Research & Development

CRITICAL SYSTEMS

From verifying code for the world’s largest cloud services provider to bolstering critical systems within the Department of Defense, for more than 25 years Galois has been a world leader in providing mathematical guarantees for the correctness of systems on which private data, national security, and human lives depend.

WHY GALOIS?

While the majority of Galois’s research begins with government funding, much of the tools, techniques, and technology that result have commercial applications. Our formal methods and cryptography research has been used to assure security and trust for multi-million dollar fintech enterprises, high-risk military operations, and commercial aircraft. Our digital engineering and machine learning researchers leverage their expertise to optimize and secure medical devices and hospitals.

Worked with Amazon Web Services on formal methods assurance of their s2n software library. In this work, Galois formally proved important security properties and integrated these proofs in the AWS continuous integration development pipeline, so that the resulting formal assurance is automatically reverified each time any source code is modified.

Conducted extensive cybersecurity analysis, implementation, and verification services for several blockchain companies. Our work in this area has included everything from the implementation of a new signature scheme to code performance audits to documentation of networking and blockchain protocols.

Conducted a comprehensive security assessment for a company specializing in digital assets management, followed by a rigorous system specification that exhaustively covered all identified threats. We then assisted in designing and implementing security proofs and modular identity verification proofs.

When trust is paramount, security is everything. We can help.

Related Articles

Blog Post

How Do You Modernize Safety Critical Designs in Nuclear Power? RDE!

Read more
Rigorous Digital Engineering
Critical Systems

Blog Post

Introducing Cheesecloth: A Tool for Proving Software Vulnerabilities in Zero Knowledge

Read more
Advanced Cryptography & Privacy
Critical Systems

Blog Post

Cryptol, SAW, and the Galois Origin Story

Read more
Software & Systems Analysis
Critical Systems
Advanced Cryptography & Privacy
View all articles

TEAM LEADS

No items found.

Get in touch with a Galois team member today