Doing Business with DARPA



Similar documents
Request for Proposal Denver West Parkway Building 52, Suite 300 Golden, CO 80401

What is Really Needed to Secure the Internet of Things?

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Recruiting, Screening & Employee File Management

Mary Ellen Seale National Protection and Programs Directorate May 16, 2012

Start building a trusted environment now... (before it s too late) IT Decision Makers

Information Technology

MODEL REQUEST FOR PROPOSALS (RFP) TEMPLATE Generalized for professional services.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

DARPA BAA Defense Sciences Office (DSO) Office wide BAA Frequently Asked Questions (FAQs) as of 8/26/2015

Commercial Solutions Opening (CSO) Office of the Secretary of Defense Defense Innovation Unit (Experimental)

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

SBIR/STTR PHASE II-EXPANDED CONTRACTING HANDBOOK

Recruiting, Selection & HR File Management

Guidelines for Submitting Unsolicited Contract Proposals

Aerospace Software Engineering

A Brief Overview of the Review of the Individual Support Plan System For Comprehensive Services

RESEARCH CALL TO DOE/FEDERAL LABORATORIES. Cybersecurity for Energy Delivery Systems Research Call RC-CEDS-2015

Solicitation RFI-FTB-1415-SIEM Project. SIEM Project. Bid designation: Public. State of California

NetIQ Privileged User Manager

Solicitation Web Hosting Services for the Disaster Volunteer Network. State of California

CoreSHIELD Product Catalog

Using NetIQ's Implementation of NetFlow to Solve Customer's Problems Lecture Manual

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

SOLAR TRAINING AND EDUCATION FOR PROFESSIONALS FOA FOA Webinar DE-FOA /04/2015

Cloud Services and Business Process Outsourcing

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Rapid Cyber Remediation Response Management. Using the Game-Changing Capabilities from Project Remedies Inc.

Four Easy Lessons in Free Federal Market Research by Judy Bradt, CEO

Request for Proposals

Subject: Request for Information (RFI) Franchise Tax Board (FTB) Security Information and Event Management (SIEM) Project.

THOUSANDS OF APPS CAN'T BE WRONG: MOBILE APPLICATION ANALYSIS AT SCALE

Request for Proposal. Contract Management Software

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

Automation can dramatically increase product quality, leading to lower field service, product support and

PIERCE COUNTY LIBRARY SYSTEM. REQUEST FOR PROPOSAL (RFP) for. Telephone Service (Analog Phone Service)


How to Meet IT Mandates, Ensure Security and Achieve Cost Savings for Your Government Agency

Buying your first home?

REQUEST FOR PROPOSAL. Webbased Student with Student Safe Features

Java and Real Time Storage Applications

Performance Testing Uncovered

NSF Activities in Cyber Trust

Configuring and Managing Microsoft System Center Essentials 2010

Center For Private Security and Safety

Enterprise Scheduler Rev. 0 Bid # Scope of Work

Microsemi Security Center of Excellence

SIGNIFICANT CHANGES DOCUMENT

Developing Business with the Federal Government through the GSA Schedules Program

Cybersecurity Plan. Introduction. Roles and Responsibilities. Laboratory Executive Commitee (ExCom)

Bloomsburg University. Computer Science Assessment Report

CyberNEXS Global Services

ENGG*4420 Real Time Systems Design Fall 2015

Firewall Design Principles

Remember To Comment On BIS' New Cybersecurity Export Rule

Next Generation. Surveillance Solutions. Cware. The Advanced Video Management & NVR Platform

Solicitation Information February 26, 2016

Department of Labor Customer Service Plan Department of Labor. Customer Service Plan 2011

ITAR Compliance Best Practices Guide

Cisco PIX vs. Checkpoint Firewall

BM482E Introduction to Computer Security

PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

Continuing Education Larimer Campus

Contract Compliance and the Federal Acquisition Regulation (FAR)

A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1

C. HIRING PROCESS FOR FACULTY AND ACADEMIC PROFESSIONALS

Lessons Learned CIP Reliability Standards

CRYPTOGRAPHY IN NETWORK SECURITY

September 24, Mr. Hogan and Ms. Newton:

Certification Report

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Audit Management Software Solution

Enhance State IT Contract Expertise

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

NetIQ AppManager for Self Monitoring UNIX and Linux Servers (AMHealthUNIX) Management Guide

Washington County School District Request for Proposal School Bus Fleet Tracking System RFP #TD 1011

Virtual Platforms Addressing challenges in telecom product development

Cost Estimation Strategies COST ESTIMATION GUIDELINES

Cisco Integrated Services Routers Performance Overview

Cybersecurity at the Nexus of a Hyper- Connected World

Know Thy Friends. Revisiting white-list security where black lists fail

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

Getting software security Right

FAQS Veterans Preference

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Procedure Guide: Daily Use Cyber Recruiter 6.6 December 2007

Institute for Defense Analyses. Open Source Software in Government: Challenges and Opportunities David A. Wheeler (IDA) & Tom Dunn (GTRI)

Introduction to Automated Testing

MULTI-SOURCE RECORDING, PERFORMANCE EVALUATION, AND ANALYTICS FOR THE CONTACT CENTER

I m visualizing large datasets to generate

Introduction. 1.1 Motivation. Chapter 1

APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS

Protect Your Organization With the Certification That Maps to a Master s-level Education in Software Assurance

Concurrent Technologies Corporation (CTC) is an independent, nonprofit, applied scientific research and development professional services

Software Portfolio Analysis Does your Investment perform adequately? Mary Udeh

IT Security and Compliance Program Plan for Maxistar Medical Supplies Company

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Transcription:

Doing Business with DARPA Kathleen Fisher Program Manager Information Innovation Office (I2O)

Outline DARPA Today Personal Areas of Interest High Assurance Cyber Military Systems Program synthesis Domain-specific languages

A little about myself Kathleen Fisher Program Manager, Information Innovation Office (I2O) Kathleen.Fisher@darpa.mil 571-218-4435 (office) Background: Starting in graduate school, I have done basic research in a wide variety of programming language topics, with most of my career spent at AT&T Labs.

