Projects
![Three step progression of material in self repair, from cracked, to processing, to fully repaired.](/sites/default/files/styles/list/public/project/image/2020-09/self-healing_composite.jpg?itok=80ESKP5w)
Self-Healing Materials for Vibration Damping
New materials that are chemically inspired by nature could be tailored at the molecular level to dissipate vibrations in microsystems. Materials that can survive repeated external stresses could enable a next generation of enhanced microsystems.
Tags
![3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.](/sites/default/files/styles/list/public/project/image/2020-09/ACDC_graphic_revised.jpg?h=c1265061&itok=VM5iOxtq)
Automated Cryptography for Data-Centric Security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
Tags
![a photo of boston harbor with several boats on the water; each boat has an orange box drawn around it as a 'detection'](/sites/default/files/styles/list/public/project/image/2020-07/Boston_2015-07-09_PM_Panorama_0.jpg?h=3c784fb1&itok=wNNBATpS)
Waterways Automated Vessel Information
Our video analytics are helping to improve waterway security.
Tags
![This image illustrates a retweet network for the #MacronLeaks narrative during the 2017 French presidential election. Each circle represents a Twitter account, and arrows represent “retweets.”](/sites/default/files/styles/list/public/project/image/2020-07/retweetnetwork_0.png?h=0e9d9503&itok=ai6YwOHX)
Reconnaissance of Influence Operations
New software takes advantage of artificial intelligence techniques to automate the detection and assessment of aggressive influence operations.
Tags
![an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"](/sites/default/files/styles/list/public/project/image/2020-07/Concept_7%5B2%5D.jpg?h=4c7b7875&itok=byboC9aQ)
Applied Resilience for Mission Systems
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
Tags
![Photo of researchers launching the weather balloons](/sites/default/files/styles/list/public/project/image/2020-05/518599-123D_0.jpg?itok=fkGh1RZD)
Balloon-Based Resilient Communications
High-altitude balloons used as beyond-line-of-sight relays would provide communications nodes if satellite communications could not offer coverage in contested environments.
Tags
![an illustration of a key lock protecting lines and nodes.](/sites/default/files/styles/list/public/project/image/2020-05/Keylime.png?itok=wYe_wN1z)
Keylime
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Tags
![A zoomed-in view of a metal nozzle shooting a stream of orange onto a metal surface, and a nozzle shooting a stream of purple at the orange stream of material.](/sites/default/files/styles/list/public/project/image/2020-03/microplasma-sputter-2.png?itok=Wa7DEsCi)
Microplasma Sputterer
A novel method for manufacturing interconnects could open the door for 3D-printed microelectronic systems.
Tags
![the letters "CEP"](/sites/default/files/styles/list/public/project/image/2019-12/CEP_logo.jpg?itok=PrI7fVYX)
Common Evaluation Platform
Developers can test cybersecurity solutions for government systems by using an integrated circuit modeled on Department of Defense designs.
Tags
![Simulation of a flight test](/sites/default/files/styles/list/public/project/image/2019-10/virtual-test-site.jpg?itok=Y5kzEe8J)
Virtual Test Environments for UAVs
For experiments with unmanned aerial vehicles, researchers use simulated geographies that avoid the risks of real-world flight tests.
Tags