Projects
![a collage of images showing a satellite, a jet, a warship, and soldiers on the ground. In the middle of the collage is an illustration of a circuit board.](/sites/default/files/styles/list/public/project/image/2023-11/High-Assurance%20Cryptography_v2_2.jpg?h=285cfac5&itok=NBi3a1pY)
High-Assurance Cryptography
Lincoln Laboratory is developing technologies to meet the highest standards for information security at the tactical edge.
Tags
![An screengrab from the video showing about a dozen robots in a large room (representing humans at a party)](/sites/default/files/styles/list/public/project/image/2023-01/PACT%20testing.png?itok=NAezdJZO)
Private Automated Contact Tracing
An automated, Bluetooth-based system helps perform contact tracing in a private, anonymous way, offering a method to reduce disease spread during a pandemic.
Tags
![an illustration of satellite in space with Earth's blue surface in the background.](/sites/default/files/styles/list/public/project/image/2022-01/Cubesat.jpg?itok=6aMdT1qP)
Space Systems Cyber-Resiliency
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
Tags
![an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.](/sites/default/files/styles/list/public/project/image/2021-12/ARROWS%20BKG_v2_0.jpg?h=2606abf2&itok=itt2D_bm)
Foundational Security for Software
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of Defense.
Tags
![3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.](/sites/default/files/styles/list/public/project/image/2020-09/ACDC_graphic_revised.jpg?h=c1265061&itok=VM5iOxtq)
Automated Cryptography for Data-Centric Security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
Tags
![an illustration of a key lock protecting lines and nodes.](/sites/default/files/styles/list/public/project/image/2020-05/Keylime.png?itok=wYe_wN1z)
Keylime
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Tags
![an illustration of a circuit board](/sites/default/files/styles/list/public/project/image/2019-08/Screen%20Shot%202019-08-05%20at%209.21.14%20AM.png?itok=g3xAQkfE)
Resilient Mission Computer
We've developed an architecture and program plan for a moonshot to build a computer system that is secure to large classes of cyberattacks.
Tags
![an illustration of a world map with network lines connecting countries](/sites/default/files/styles/list/public/project/image/2019-08/Screen%20Shot%202019-08-05%20at%209.39.01%20AM.png?itok=k-whJAna)
Data-Centric Secure Computing
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Tags
![Small satellites are an attractive option for missions because of their low costs; however, they are vulnerable to cyberattacks. We provide a securable and usable architecture for keeping small satellites resilient to system compromise.](/sites/default/files/styles/list/public/project/image/2019-06/Small_Sat_abstract%20_image_2.jpg?h=5cf53e86&itok=r4AQPhbV)
Secure Small Satellite Processing Platform
A secure reference architecture enables satellites to recover from cyberattacks and carry on their missions.
Tags
![TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.](/sites/default/files/styles/list/public/project/image/2019-07/Tactical-Key-Management-Web-Thumbnail.png?itok=6EcJL2Vk)
Tactical Key Management
Cryptographic keys can now be created and securely distributed in real time during a mission.
Tags