CFAR
https://www.fbo.gov/index?s=opportunity&mode=form&id=43b09e88c3b8289cb4cbf63b402f46c5&tab=core&_cview=1
“Binary Transformation (TA-1) systems will transform Applications to Defend (ATDs) into variants with diverse binary structures. The Cyber Fault Tolerant Architecture (TA-2) will run multiple variants in parallel and compare their behaviors regularly. The variants should behave differently when attacked. The system will react to attacks by restarting with new variants.”
SafeWare
https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0
“The goal of the SafeWare research effort is to drive fundamental advances in the theory of program obfuscation and to develop highly efficient and widely applicable program obfuscation methods with mathematically proven security properties.”
STAC
https://www.fbo.gov/index?s=opportunity&mode=form&id=236fa8377e49acdfd31cd470e0fbdf8c&tab=core&_cview=1
“STAC is concerned with these vulnerabilities inherent in algorithms – specifically, vulnerabilities that stem from the algorithms’ space and time resource usage. Some of these vulnerabilities enable adversaries to mount algorithmic complexity attacks. Others enable adversaries to mount side channel attacks.”