Projects

Refine Results

(Filters Applied) Clear All
an illustration of a circuit board
cyber security
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
an illustration of a world map with network lines connecting countries
cyber security
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
software
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.
cryptography
Cryptographic keys can now be created and securely distributed in real time during a mission.
HARDEN interface screenshot
software
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
CHARIOT software helps reduce the time that analysts spend searching vast amounts of online data by automatically flagging content that likely contains cyber discussions indicative of potential cyber attacks.
human language technology
Using CHARIOT software, cybersecurity analysts can quickly filter online data to discover conversations that hint at cyber threat
PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.
software
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.

Showing Results

1-9 of 9