CYBERSECURITY

We are committed to developing novel, intelligent solutions for cyber defense. These solutions are as varied as the breadth of our core IP, from applying our AI algorithms to find security breaches, to designing out vulnerabilities from the start, to developing intelligent adaptive training with augmented and virtual reality.

CYMOD

CyMod™, a cyber modeling and reactive agent framework that provides a tool for integrating intelligent cyber adversaries into simulation environments. CyMod enables cyber defenders to quickly and easily perform cyber wargaming to predict likely attack vectors and prepare proactive defenses against these attacks.

LEARN MORE >

Image of soldiers using Charles River Analytics CYMOD project.

CYMOD

Immersive and adaptive mixed reality (MR), virtual reality (VR), and augmented reality (AR) training maximizes transfer of skills through ecological mapping of real-world scenarios to computer generated training scenarios, reducing training equipment, development, execution, and maintenance costs. We provide custom MR/VR/AR training experiences that can be tailored to individual trainees to maximize skill improvement and retention, while leveraging best-in-breed COTS components to reduce deployment costs and training restrictions.

 

LEARN MORE >

FEATS

A Framework to Ensure and Assess Trustworthiness in Sensor systems, to analyze sensor-related data and assess the trustworthiness of sensors within a sensor network. FEATS allows a sensor network analyst to track the trustworthiness of sensors without the need for any dedicated diagnostic channels.

LEARN MORE >

Simulated image from Charles River Analytics project FEATS.

FEATS

AFramework to Ensure and Assess Trustworthiness in Sensor systems, to analyze sensor-related data and assess the trustworthiness of sensors within a sensor network. FEATS allows a sensor network analyst to track the trustworthiness of sensors without the need for any dedicated diagnostic channels.

LEARN MORE >

CARES

CARES helps designers and cyber analysts build cybersecurity into components for Navy systems. Our CARES approach provides risk assessment and cyberattack mitigations for systems early in the design stage. This cost-effective and reliable solution helps designers and cyber analysts better equip Navy systems with cybersecurity before they are deployed.

LEARN MORE >

Image of soldiers using MAAGI product.

CARES

CARES helps designers and cyber analysts build cybersecurity into components for Navy systems. Our CARES approach provides risk assessment and cyberattack mitigations for systems early in the design stage. This cost-effective and reliable solution helps designers and cyber analysts better equip Navy systems with cybersecurity before they are deployed.

LEARN MORE >

FALCHION

Our framework, Fuzzing Automatically to Locate Compromised Hardware with Isolation to Omit Noise (FALCHION), can detect a wide range of different hardware Trojans, with a current focus on Peripheral Component Interconnect Express-based devices.

LEARN MORE >

Image of chess pieces and circuit board, illustration for Charles River Analytics SHEATH project.

FALCHION

Our framework, Fuzzing Automatically to Locate Compromised Hardware with Isolation to Omit Noise (FALCHION), can detect a wide range of different hardware Trojans, with a current focus on Peripheral Component Interconnect Express-based devices.

LEARN MORE >

MAAGI

As part of the Cyber Genome program, Charles River developed and is refining MAAGI (Malware Analysis and Attribution using Genetic Information). In its current version, MAAGI combines ideas and techniques from biological evolution, reverse engineering of computer programs, and linguistics to rapidly identify the source and intent of new malware attacks.

LEARN MORE >

Image of soldiers using MAAGI product.

MAAGI

As part of the Cyber Genome program, Charles River developed and is refining MAAGI (Malware Analysis and Attribution using Genetic Information). In its current version, MAAGI combines ideas and techniques from biological evolution, reverse engineering of computer programs, and linguistics to rapidly identify the source and intent of new malware attacks. .

LEARN MORE >

HAMLET

The US military uses countless IT devices that are often built abroad from multiple components with limited oversight, and then shipped to the US. This supply chain can provide multiple opportunities for enemies to insert hidden malicious software. 

HAMLET applies sophisticated linguistic grammars to cybersecurity to ensure that military devices, such as printers and routers, are safe. 

LEARN MORE >

Simulated image of Cyber Risk Reduction per unit cost from Charles River HAMLET project.

HAMLET

The US military uses countless IT devices that are often built abroad from multiple components with limited oversight, and then shipped to the US. This supply chain can provide multiple opportunities for enemies to insert hidden malicious software. 

HAMLET applies sophisticated linguistic grammars to cybersecurity to ensure that military devices, such as printers and routers, are safe.

LEARN MORE >

CSFV

We developed a resource allocation model that used market-based optimization to manage the delivery of verification tasks to individual participants in the crowdsourcing system. Next, we applied computational analytics and expert evaluations to determine how CSFV games could be improved to increase participation.

LEARN MORE >

Simulated image from CSFV Verigames Project from Charles River Analytics

CSFV

We developed a resource allocation model that used market-based optimization to manage the delivery of verification tasks to individual participants in the crowdsourcing system. Next, we applied computational analytics and expert evaluations to determine how CSFV games could be improved to increase participation.

LEARN MORE >

TAMBA

Partnered with Galois, Inc. to integrate our probabilistic modeling expertise into the Defense Advanced Research Projects Agency’s Brandeis program. Under the Brandeis program—which “seeks to develop the technical means to protect the private and proprietary information of individuals and enterprises”—the Galois-led TAMBA team developed technology to evaluate the effectiveness of privacy-aware systems.

LEARN MORE >

Simulated image of lock with binary code, Charles River Analytics project TAMBA.

TAMBA

Partnered with Galois, Inc. to integrate our probabilistic modeling expertise into the Defense Advanced Research Projects Agency’s Brandeis program. Under the Brandeis program—which “seeks to develop the technical means to protect the private and proprietary information of individuals and enterprises”—the Galois-led TAMBA team developed technology to evaluate the effectiveness of privacy-aware systems.

LEARN MORE >

Our passion for science and engineering drives us to find impactful, actionable solutions.