Projects
Tagged As

Automated Cryptography for Data-Centric Security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
Tags

Reconnaissance of Influence Operations
New software takes advantage of artificial intelligence techniques to automate the detection and assessment of aggressive influence operations.
Tags

Applied Resilience for Mission Systems
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
Tags

Keylime
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Tags

Common Evaluation Platform
Developers can test cybersecurity solutions for government systems by using an integrated circuit modeled on Department of Defense designs.
Tags

Resilient Mission Computer
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
Tags

Data-Centric Secure Computing
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Tags

Tactical Key Management
Cryptographic keys can now be created and securely distributed in real time during a mission.
Tags

High Assurance Design Environment
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
Tags

Cyber Adversarial Scenario Modeler and Artificial Intelligence Decision Engine (CASCADE)
CASCADE software simulates cyber attacker and defender actions and recommends multiple courses of action to make systems and networks more secure.
Tags