Department of Homeland Security doles out $1.7 million for DDoS protection

The Washington Times

Galois of Portland announced on Monday this week that the federal government has contracted the company to develop technology capable of countering DDoS attempts — elementary but often successful cyberattacks in which hackers cause a computer system to collapse by subjecting it to a sudden surge in traffic. Individuals ranging from politically-motivated hacktivists to state-sponsored cyberwarriors have relied on DDoS attacks to take entire systems offline. And yet while the lasting effects may be minimal, downtime suffered by the likes of a major financial institution — or, as Galois’ contract suggests, a government agency — may cause immeasurable damages.

Permalink

Galois Awarded $1.7 Million DHS Contract To Combat DDoS Attacks

Galois today announced it has been awarded a $1.7 million contract by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to create technology that is capable of defending against large and sophisticated Distributed Denial of Service (DDoS) attacks. The contract is part of the DHS S&T Cyber Security Division’s larger Distributed Denial of Service Defenses (DDoSD) program.

Read More

Adam Wick on Security, Formal Methods, Types, Unikernels, HaLVM, DRM

InfoQ

Adam Wick leads the systems software group at R&D company Galois, Inc. Galois does research in formal methods, programming languages, OS, compiler engineering, and security. Adam has worked in a variety of fields from HW synthesis to web apps, but has recently focused on network and OS security. Amongst his current jobs, he also maintains HaLVM and oversees Galois’ projects using it.

Permalink

Galois NSTIC pilot: Creating secure data storage and access for the IoT

SecureID News

Galois focuses on cyber security, primarily serving the U.S. government, and with its NSTIC pilot funding the company will pilot a project to build a tool that can enable the storing and sharing of private information online. The data storage system will rely on biometric authentication. Project partners also plan to develop transit ticketing on smartphones and integrate the secure system into an Internet of Things (IoT) enabled smart home.

Permalink

Rob Wiltbank of Galois: Maintaining a Singular Focus on High-Assurance Systems

WashingtonExec

Making systems as they were intended – that’s been the focus of Portland-based tech company Galois from the very beginning. For the past 15 years, the company has focused on research and development of technologies that protect networks, systems, devices and vehicles. That critical work has translated into sizable contract wins, most recently, with the award […]

Permalink

Galois Awarded DARPA Subcontract to Strengthen Supply Chain Protection of Electronic Components

Galois has been awarded a sub-contract by SRI International under a DARPA program to protect against counterfeit electronic components and associated security concerns by introducing low-cost secure authentication components in the hardware supply chain. The contract was awarded as part of DARPA’s Supply Chain Hardware Integrity for Electronics Defense (SHIELD) program. Building upon Galois’ 15-year history developing defensive cybersecurity technologies, Galois’ effort will focus on cryptography, secure network protocols, and authentication.

Read More

David Archer: The unrealized potential of interagency total information sharing

Government Computer News

Significant events tend to trigger significant reactions. In the immediate aftermath of 9/11, fingers pointed to the lack of information sharing among government agencies at every level as the root of our inability to predict the attack, which unsurprisingly led to calls for total information sharing (TIS). Then, on the heels of a string of […]

Permalink

Making mobile phones the authentication hubs for smart homes

Government Computer News

“[…] people who have tried to deploy authentication devices for smart homes have had a lot of trouble getting them to work, and they’re kind of expensive,” said Isaac Potoczny-Jones, computer security research lead at Galois.“Since a mobile phone can do cryptography, and because we can build beautiful and easy-to-use interfaces on mobile phones, we […]

Permalink