Projects

Refine Results

(Filters Applied) Clear All
a collage of images showing a satellite, a jet, a warship, and soldiers on the ground. In the middle of the collage is an illustration of a circuit board.
cyber security
Lincoln Laboratory is developing technologies to meet the highest standards for information security at the tactical edge.
an illustration of satellite in space with Earth's blue surface in the background.
cyber security
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.
cyber security
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of Defense.
3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.
cyber security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"
cyber security
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
an illustration of a key lock protecting lines and nodes.
cyber security
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
an illustration of a circuit board
cyber security
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
an illustration of a world map with network lines connecting countries
cyber security
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.
software
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.

Showing Results

1-10 of 12