Projects
Tagged As
![an illustration of a world map with network lines connecting countries](/sites/default/files/styles/list/public/project/image/2019-08/Screen%20Shot%202019-08-05%20at%209.39.01%20AM.png?itok=k-whJAna)
Data-Centric Secure Computing
A suite of technologies protects data both at rest and in transit by providing access to secure computation nodes distributed throughout a network.
Tags
![TKM enables seamless over-the-network key distribution to unmanned aerial vehicles (UAVs) and authorized terminals. At left, UAV video is accessible to authorized terminals. At right, an operator has modified access during the mission.](/sites/default/files/styles/list/public/project/image/2019-07/Tactical-Key-Management-Web-Thumbnail.png?itok=6EcJL2Vk)
Tactical Key Management
Cryptographic keys can now be created and securely distributed in real time during a mission.
Tags
![HARDEN interface screenshot](/sites/default/files/styles/list/public/project/image/2019-08/HARDEN.png?itok=VxJP6CEP)
High Assurance Design Environment
A new tool enables mission system designers to design for functionality and security together and provide evidence for how design choices affect a mission’s security posture.
Tags
![The LAVA system automatically injects bugs into program code so that vulnerability discovery techniques can be tested.](/sites/default/files/styles/list/public/project/image/2018-04/lava_graphic-01_WEB.jpg?itok=mJpwunjv)
Large-scale Automated Vulnerability Addition
Computer scientists can test techniques for finding vulnerabilities in code.
Tags
![PANDA's replay log files are compact and shareable, allowing for repeatable experiments. For example, a nine billion instruction set is represented by only a few hundred megabytes.](/sites/default/files/styles/list/public/project/image/2018-04/Network%20Maze%20Graphic.jpg?h=53c3d587&itok=o4kIZoQH)
PANDA – Platform for Architecture-Neutral Dynamic Analysis
An open source platform helps analysts quickly reverse engineer large, real-world binary systems to better analyze how software executes.
Tags