Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
digital airplane superimposed over conference meeting

Supporting International Partners in Aviation Cybersecurity

As companies worldwide switch from analog to automated digital industrial control systems, malicious cyber actors are finding new opportunities for…

data center at NREL

Reducing Data Center Peak Cooling Demand and Energy Costs With Underground Thermal Energy Storage

As the demand for U.S. data centers grows with the expansion of artificial intelligence, Cloud services, and big data analytics,…

abstract ai head with colorful circuit lines

Training Synthetic AI Agents to Work (Well) With Humans

Synthetic entities in military simulations often fall short of expectations. They rely on rule-based or reactive computational models, which are…

Spanning eight rows and occupying the space of two professional basketball courts, Aurora is one of the largest supercomputer installations to date. (Image by Argonne National Laboratory.)

Argonne Releases Aurora Exascale Supercomputer to Researchers, Enabling Accelerated Science

The U.S. Department of Energy’s (DOE’s) Argonne National Laboratory has released its Aurora exascale supercomputer to researchers across the world,…

CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The…

An artist’s representation of a hole etched into alternating layers of silicon oxide and silicon nitride using plasma, which is used to make 3D NAND flash memory. Researchers want to refine how they make these holes so each one is deep, narrow and vertical, with smooth sides. (Image credit: Kyle Palmer / PPPL Communications Department)

Improving the Way Flash Memory Is Made

To store ever more data in electronic devices of the same size, the manufacturing processes for these devices need to…

program-red-c-logo

Watch Out for the Bus!

In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks…

blue circuit lines

Joint Publications Focus on Mitigation Strategies for Edge Devices

FORT MEADE, MD – The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s…

Lantern: An Interactive Adversarial AI Workbench

Lantern, an innovative adversarial artificial intelligence (AI) workbench with unique features, is presented in this article. Lantern allows users to evaluate adversarial attacks quickly and interactively against artificial intelligence (AI) systems to protect them better.

Exploiting Alpha Transparency in Images to Manipulate AI Recommender Systems

This article examines the vulnerability of artificial intelligence (AI) systems to alpha transparency attacks through a simulated cyber tabletop scenario. The research demonstrates how manipulated images with hidden content in alpha layers can exploit the discrepancy between human and machine perception and compromise various AI-driven technologies from social media algorithms to critical infrastructure analysis.

Implementing Cybersecurity Solutions for Space Network Protection

This article focuses on improving the security of space networks by using multiple layers of protection to guard against cyberthreats and ensure the systems remain strong and reliable. It highlights the need for new encryption methods for smaller satellites, which have limited hardware capabilities, to keep their data safe. The study emphasizes the defense-in-depth model, which involves using several independent security measures to protect against different types of attacks.

A Quantum Good Authentication Protocol

This article presents a novel network protocol that incorporates a quantum photonic channel for symmetric key distribution, a Dilithium signature to replace factor-based public key cryptography for enhanced authentication, security, and privacy. The protocol uses strong hash functions to hash original messages and verify heightened data integrity at the destination.