DDoS Defense: Better Traction in Tandem?

Security Intelligence

With DDoS tools and hacking-as-a-service now available for purchase at virtually any Dark Web marketplace and effectively being advertised through public attacks, companies are understandably concerned. Even when caught midstream, it’s difficult to respond before servers start failing and other, more sophisticated attacks take aim at critical corporate data. As a result, dealing with DDoS has become a top priority for organizations like the DHS, which just awarded a $1.7 million contract to tech company Galois in hopes of strengthening DDoS defense.


Department of Homeland Security doles out $1.7 million for DDoS protection

The Washington Times

Galois of Portland announced on Monday this week that the federal government has contracted the company to develop technology capable of countering DDoS attempts — elementary but often successful cyberattacks in which hackers cause a computer system to collapse by subjecting it to a sudden surge in traffic. Individuals ranging from politically-motivated hacktivists to state-sponsored cyberwarriors have relied on DDoS attacks to take entire systems offline. And yet while the lasting effects may be minimal, downtime suffered by the likes of a major financial institution — or, as Galois’ contract suggests, a government agency — may cause immeasurable damages.


Galois Awarded $1.7 Million DHS Contract To Combat DDoS Attacks

Galois today announced it has been awarded a $1.7 million contract by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) to create technology that is capable of defending against large and sophisticated Distributed Denial of Service (DDoS) attacks. The contract is part of the DHS S&T Cyber Security Division’s larger Distributed Denial of Service Defenses (DDoSD) program.

Read More

Adam Wick on Security, Formal Methods, Types, Unikernels, HaLVM, DRM


Adam Wick leads the systems software group at R&D company Galois, Inc. Galois does research in formal methods, programming languages, OS, compiler engineering, and security. Adam has worked in a variety of fields from HW synthesis to web apps, but has recently focused on network and OS security. Amongst his current jobs, he also maintains HaLVM and oversees Galois’ projects using it.


Galois NSTIC pilot: Creating secure data storage and access for the IoT

SecureID News

Galois focuses on cyber security, primarily serving the U.S. government, and with its NSTIC pilot funding the company will pilot a project to build a tool that can enable the storing and sharing of private information online. The data storage system will rely on biometric authentication. Project partners also plan to develop transit ticketing on smartphones and integrate the secure system into an Internet of Things (IoT) enabled smart home.


Rob Wiltbank of Galois: Maintaining a Singular Focus on High-Assurance Systems


Making systems as they were intended – that’s been the focus of Portland-based tech company Galois from the very beginning. For the past 15 years, the company has focused on research and development of technologies that protect networks, systems, devices and vehicles. That critical work has translated into sizable contract wins, most recently, with the award […]


Galois Awarded DARPA Subcontract to Strengthen Supply Chain Protection of Electronic Components

Galois has been awarded a sub-contract by SRI International under a DARPA program to protect against counterfeit electronic components and associated security concerns by introducing low-cost secure authentication components in the hardware supply chain. The contract was awarded as part of DARPA’s Supply Chain Hardware Integrity for Electronics Defense (SHIELD) program. Building upon Galois’ 15-year history developing defensive cybersecurity technologies, Galois’ effort will focus on cryptography, secure network protocols, and authentication.

Read More

David Archer: The unrealized potential of interagency total information sharing

Government Computer News

Significant events tend to trigger significant reactions. In the immediate aftermath of 9/11, fingers pointed to the lack of information sharing among government agencies at every level as the root of our inability to predict the attack, which unsurprisingly led to calls for total information sharing (TIS). Then, on the heels of a string of […]