Analysts use the Lincoln Adaptable Real-time Information Assurance Testbed (LARIAT) to evaluate the effectiveness of cyber defense techniques.

Cyber System Assessments

Our team discovers novel vulnerabilities in systems ranging from computers and cellphones to cars and jet fighters. In order to improve the defenses of systems, we use reverse engineering to find ways to maintain control over hardware and software. We coordinate with the Department of Defense and Intelligence Community to evaluate cyber defense systems and enable effective cyber operations.

Featured Projects

An screengrab from the video showing about a dozen robots in a large room (representing humans at a party)
An automated, Bluetooth-based system helps perform contact tracing in a private, anonymous way, offering a method to reduce disease spread during a pandemic.
The LAVA system automatically injects bugs into program code so that vulnerability discovery techniques can be tested.
cyber security
Computer scientists can test techniques for finding vulnerabilities in code.
PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.
cyber security
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.

Advancing Our Research


29 - 30
MIT Lincoln Laboratory, Lexington, Massachusetts

Featured Publications

Mission assurance: beyond secure processing

Jul 16
18th IEEE Int. Conf. on Software Quality, Reliability, and Security, QRS 2018, 16-20 July 2018, pp. 593-8.

SoK: privacy on mobile devices - it's complicated

Mar 2
Proc. on Privacy Enhancing Techn., Vol. 3, 2016, pp. 96-116.

Our Staff

View the biographies of members of the Cyber System Assessments Group.