks, DSN 2016, 28 June - 1 July 2016.

Simulation based evaluation of a code diversification strategy

Jul 21
5th Int. Conf. on Simulation and Modeling Methodologies, Technologies, and Applications, SIMULTECH 2015, 21-23 July 2015.

Guaranteeing spoof-resilient multi-robot networks

Jul 13
2015 Robotics: Science and Systems Conf., 13-17 July 2015.

Our Staff

View the biographies of members of the Cyber Operations and Analysis Technology Group.