Home / Cybersecurity / DARPA Aims to Accelerate Zero-Day Threat Detection Via Computer-Human Collaboration Tech Program

DARPA Aims to Accelerate Zero-Day Threat Detection Via Computer-Human Collaboration Tech Program

DARPA image

The Defense Advanced Research Projects Agency has launched a 42-month program that aims to develop new platforms designed to speed up the detection of zero-day vulnerabilities through computer-human collaboration.

The Computers and Humans Exploring Software Security program will deal with five technical areas and one of those areas will initially focus on effort to determine and analyze the process used by hackers to reason over source code and other software artifacts, DARPA said Wednesday.

The second technical area of the CHESS program aims to develop technology platforms that work to patch vulnerabilities in compiled binaries and source code, while the two succeeding areas will focus on the development of evaluation and testing criteria for the collaborative computer-human platforms.

The fifth technical area will focus on integration with plans to move the platform to commercial and government partners.

“Through CHESS, we’re looking to gather, understand and convert the expertise of human hackers into automated analysis techniques that are more accessible to a broader range of technologists,” said Dustin Fraze, CHESS program manager at DARPA’s information innovation office.

DARPA will hold a proposers day Thursday, April 19, in Arlington, Virginia.

Check Also

Bindu Nair: Pentagon Aims to Accelerate Basic Research’s Impact on Capabilities Through Pilot Program

Bindu Nair, deputy director for basic research at the Defense Department, told Federal News Network in an interview published Thursday that DoD intends to speed up basic research’s impact on capabilities through the Defense Enterprise Science Initiative. The Pentagon selected five university-industry teams in August for the DESI pilot program that seeks to address technological gaps and support other basic research initiatives within the department.

Leave a Reply

Your email address will not be published. Required fields are marked *