A key management approach for unmanned aerial systems utilizes cryptographic protocols for dynamic group keying to secure the command and control channels while limiting the receipt of the sensor broadcasts to authorized users.

Secure Resilient Systems and Technology

Our group develops architectures and technologies for ensuring security and resiliency of mission-critical cyber-physical systems, from drones and satellites to high-performance secure cloud computing. We pursue innovative research and development through the problem analysis, rapid prototyping, and field testing phases, to ultimately deliver our technological solutions for Department of Defense and Intelligence Community uses. Our group is made up of top scientists, engineers, and support staff who share a common passion for solving some of the hardest technical problems relevant to national security.

Featured Projects

an illustration of a circuit board
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
an illustration of a world map with network lines connecting countries
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
Cryptographic keys can now be created and securely distributed in real time during a mission.
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
HARDEN interface screenshot
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.

Advancing Our Research


3 - 4
MIT Lincoln Laboratory, Lexington, MA

Featured Publications

Bootstrapping and Maintaining Trust in the Cloud(469.63 KB)

Dec 5
Proceedings of the 32nd Annual Computer Security Applications Conference, ACSAC 2016

Leveraging Data Provenance to Enhance Cyber Resilience(273.48 KB)

Nov 3
Proceedings of 1st IEEE Cybersecurity Development Conference (SecDev'16), Boston, Mass.

High-throughput ingest of data provenance records in Accumulo

Sep 13
HPEC 2016: IEEE Conf. on High Performance Extreme Computing, 13-15 September 2016.

Our Staff

View the biographies of members of the Secure Resilient Systems and Technology Group.