The Expeditionary Cyber program has the goal of providing the Marines, SOCOM and Expeditionary Navy customers with state-of-the-art solutions to both defend assets and defeat adversaries within the cyberspace domain. Traditional cyber solutions have focused on enterprise infrastructures, oftentimes housed in permanent, secured facilities. Advanced solutions have migrated to mobile commercial platforms, but do not always take into account mobilized, active adversaries—nor environments with disruptive, intermittent and latent communications.
The Expeditionary Cyber program will focus on two thrust areas to complete its mission: Cyber-Assured Expeditionary Systems and Full Spectrum Cyber Effects. The Cyber-Assured Expeditionary Systems thrust area will mature and discover new technology to build security into the unique environment of expeditionary tactical systems. The Full Spectrum Effects thrust area seeks to identify and characterize relevant cyber systems (physical layer, logical layer, cyber-persona layer) within the Expeditionary Cyber battlespace, and employ appropriate actions to maximize operational effectiveness.
Research Concentration Areas
- Automated hardening of mobile systems
- Low latency, add-on security technologies for expeditionary forces
- Formal methods for secure software development for mobile devices
- Identity-based keying
- FPGA-accelerated cryptography
- Memory exploitation defense for mobile devices
- Software-defined networking
- Defense in depth security for deployable architectures
- Reverse engineering for mobile systems
- Assured machine learning in mobile device applications
- Supply chain integrity and provenance
- Cyber persona analytics
Research Challenges and Opportunities
- Develop automated tools to perform static, dynamic and binary analyses in Expeditionary embedded systems
- Study the properties of emergent behavior for networked devices in Expeditionary Cyberspace
- Develop innovative fuzzing approaches for RF protocols
- Develop continuous monitoring tools in a distributed, intermittent and latent environment
- Develop Expeditionary Cyber system of systems risk assessment tools
Program Contact Information
How to Submit
For detailed application and submission information for this research topic, please see our Funding Opportunities page and refer to broad agency announcement (BAA) No. N00014-21-S-B001.
- Contracts: All white papers and full proposals for contracts must be submitted through FedConnect; instructions are included in the BAA.
- Grants: All white papers for grants must be submitted through FedConnect, and full proposals for grants must be submitted through grants.gov; instructions are included in the BAA.