IARPA Cyber-attack Automated Unconventional Sensor Environment (CAUSE)


The IARPA Cyber-attack Automated Unconventional Sensor Environment (CAUSE) Program seeks to develop cyber-attack forecasting methods and detect emerging cyber phenomena to assist cyber defenders with the earliest detection of a cyber-attack (e.g., Distributed Denial of Service (DDoS), successful spearphishing, successful drive-by, remote exploitation, unauthorized access, reconnaissance). The CAUSE Program aims to develop and validate unconventional multi-disciplined sensor technology (e.g., actor …

DARPA-BAA-15-15: Transparent Computing (TC)


DARPA is soliciting innovative research proposals in the area of understanding complex distributed computing environments towards exposing and stopping advanced cyber adversaries (also referred to as Advanced Persistent Threats, or APTs). The Transparent Computing (TC) program aims to make currently opaque computing systems transparent by providing high-fidelity visibility into component interactions during system operation across all layers of software abstraction, …



DARPA is soliciting innovative research proposals in the area of resilient, mission-aware computer networking. https://www.fbo.gov/spg/ODA/DARPA/CMO/DARPA-BAA-15-10/listing.html

Air Force Research Laboratory


The Air Force Research Laboratory invites whitepapers to support Innovative Approaches for Applied Projects in Four Research Areas of Information Science and Technology: · Autonomy, C2 Planning, and Decision Support; · Processing and Exploitation; · Cyber Science and Technology; and, · Connectivity and Dissemination. Approximately $2 million may be made available to support multiple awards. Eligibility is unrestricted domestically. Whitepapers …

DARPA 2014


CFAR https://www.fbo.gov/index?s=opportunity&mode=form&id=43b09e88c3b8289cb4cbf63b402f46c5&tab=core&_cview=1 “Binary Transformation (TA-1) systems will transform Applications to Defend (ATDs) into variants with diverse binary structures. The Cyber Fault Tolerant Architecture (TA-2) will run multiple variants in parallel and compare their behaviors regularly. The variants should behave differently when attacked. The system will react to attacks by restarting with new variants.” SafeWare https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0 “The goal of the SafeWare …