Research
Skip Research Menus
Research MenuSecurity Enhanced Linux What's New Frequently Asked Questions Background Documents License Download Participating Mail List Archives Remaining Work Contributors Related Work Press Releases Information Assurance Research NIARL In-house Research Areas Mathematical Sciences Program Sabbaticals Computer & Information Sciences Research Technology Transfer Advanced Computing Advanced Mathematics Communications & Networking Information Processing Microelectronics Other Technologies Technology Fact Sheets Publications Related Links
NIARL Questions/Comments
Contact Us : |
NIARL In-house Research AreasThe National Information Assurance Research Laboratory (NIARL) conducts in-house research in these focus areas: CryptographyOur challenge is to create practical and secure cryptographic algorithms, architectures, and infrastructures. Unlike other security disciplines that design mechanisms to protect against today's technology, our Cryptographers design cryptographic algorithms to protect against technology that will exist far into the future. Cryptographic Infrastructure and StandardsThis focus area supports security standards for information systems. We lead and influence the development of cryptographic standards to satisfy current and anticipated customer requirements. Additionally, this focus area tackles the challenges inherent in designing and developing a future public key infrastructure (PKI) rigorous enough to support the most sensitive missions. Core elements include dynamic management of groups and group membership as well as the cryptography necessary to protect the distribution of cryptovariables. With both our cryptographic security standards and PKI efforts, we collaborate extensively with external subject matter experts, with other organizations within the Federal Government, and with our Allies. High-confidence Software and Systems (HCSS)One of the biggest challenges facing our Nation is the integrity of the software on which our society depends. Our HCSS focus area concentrates on techniques to be implemented early in the life cycle which ensure correctness and integrity. AuthenticationThe globally-distributed enterprises of tomorrow assume the trustworthiness of each actor, device, service, and datum in the network. This focus area develops rigorous techniques for authenticating attributes, such as identity or location, of those constituents by integrating protocol design with intimate knowledge of hardware. High-Speed Security SolutionsThe high-speed team focuses on the engineering challenges inherent in securing high-bandwidth networks. Research tracks are in high-speed electronics, optical networking technologies, and the developing area of photonic logic research. Secure Wireless MultimediaThe Secure Wireless Multimedia focus area's research goal is to enable end-to-end secure multimedia communications for mobile users. Technical SecurityThis focus area addresses avenues for protecting information in the physical domain. We exploit our deep insight into materials and signal propagation to ensure no unencrypted information ever leaks out of our systems. Network DynamicsThis group develops the theoretical basis for models of network behavior. Our ability to detect anomalous activity rests on a clear understanding of what is normal. Secure Network ManagementThis focus area develops the specific mechanisms and middleware infrastructure necessary to safely harness distributed computing resources across heterogeneous networks. The current trend is to expand traditional client/server models to include distributed objects and mobile agents, as well as grid computing and peer-to-peer models in ad hoc network environments. Secure Operating SystemsA secure operating system allows separation of information domains, confinement of processes, data integrity, and guaranteed invocation of processes. It can also prevent buffer overflow attacks and computer viruses from doing damage. Through SELinux, we demonstrate how to achieve these goals. Privilege ManagementBoth the Intelligence Community and DoD need to be able to share information and collaborate situationally and selectively. This focus area explores new access control mechanisms which can help, such as trusted labeling, and virtual isolation and containment. Attack, Sensing, Warning, and ResponseThis focus area seeks to increase the ability of the U.S. to defend its critical networks through detection and response. Our research includes development of effective methods for detecting and responding to cyber attacks including: intrusion detection systems, malicious code detection, attack attribution (also known as traceback), visualization, data reduction and analysis, and alert correlation. Research IntegrationOur Research Integration group creates proof-of-concept implementations which demonstrate new functionality and security to our customers in a concrete form. |
|
Date Posted: Jan 15, 2009 | Last Modified: Jan 15, 2009 | Last Reviewed: Jan 15, 2009 |