New Projects
In January 2011, the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) Cyber Security Division (CSD) announced a Broad Agency Announcement (BAA) 11-02 seeking proposals for DHS S&T Cybersecurity BAA 11-02 in fourteen (14) technical topic areas aimed at improving security in both federal networks and the larger Internet, and developing new and enhanced technologies for the detection of, prevention of, and response to cyber attacks on the nation’s critical information infrastructure.
BAA 11-02 elicited white paper responses from more than 1,000 offerors; after an extensive review and down-select process more than 200 offerors were invited to submit full proposals for a final review and of those, new awards have been made to 34 organizations. Many of the awards involve several organizations teamed to conduct the planned research. These organizations will conduct cyber security research and developments that result in knowledge products and deployable security solutions that advance understanding of cyber risks, as directed by the President in the National Strategy to Secure Cyberspace.
The BAA 11-02 awards also currently includes four internationally co-funded projects, two each with the United Kingdom and Australia; negotiations are currently in process with Canada, Sweden and The Netherlands for co-funding of additional CSD BAA 11-02 funded projects.The first PI Meeting was held October 9-11, 2012.
The organizations are:
Lead Organization |
Project Name |
Applied Visions, Inc |
Code Fox: Software Assurance Visual Analytics for Dynamic Analysis of Code |
HRL Laboratories, LLC |
Tunable Information Flow |
Kestrel Technology, LLC |
A “Gold Standard” Method for Benchmarking C Source Code Static Analysis tools |
TTA 2 – Enterprise-Level Security Metrics
Lead Organization |
Project Name |
George Mason University |
Measuring Enterprise Risk Through Automated Security Testing |
University of Illinois at Urbana-Champaign |
A Tool for Compliance and Depth of Defense Metrics |
TTA 3 – Usable Security
Lead Organization |
Project Name |
IBM Research |
Usable Multi-Factor Authentication and Risk-Based Authorization |
Trustees of Indiana University |
CUTS: Coordinating User and Technical Security |
TTA 4 – Insider Threat
Lead Organization |
Project Name |
Naval Postgraduate School |
Detecting Threatening Insiders with Lightweight Media Forensics |
TTA 5 – Resilient Systems and Networks
Lead Organization |
Project Name |
Naval Postgraduate School |
Methodology for Assessment of Security Properties |
Raytheon BBN Technologies |
Real-time Protocol Shepherds (RePS) |
Lead Organization |
Project Name |
Columbia Unversity |
Advanced Situation Awareness of High Impact Malware Attacks Against the Internet Routing Infrastructure |
Georgia Tech Research Corp. |
Comprehensive Understanding of Malicious Overlay Networks |
Oak Ridge National Laboratory |
Visually Fusing Contextual Data for Situational Understanding |
Lead Organization |
Project Name |
International Computer Science Institute |
Netalyzr NG: Monitoring DNS, DNSSEC, and TLS from the Edge |
Merit Network Inc. |
Enabling Operational Use of RPKI via Internet Routing Registries |
Naval Postgraduate School |
High-Frequency Active Internet Topology Mapping |
University of California, San Diego |
Cartographic Capabilities for Critical Cyberinfrastructure |
TTA 8 – Incident Response Communities
Lead Organization |
Project Name |
Trustees of Dartmouth College |
Improving CSIRT Skills, Dynamics and Effectiveness |
Lead Organization |
Project Name |
University of Maryland |
Reducing the Challenges to Making Cybersecurity Investments in the Private Sector |
Carnegie-Mellon University |
Understanding and Disrupting the Economics of Cybercrime |
Lead Organization |
Project Name |
ITT Advanced Engineering & Sciences Division |
Evidentiary Integrity for Incident Response |
The University of Alabama at Birmingham |
Secure Location Provenance for Mobile Devices |
The University of North Carolina at Chapel Hill |
Efficient Tracking, Logging, and Blocking of Accesses to Digital Objects |
TTA 11 – Hardware-Enabled Trust
Lead Organization |
Project Name |
Def-Logix |
Hardware Enabled Zero-Day Protection (HEZDP) |
IBM Research |
Hardware Support for Malware Defense and End-to-End Trust |
Lead Organization |
Project Name |
Northrop Grumman Information Systems |
Appliance for Active Repositioning in Cyberspace (AARC) |
The Trustees of Princeton University |
Using Moving Target Defense for Secure Hardware Design |
Lead Organization |
Project Name |
Pacific NW National Laboratory
|
LINEBACKER: LINE-speed Bio-inspired Analysis and Characterization for Event Recognition |
Rutgers University – New Brunswick Campus |
Bio-Inspired Distributed Decision Algorithms for Anomaly Detection |
Lead Organization |
Project Name |
Morgridge Institute for Research |
Continuous Software Assurance through a National Marketplace |