Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities
Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The…
To store ever more data in electronic devices of the same size, the manufacturing processes for these devices need to…
In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks…
FORT MEADE, MD – The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s…
Lantern, an innovative adversarial artificial intelligence (AI) workbench with unique features, is presented in this article. Lantern allows users to evaluate adversarial attacks quickly and interactively against artificial intelligence (AI) systems to protect them better.
This article examines the vulnerability of artificial intelligence (AI) systems to alpha transparency attacks through a simulated cyber tabletop scenario. The research demonstrates how manipulated images with hidden content in alpha layers can exploit the discrepancy between human and machine perception and compromise various AI-driven technologies from social media algorithms to critical infrastructure analysis.
This article focuses on improving the security of space networks by using multiple layers of protection to guard against cyberthreats and ensure the systems remain strong and reliable. It highlights the need for new encryption methods for smaller satellites, which have limited hardware capabilities, to keep their data safe. The study emphasizes the defense-in-depth model, which involves using several independent security measures to protect against different types of attacks.
This article presents a novel network protocol that incorporates a quantum photonic channel for symmetric key distribution, a Dilithium signature to replace factor-based public key cryptography for enhanced authentication, security, and privacy. The protocol uses strong hash functions to hash original messages and verify heightened data integrity at the destination.
Today’s battlefield includes all types of equipment, manned and unmanned. However, in the future, battles will be relatively quiet, yet lightning fast in operations and outcomes. For example, in a remote training site, the U.S. Army is practicing the use of newly developed quantum machine-learning (QML)-enabled aerial and ground manned/unmanned systems. The form factor for the QML has decreased by orders of magnitude such that QML algorithms execute on micropayloads hosted on hypersonic platforms. Since opposing forces have similar capabilities, the goal is to deplete each other’s combat power in nanoseconds. Spread over thousands of kilometers in all directions, the QML-driven battle ends in less than five minutes, leaving thousands of drones and robotic vehicles with multiple multiprocessors decimated and neutralized.
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), in close coordination with the Office of Management and Budget (OMB),…
The Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, is contributing to the development of a prototype miniaturized cellular…
This guide is intended to help owners and operators procure operational technology (OT) products, particularly industrial automation and control system…