Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The…

An artist’s representation of a hole etched into alternating layers of silicon oxide and silicon nitride using plasma, which is used to make 3D NAND flash memory. Researchers want to refine how they make these holes so each one is deep, narrow and vertical, with smooth sides. (Image credit: Kyle Palmer / PPPL Communications Department)

Improving the Way Flash Memory Is Made

To store ever more data in electronic devices of the same size, the manufacturing processes for these devices need to…

program-red-c-logo

Watch Out for the Bus!

In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks…

blue circuit lines

Joint Publications Focus on Mitigation Strategies for Edge Devices

FORT MEADE, MD – The National Security Agency (NSA) has joined the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s…

Lantern: An Interactive Adversarial AI Workbench

Lantern, an innovative adversarial artificial intelligence (AI) workbench with unique features, is presented in this article. Lantern allows users to evaluate adversarial attacks quickly and interactively against artificial intelligence (AI) systems to protect them better.

Exploiting Alpha Transparency in Images to Manipulate AI Recommender Systems

This article examines the vulnerability of artificial intelligence (AI) systems to alpha transparency attacks through a simulated cyber tabletop scenario. The research demonstrates how manipulated images with hidden content in alpha layers can exploit the discrepancy between human and machine perception and compromise various AI-driven technologies from social media algorithms to critical infrastructure analysis.

Implementing Cybersecurity Solutions for Space Network Protection

This article focuses on improving the security of space networks by using multiple layers of protection to guard against cyberthreats and ensure the systems remain strong and reliable. It highlights the need for new encryption methods for smaller satellites, which have limited hardware capabilities, to keep their data safe. The study emphasizes the defense-in-depth model, which involves using several independent security measures to protect against different types of attacks.

A Quantum Good Authentication Protocol

This article presents a novel network protocol that incorporates a quantum photonic channel for symmetric key distribution, a Dilithium signature to replace factor-based public key cryptography for enhanced authentication, security, and privacy. The protocol uses strong hash functions to hash original messages and verify heightened data integrity at the destination.

Quantum Machine Learning as a Future Battlefield Multiplier

Today’s battlefield includes all types of equipment, manned and unmanned. However, in the future, battles will be relatively quiet, yet lightning fast in operations and outcomes. For example, in a remote training site, the U.S. Army is practicing the use of newly developed quantum machine-learning (QML)-enabled aerial and ground manned/unmanned systems. The form factor for the QML has decreased by orders of magnitude such that QML algorithms execute on micropayloads hosted on hypersonic platforms. Since opposing forces have similar capabilities, the goal is to deplete each other’s combat power in nanoseconds. Spread over thousands of kilometers in all directions, the QML-driven battle ends in less than five minutes, leaving thousands of drones and robotic vehicles with multiple multiprocessors decimated and neutralized.

city with cloud computing icon over it

CISA Publishes Microsoft Expanded Cloud Log Implementation Playbook

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), in close coordination with the Office of Management and Budget (OMB),…

The Standalone On-the-Move Advanced Relay (SOAR) program is designing a 5G cellular system that can be installed in a drone to provide network capabilities for military units or first responders.

Nimble Cellular Networks Keep Tactical Users Connected

The Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, is contributing to the development of a prototype miniaturized cellular…

robot and worker

Secure by Demand: Priority Considerations for Operational Technology Owners and Operators When Selecting Digital Products

This guide is intended to help owners and operators procure operational technology (OT) products, particularly industrial automation and control system…