You are now leaving the DARPA.mil website that is under the control and management of DARPA. The appearance of hyperlinks does not constitute endorsement by DARPA of non-U.S. Government sites or the information, products, or services contained therein. Although DARPA may or may not use these sites as additional distribution channels for Department of Defense information, it does not exercise editorial control over all of the information that you may find at these locations. Such links are provided consistent with the stated purpose of this website.

After reading this message, click to continue immediately.

Go Back

/ Information Innovation Office (I2O)

Cyber Defense (CyberGenome)

The Cyber Defense Program is developing the core computing and networking technologies required to protect DoD's information, information infrastructure, and mission-critical information systems. This includes new cyber-forensic techniques to automate the discovery, identification, and characterization of malware variants and thereby accelerate the development of effective responses.

Program Complete

The content below has been generated by organizations that are partially funded by DARPA; the views and conclusions contained therein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of DARPA or the U.S. Government.

Report a problem: opencatalog@darpa.mil

Last updated: November 13, 2015

TeamProjectCategoryCodeDescriptionLicense
BAE Systems (publications), Apogee Research (publications), University of North Florida (publications), University of Michigan (publications) Introduction-Based Routing Networking, Reputation Management http://sourceforge.net/projects/introbasedrouting/ Introduction-Based Routing (IBR) is a method for dynamically opening and closing point-to-point virtual private networks (connections) to create a dynamic yet trustworthy network. Connections are created via introduction. The IBR Proxy Server software packet implements IBR. (Java) GPLv2
TeamTitleLink
Invincea Labs, George Mason University Visualization of Shared System Call Sequence Relationships in Large Malware Corpora
Invincea Labs, George Mason University Mining Web Technical Discussions to Identify Malware Capabilities
Invincea Labs, George Mason University Malware Similarity Identification Using Call Graph Based System Call Subsequence Features
Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions
Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University BitShred: Feature Hashing Malware for Scalable Triage and Semantic Analysis
Lockheed Martin-Advanced Technology Laboratories, Carnegie Mellon University Towards Automatic Software Lineage Inference
Raytheon BBN, Raytheon SI Government Solutions Inferring Accurate Histories of Malware Evolution from Structural Evidence
BAE Systems, Apogee Research, University of North Florida, University of Michigan On Trusting Introductions from a Reputable Source: A Utility-Maximizing Probabilistic Approach
BAE Systems, Apogee Research, University of North Florida, University of Michigan On Optimal Decisions in an Introduction-Based Reputation Protocol
BAE Systems, Apogee Research, University of North Florida, University of Michigan Analyzing Incentives for Protocol Compliance in Complex Domains: A Case Study of Introduction-Based Routing
BAE Systems, Apogee Research, University of North Florida, University of Michigan A Stochastic Model for Reputation Management in Introduction-Based Trust Systems
BAE Systems, Apogee Research, University of North Florida, University of Michigan Incentivizing Responsible Networking via Introduction-Based Routing

Software

Publications