Projects
Tagged As
![CASCADE software uses complex systems modeling and simulation to explore thousands of adversarial action-reaction logic branches and predict probable outcomes. The software generates cyber solutions optimized for security, cost, and mission performance.](/sites/default/files/styles/list/public/project/image/2018-05/Group58_Image.jpg?h=e726bc1a&itok=w1CxjhqP)
Cyber Adversarial Scenario Modeler and Artificial Intelligence Decision Engine (CASCADE)
CASCADE software simulates cyber attacker and defender actions and recommends multiple courses of action to make systems and networks more secure.
Tags
![The LAVA system automatically injects bugs into program code so that vulnerability discovery techniques can be tested.](/sites/default/files/styles/list/public/project/image/2018-04/lava_graphic-01_WEB.jpg?itok=UwmoR718)
Large-scale Automated Vulnerability Addition
Computer scientists can test techniques for finding vulnerabilities in code.
Tags
![PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.](/sites/default/files/styles/list/public/project/image/2018-04/Network%20Maze%20Graphic.jpg?h=53c3d587&itok=jnZZqSMB)
PANDA – Platform for Architecture-Neutral Dynamic Analysis
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.
Tags