A key management approach for unmanned aerial systems utilizes cryptographic protocols for dynamic group keying to secure the command and control channels while limiting the receipt of the sensor broadcasts to authorized users.

Secure Resilient Systems and Technology

Our group develops technologies to protect mission-critical systems from cyberattacks. These technologies are applicable to processors in a wide range of applications like drones, handheld devices, satellites, and high-performance secure cloud computing. We pursue innovative research to ensure the security of computer systems, and we participate in all development phases, including problem analysis, rapid prototyping, field testing, and, ultimately, technology transfer to Department of Defense and Intelligence Community users.

Advancing Our Research

Featured Publications

Bootstrapping and Maintaining Trust in the Cloud(469.63 KB)

Dec 5
Proceedings of the 32nd Annual Computer Security Applications Conference, ACSAC 2016

Leveraging Data Provenance to Enhance Cyber Resilience(273.48 KB)

Nov 3
Proceedings of 1st IEEE Cybersecurity Development Conference (SecDev'16), Boston, Mass.

POPE: Partial Order Preserving Encoding(589.23 KB)

Oct 16
Proceedings of the ACM Conference on Computer and Communications Security (CCS)

Our Staff

View the biographies of members of the Secure Resilient Systems and Technology Group.