Disclaimer This talk offers general guidance. Any statement in a BAA or other official document overrides anything I say here.

DARPA by Analogy A reasonable approximation of DARPA: The management of DoD s corporate research laboratory Annual budget of $3B Focused on DoD relevant technology Think of the DoD as the largest enterprise in the USA If an IT problem exists, the DoD probably suffers from it Actual research gets outsourced to you!

Doing Business with DARPA DARPA funds mission-focused research to Solve a DoD problem Enable a new DoD capability DARPA wants the best ideas from the best people fully devoted to the project Fund diverse collection of performers For profit Non-profit Foreign institutions (relatively rare) Give us a realistic budget

Funding Opportunities Most DARPA work solicited via a Broad Agency Announcement (BAA) - Program-specific BAA - Open Office BAA Also Research Announcements (RAs) There are bureaucratic differences in RAs, BAAs and RFPs, but they all solicit proposals See http://www.darpa.mil/cmo for more details

Program-Specific BAA DARPA management has identified an area in which DARPA would like to run a research program The BAA is the primary mechanism DARPA uses to solicit research proposals Typical: 45 day response period, but varies by BAA There s usually an optional, but highly recommended, Proposers Day meeting, either before or after the BAA comes out.

Open Office BAA DARPA has a funding mechanism available all the time Primarily for new study efforts You have a great idea that you want to explore Relatively small (< $1M), short (1 year) Should have the potential to turn into a program if successful You are encouraged to coordinate with DARPA before writing the proposal. You can talk to a PM or office director!

Proposal Preparation Format specified in the BAA, and varies by BAA You must follow it, or risk your proposal being deemed nonresponsive and not technically evaluated DARPA does not fund research for the sake of funding research Please do not try to do a lightweight re-spin of a failed proposal to another funding agency

Proposal Preparation Emphasis on clarity of presentation: Reviewers will have a thick stack of proposals to rank Have some people not involved in the writing give feedback on the proposal before it goes out If you re teaming, the prime contractor will usually lead the proposal effort

Proposed Options Your proposal can include options (sometimes subsequent phases will technically be options) An option is just that: something the government can fund or not at its choice Options are good for both sides If a project is going well, DARPA might want to give it a plus up Increases the contractual ceiling in general, so there may be room for other work under this funding vehicle Much faster to modify an existing contract than generate a new one

Talking to DARPA Early and often! We get excited when someone brings us a great idea More freedom before the BAA is published After BAA publication, all Q/A or discussion is done as a public FAQ

Typical Funding Types 6.1 Basic Research 6.2 Applied Research 6.3 Advanced Development

Publication Restrictions Sometimes DARPA requires publication preapproval If that doesn t work for you, the key words to look for in the BAA are Contracted Fundamental Research 6.1 money is usually Contracted Fundamental Research Contracted Fundamental Research does not have any publication restrictions Universities get somewhat more liberal definition of CFR than research labs/industry

Teaming Some programs have wide-ranging objectives beyond the capability of any individual performer DARPA values academic, small business, and large contractors Be strategic: Make synergy explicit Don t duplicate Look for a good impedance match Make sure it s a team you want to work with if you win

Overall Process BAA published (or response to Open Office BAA encouraged) Proposal sent to DARPA Source selection DARPA sends out notifications, and paperwork for selectees to contracting agent Government contracting agent negotiates contract with prime contractor Contract signed; research begins Only the government contracting agent can authorize you to spend money!

Work at DARPA DARPA rotates people through PM roles, so is usually hiring Either via Intergovernmental Personnel Act (IPA) Mobility Program or as a Government Employee If you or someone you know is interested in serving their country and research community, please point them at me

Personal Areas of Interest Disclaimer: these are technical areas that I m personally interested in. Programs are announced only by the publication of the BAA.

Idea: Synthesize & Verify High-Assurance Systems Safety Policy Functional Specification Resource Constraints Security Policy Hardware Description Environment Description Proof: Generated executable implements functional specification, satisfies safety and security policies, and satisfies resource constraints when run on hardware satisfying the hardware description and in an environment satisfying the environmental description. Verified Libraries Synthesizer Code Proof Diagnostic Information If software always worked as specified or intended by its makers, only a small subset would be vulnerable to attack, and defenses would be much easier to implement. Felix Lindner, Recurity Labs, CACM, June 2006 High Assurance: Correctness, Safety, Security

High-Assurance Vehicle of the Future: Built from Synthesized Components Research Challenges GUI 3 rd Party Voice Synthesis of attack resilient control systems Scaling Proof engineering Attack/fault response V&V of complete system Composition Integration of synthesized and handwritten code Sandbox Authentication File System μkernel Network Protocol Stack Control Algorithms Communication Protocols RTOS Data Logging Control Algorithms RTOS Data Logging x86 ASIC ARM, etc A US automaker s cars have 1-2 complete computers. Specification languages: function, environment, hardware, resources...... A US automaker s cars have 30-100 real-time controllers. Key:... Integration of control systems and operating systems Managing time: synchrony, asynchrony, concurrency Synthesis of operating systems code Specialization of reusable components Unassured modules Focus on vehicles, but techniques will apply to other domains. New assured modules Existing assured modules Hardware

Questions?