CYBER SECURITY

Novel, intelligent solutions for cyber defense

We are committed to developing novel, intelligent solutions for cyber defense. These solutions are as varied as the breadth of our core IP, from applying our AI algorithms to find security breaches, to designing out vulnerabilities from the start, to developing intelligent adaptive training with augmented and virtual reality.

CARES

CARES helps designers and cyber analysts build cybersecurity into components for Navy systems. Our CARES approach provides risk assessment and cyberattack mitigations for systems early in the design stage. This cost-effective and reliable solution helps designers and cyber analysts better equip Navy systems with cybersecurity before they are deployed.

LEARN MORE >

CARES

CARES helps designers and cyber analysts build cybersecurity into components for Navy systems. Our CARES approach provides risk assessment and cyberattack mitigations for systems early in the design stage. This cost-effective and reliable solution helps designers and cyber analysts better equip Navy systems with cybersecurity before they are deployed.

LEARN MORE >

FEATS

FEATS is a framework to  analyze sensor-related data and assess the trustworthiness of sensors within a sensor network. FEATS allows a sensor network analyst to track the trustworthiness of sensors without the need for any dedicated diagnostic channels.

LEARN MORE >

CYMOD

CyMod™, a cyber modeling and reactive agent framework,  provides a tool for integrating intelligent cyber adversaries into simulation environments. CyMod enables cyber defenders to quickly and easily perform cyber wargaming to predict likely attack vectors and prepare proactive defenses against these attacks.

LEARN MORE >

Image from CYMOD project from Charles River Analytics

CYMOD

CyMod™, a cyber modeling and reactive agent framework,  provides a tool for integrating intelligent cyber adversaries into simulation environments. CyMod enables cyber defenders to quickly and easily perform cyber wargaming to predict likely attack vectors and prepare proactive defenses against these attacks.

LEARN MORE >

Simulated image from Charles River Analytics project FEATS.

FEATS

FEATS is a framework to  analyze sensor-related data and assess the trustworthiness of sensors within a sensor network. FEATS allows a sensor network analyst to track the trustworthiness of sensors without the need for any dedicated diagnostic channels.

LEARN MORE >

FALCHION

Our framework, Fuzzing Automatically to Locate Compromised Hardware with Isolation to Omit Noise (FALCHION), can detect a wide range of different hardware Trojans, with a current focus on Peripheral Component Interconnect Express-based devices.

LEARN MORE >

Image of chess pieces and circuit board, illustration for Charles River Analytics SHEATH project.

FALCHION

Our framework, Fuzzing Automatically to Locate Compromised Hardware with Isolation to Omit Noise (FALCHION), can detect a wide range of different hardware Trojans, with a current focus on Peripheral Component Interconnect Express-based devices.

LEARN MORE >

MAAGI

As part of DARPA’s Cyber Genome program, Charles River developed MAAGI (Malware Analysis and Attribution using Genetic Information). In its current version, MAAGI combines ideas and techniques from biological evolution, reverse engineering of computer programs, and linguistics to rapidly identify the source and intent of new malware attacks.

LEARN MORE >

Image of soldiers using MAAGI product.

MAAGI

As part of DARPA’s Cyber Genome program, Charles River developed MAAGI (Malware Analysis and Attribution using Genetic Information). In its current version, MAAGI combines ideas and techniques from biological evolution, reverse engineering of computer programs, and linguistics to rapidly identify the source and intent of new malware attacks. .

LEARN MORE >

HAMLET

The US military uses countless IT devices that are often built abroad from multiple components with limited oversight, and then shipped to the US. This supply chain can provide multiple opportunities for enemies to insert hidden malicious software. 

HAMLET applies sophisticated linguistic grammars to cybersecurity to ensure that military devices, such as printers and routers, are safe. 

LEARN MORE >

Simulated image of Cyber Risk Reduction per unit cost from Charles River HAMLET project.

HAMLET

The US military uses countless IT devices that are often built abroad from multiple components with limited oversight, and then shipped to the US. This supply chain can provide multiple opportunities for enemies to insert hidden malicious software. 

HAMLET applies sophisticated linguistic grammars to cybersecurity to ensure that military devices, such as printers and routers, are safe.

LEARN MORE >

CSFV

We developed a resource allocation model that uses market-based optimization to manage the delivery of software verification tasks to individual participants in the crowdsourcing system.

LEARN MORE >

Simulated image from CSFV Verigames Project from Charles River Analytics

CSFV

We developed a resource allocation model that uses market-based optimization to manage the delivery of software verification tasks to individual participants in the crowdsourcing system.

LEARN MORE >

TAMBA

We partnered with Galois, Inc. to integrate our probabilistic modeling expertise into the Defense Advanced Research Projects Agency’s Brandeis program, which “seeks to develop the technical means to protect the private and proprietary information of individuals and enterprises.” Our TAMBA team developed technology to evaluate the effectiveness of privacy-aware systems. 

LEARN MORE >

Simulated image of lock with binary code, Charles River Analytics project TAMBA.

TAMBA

We partnered with Galois, Inc. to integrate our probabilistic modeling expertise into the Defense Advanced Research Projects Agency’s Brandeis program, which “seeks to develop the technical means to protect the private and proprietary information of individuals and enterprises.” Our TAMBA team developed technology to evaluate the effectiveness of privacy-aware systems. 

LEARN MORE >

Our passion for science and engineering drives us to find impactful, actionable solutions.