Research
Skip Research Menus
Research MenuThe Next Wave (TNW) About Subscribe to TNW Archive Security Enhanced Linux What's New Frequently Asked Questions Background Documents License Download Participating Mail List Remaining Work Contributors Related Work Press Releases Information Assurance Research NIARL In-house Research Areas Mathematical Sciences Program Sabbaticals Computer & Information Sciences Research Technology Transfer Advanced Computing Advanced Mathematics Communications & Networking Information Processing Microelectronics Other Technologies Technology Fact Sheets Publications Related Links
NIARL Questions/Comments
Contact Us : |
NIARL In-house Research AreasThe National Information Assurance Research Laboratory (NIARL) conducts in-house research in these focus areas: CryptographyOur challenge is to create practical and secure cryptographic algorithms, architectures, and infrastructures. Unlike other security disciplines that design mechanisms to protect against today's technology, our Cryptographers design cryptographic algorithms to protect against technology that will exist far into the future. Cryptographic Infrastructure and StandardsThis focus area supports security standards for information systems. We lead and influence the development of cryptographic standards to satisfy current and anticipated customer requirements. Additionally, this focus area tackles the challenges inherent in designing and developing a future public key infrastructure (PKI) rigorous enough to support the most sensitive missions. Core elements include dynamic management of groups and group membership as well as the cryptography necessary to protect the distribution of cryptovariables. With both our cryptographic security standards and PKI efforts, we collaborate extensively with external subject matter experts, with other organizations within the Federal Government, and with our Allies. High-confidence Software and Systems (HCSS)One of the biggest challenges facing our Nation is the integrity of the software on which our society depends. Our HCSS focus area concentrates on techniques to be implemented early in the life cycle which ensure correctness and integrity. AuthenticationThe globally-distributed enterprises of tomorrow assume the trustworthiness of each actor, device, service, and datum in the network. This focus area develops rigorous techniques for authenticating attributes, such as identity or location, of those constituents by integrating protocol design with intimate knowledge of hardware. High-Speed Security SolutionsThe high-speed team focuses on the engineering challenges inherent in securing high-bandwidth networks. Research tracks are in high-speed electronics, optical networking technologies, and the developing area of photonic logic research. Secure Wireless MultimediaThe Secure Wireless Multimedia focus area's research goal is to enable end-to-end secure multimedia communications for mobile users. Technical SecurityThis focus area addresses avenues for protecting information in the physical domain. We exploit our deep insight into materials and signal propagation to ensure no unencrypted information ever leaks out of our systems. Attack, Sensing, Warning, and ResponseThis focus area seeks to increase the ability of the U.S. to defend its critical networks through detection and response. Our research includes development of effective methods for detecting and responding to cyber attacks including: intrusion detection systems, malicious code detection, attack attribution (also known as traceback), visualization, data reduction and analysis, and alert correlation. Research IntegrationOur Research Integration group creates proof-of-concept implementations which demonstrate new functionality and security to our customers in a concrete form. Trusted ComputingBoth the Intelligence Community and DoD need to be able to share information and collaborate situationally and selectively. This team explores new access control mechanisms which can help, such as trusted labeling and virtual isolation and containment. |
|
Date Posted: Jan 15, 2009 | Last Modified: Mar 15, 2011 | Last Reviewed: Mar 15, 2011 |