Defense Advanced Research Projects Agency (DARPA)’s Post

Calling all researchers and engineers interested in scaling your impact using formal methods. 🚨 Registration is now open for a free “summer school” on Universally Composable (UC) formal methods, co-hosted by Riverside Research as part of our Hardening Development Toolchains Against Emergent Execution Engines (HARDEN) program. Taking place Aug. 11–14 at Boston University and virtually, this learning opportunity is designed to help attendees explore how formal methods can dramatically improve software system resilience against cyber threats—both in theory and real-world practice. Learn more and access the registration link: https://lnkd.in/eFgsw4SU 🎯 Seating is limited so register early! For more information on how DARPA is reimagining the future of software cybersecurity: https://lnkd.in/eZhVX3t5 For more on HARDEN: https://lnkd.in/eacitAER #formalmethods #cyberresilience #softwaresecurity #DARPA #HARDEN #research #engineering #resilientsoftware

  • No alternative text description for this image
Antonio Pereira

Systems Doctrine Architect | Author of Antonio Systems Vault | IP Strategist in Tactical Autonomy, Diagnostics & Resilience | Seeking DoD SBIR/STTR Collaborations for Unmanned Sovereignty

2d

Sounds intriguing!

Like
Reply

Let's do this team. LEGO Education

Like
Reply
Brad N.

Founder, ANN | Strategic Influence Architect | Clarity for the Coerced | We don’t go viral. We go visceral

2d

If you’re serious about system resilience, it’s not just about how you build — it’s about how you’re mapped. DARPA’s work on formal methods is critical. But behavioral traceability is the new attack surface. We dropped this recently: 🔐 OPSEC HARDENING TTPs v1.0 – 30+ behavioral defense techniques – AI-auditable exposure prompts – DNS, device, and routine-level risk surfaces → https://www.linkedin.com/posts/activity-7346945974902116352-htAe?utm_source=share&utm_medium=member_ios&rcm=ACoAABQcth0BW9Tnp9kd8cHl9e9ItO70g8kIwZg Because no matter how resilient your codebase is — if your analyst habits are predictable, the adversary doesn’t need to breach the system. They just need to profile the human.

Like
Reply
Jason Titlow

Marine Corps forged // Former Murray’s Discount Auto Parts Cashier-Floor Associate // I just woke up. What’s AI?

2d

Interesting

Like
Reply
James M Chandley Jr

Founder @ Nikola 2.0 | Patent Pending Wireless Energy System | Phone Charging, EV, and Long-Range Power Tech

2d

I’m developing a next generation wireless energy transmission system that relies on rigorous formal methods for safety and scalability. I’d welcome a conversation with DARPA teams exploring energy-infrastructure innovation at scale.

Like
Reply
José Morales Escalante, PhD

Assistant Professor, Departments of Mathematics and Physics & Astronomy at The University of Texas at San Antonio

1d
Like
Reply
Daniel Roa

Student at RMIT University

1d

Wen consent wen doing experiments on humans?

Like
Reply
Manuel W. Lloyd, ITIL®

Inventor of GECaBi®, Architect of InterOpsis™, and Author of the Cybersecurity Constitution™

1d

Formal methods are essential — but insufficient. HARDEN is proving security within toolchains. InterOpsis™ governs the entire terrain. Code-level integrity means nothing without doctrine-level command. That’s why we built Zero Doctrine™ — to move beyond security “by design” into security by enforcement. I won’t be attending, but I’m watching closely. Looks promising Defense Advanced Research Projects Agency (DARPA) #ZeroDoctrine #TrustNet #InterOpsis #CyberSovereignty #FormalMethods #HARDEN #DARPA

Like
Reply
See more comments

To view or add a comment, sign in

Explore topics