Projects
![A magnified view of superconducting circuits.](/sites/default/files/styles/list/public/project/image/2025-02/SuperCAMs.png?itok=2KMtUdFX)
Superconducting Content-Addressable Memories (SuperCAMs)
Unconventional memory circuits can accelerate data processing in cyber sensing devices by reducing the latency of matching complex data patterns to specialized processing pipelines.
Tags
![a collage of images showing a satellite, a jet, a warship, and soldiers on the ground. In the middle of the collage is an illustration of a circuit board.](/sites/default/files/styles/list/public/project/image/2023-11/High-Assurance%20Cryptography_v2_2.jpg?h=285cfac5&itok=NBi3a1pY)
High-Assurance Cryptography
Lincoln Laboratory is developing technologies to meet the highest standards for information security at the tactical edge.
Tags
![An screengrab from the video showing about a dozen robots in a large room (representing humans at a party)](/sites/default/files/styles/list/public/project/image/2023-01/PACT%20testing.png?itok=NAezdJZO)
Private Automated Contact Tracing
An automated, Bluetooth-based system helps perform contact tracing in a private, anonymous way, offering a method to reduce disease spread during a pandemic.
Tags
![A photo of a hallway between two rows of data center servers. Two researchers are working on the servers.](/sites/default/files/styles/list/public/news/image/2023-09/525558-006D.jpg?itok=H9vnrix7)
Green Instrumentation and Experimentation
We are innovating and accelerating solutions to address AI's carbon footprint and reduce data center energy usage.
Tags
![an illustration of satellite in space with Earth's blue surface in the background.](/sites/default/files/styles/list/public/project/image/2022-01/Cubesat.jpg?itok=6aMdT1qP)
Space Systems Cyber-Resiliency
We are researching and prototyping cyber-resilient space systems software that will enable critical national security space assets to withstand, operate through, and recover from cyberattack.
Tags
![an illustration of several dozen translucent blue cubes, with highlighting lines connecting them, representing nodes.](/sites/default/files/styles/list/public/project/image/2021-12/ARROWS%20BKG_v2_0.jpg?h=2606abf2&itok=itt2D_bm)
Foundational Security for Software
We are creating secure software foundations and applying them to operating systems used widely in mission-critical systems for the Department of Defense.
Tags
![3 columns of text labeled "Secur Computation Engine," "Secure Data Capsule," and 'Content-centric network" laid over a graphic of the earth with "streams" of data, 0s and 1s, wrapping around Earth.](/sites/default/files/styles/list/public/project/image/2020-09/ACDC_graphic_revised.jpg?h=c1265061&itok=VM5iOxtq)
Automated Cryptography for Data-Centric Security
We’re shifting the paradigm from system-centric to data-centric security, enabling automatic protection for data throughout all of its uses.
Tags
![an illustration of an infinity symbol with label of "ARMS: Applied Resilience for Mission Systems"](/sites/default/files/styles/list/public/project/image/2020-07/Concept_7%5B2%5D.jpg?h=4c7b7875&itok=byboC9aQ)
Applied Resilience for Mission Systems
We’re improving and guiding the resilience of Department of Defense missions by adapting commercial practices and academic research for the development, operation, and sustainment of software-intensive systems.
Tags
![an illustration of a key lock protecting lines and nodes.](/sites/default/files/styles/list/public/project/image/2020-05/Keylime.png?itok=wYe_wN1z)
Keylime
We're enabling trust in the cloud with this free, open-source key bootstrapping and integrity management software architecture.
Tags
![the letters "CEP"](/sites/default/files/styles/list/public/project/image/2019-12/CEP_logo.jpg?itok=PrI7fVYX)
Common Evaluation Platform
Developers can test cybersecurity solutions for government systems by using an integrated circuit modeled on Department of Defense designs.
Tags