DARPA 2014

gfjgtubvxcbcFunding

CFAR

https://www.fbo.gov/index?s=opportunity&mode=form&id=43b09e88c3b8289cb4cbf63b402f46c5&tab=core&_cview=1

“Binary Transformation (TA-1) systems will transform Applications to Defend (ATDs) into variants with diverse binary structures. The Cyber Fault Tolerant Architecture (TA-2) will run multiple variants in parallel and compare their behaviors regularly. The variants should behave differently when attacked. The system will react to attacks by restarting with new variants.”

SafeWare

https://www.fbo.gov/index?s=opportunity&mode=form&id=a303af332a90b1e84fdb91d7dd382396&tab=core&_cview=0

“The goal of the SafeWare research effort is to drive fundamental advances in the theory of program obfuscation and to develop highly efficient and widely applicable program obfuscation methods with mathematically proven security properties.”

STAC

https://www.fbo.gov/index?s=opportunity&mode=form&id=236fa8377e49acdfd31cd470e0fbdf8c&tab=core&_cview=1

“STAC is concerned with these vulnerabilities inherent in algorithms – specifically, vulnerabilities that stem from the algorithms’ space and time resource usage. Some of these vulnerabilities enable adversaries to mount algorithmic complexity attacks. Others enable adversaries to mount side channel attacks.”