![three people talking around a high top table at a poster session](/sites/default/files/styles/news_3_up/public/news/image/2023-12/DSC00053_Shamaria%20Engram%20at%20Poster%20Session_5x7.jpg?itok=TkUrP_so)
![Analysts use the Lincoln Adaptable Real-time Information Assurance Testbed (LARIAT) to evaluate the effectiveness of cyber defense techniques.](/sites/default/files/styles/ifde_hero/public/rdgroup/image/2018-04/Cyber_LARIAT.jpg?h=37908ccf&itok=nSaZXk_w)
Cyber System Assessments
Our team discovers novel vulnerabilities in systems ranging from computers and cellphones to cars and jet fighters. In order to improve the defenses of systems, we use reverse engineering to find ways to maintain control over hardware and software. We coordinate with the Department of Defense and Intelligence Community to evaluate cyber defense systems and enable effective cyber operations.
Featured Projects
![An screengrab from the video showing about a dozen robots in a large room (representing humans at a party)](/sites/default/files/styles/list/public/project/image/2023-01/PACT%20testing.png?itok=QgX2MNGG)
sensing
Private Automated Contact Tracing
An automated, Bluetooth-based system helps perform contact tracing in a private, anonymous way, offering a method to reduce disease spread during a pandemic.
![The LAVA system automatically injects bugs into program code so that vulnerability discovery techniques can be tested.](/sites/default/files/styles/list/public/project/image/2018-04/lava_graphic-01_WEB.jpg?itok=UwmoR718)
cyber security
Large-scale Automated Vulnerability Addition
Computer scientists can test techniques for finding vulnerabilities in code.
![PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.](/sites/default/files/styles/list/public/project/image/2018-04/Network%20Maze%20Graphic.jpg?h=53c3d587&itok=jnZZqSMB)
cyber security
PANDA – Platform for Architecture-Neutral Dynamic Analysis
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.
Latest News
Advancing Our Research
Events
May
28
-
30
Cyber Technology for National Security (CTNS) 2025
MIT Lincoln Laboratory, Lexington, Massachusetts
Featured Publications
Artificial intelligence: short history, present developments, and future outlook, final report
Jan 1
MIT Lincoln Laboratory Report
Mission assurance: beyond secure processing
Jul 16
18th IEEE Int. Conf. on Software Quality, Reliability, and Security, QRS 2018, 16-20 July 2018, pp. 593-8.
SoK: privacy on mobile devices - it's complicated
Mar 2
Proc. on Privacy Enhancing Techn., Vol. 3, 2016, pp. 96-116.