Inside GrammaTech: What is Autonomic Computing?
Autonomic computer systems can detect, assess, and recover from cyber-attacks, all without human intervention or insight.
Autonomic computer systems can detect, assess, and recover from cyber-attacks, all without human intervention or insight.
INTRODUCTION: The Department of Homeland Security (DHS) published its recent IoT security guidelines after many months of deliberation. The document codifies many of the...
Dr. David Melski, our VP of Research and PI for DARPA's CGC, gives a lecture to students at Cornell University about building bot Xandra that competed as Team TECHx in DARPA's Cyber Grand Challenge.
Introduction Several of us at GrammaTech, along with many talented people from UVA, recently participated in DARPA's Cyber Grand Challenge (CGC) as Team TECHx. The challenge in CGC was...
Team TechX won second place in the DARPA Cyber Grand Challenge (CGC) last week. TechX is a collaboration between GrammaTech and the University of Virginia, and we are all very proud....
TECHx takes home the silver in the world’s first all-machine hacking tournament Las Vegas, NV — GrammaTech and its partner the University of Virginia took second place in DARPA’s Cyber...
Ithaca, NY — GrammaTech, a leading provider of software assurance, hardening, and cyber-security solutions, has been selected by the US Government to receive five research contracts that will...
Ithaca, NY — GrammaTech, a leading provider of software assurance, hardening, and cyber-security solutions, today announced the development of technologies for advanced software hardening. Most...
INTRODUCTION: Every IoT and embedded device manufacturer endeavors to field secure and safe products. However, even with the robust development processes, it's difficult to ensure...
ITHACA, N.Y. -- GrammaTech, a leading research center for and provider of cyber-security solutions, has been notified of its selection by DARPA to develop tooling for measuring and assessing the...
...
When the 2013 Defense Authorization Act was signed into law, it introduced some important new software-assurance requirements for defense-related software. These requirements are outlined in...
As part of the PEASOUP (Preventing Exploits Against Software of Uncertain Provenance) contract1, my colleagues at the University of Virginia (who are partners with us on this project) developed an...