U.S. flag

An official website of the United States government

Government Website

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Safely connect using HTTPS

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb

  1. Home
  2. About Us
  3. Site Links
  4. Archived
  5. News Archive
  6. News Release: DHS S&T transition to practice program announces 2017 cohort

Archived Content

In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.

News Release: DHS S&T transition to practice program announces 2017 cohort

Release Date: May 11, 2017

WASHINGTON —Eight new cybersecurity technologies developed by researchers at federally funded laboratories and academic research centers are ready for the commercial market. The Department of Homeland Security (DHS) Science and Technology Directorate’s (S&T) Transition to Practice (TTP) program will showcase its 2017 cohort May 16 in Washington D.C.

Each fiscal year, the TTP program selects promising cybersecurity technologies developed with federal funding to incorporate into its proven transition-to-market program. The TTP program selects the technologies from Department of Energy National Labs, Department of Defense-affiliated labs, Federally Funded Research and Development Centers, University Affiliated Research Centers, and universities.

“The 2017 TTP cohort is comprised of a diverse range of innovative cybersecurity technologies that will help strengthen the cyber defenses of critical networks in the public and private sectors,” said DHS Under Secretary (Acting) for Science and Technology Dr. Robert Griffin.

The eight new TTP technologies are:

  • Cyber Human Language Technology Analysis, Reasoning and Inference for Online Threats (CHARIOT) addresses the data overload problem cyber-analysts encounter by filtering open-source social media to eliminate irrelevant topics. It was developed at the Massachusetts Institute of Technology’s Lincoln Laboratory (MIT LL).
  • Quantitative Attack Space Analysis and Reasoning (QUASAR) provides visualization and quantitative analytics for determining the security impact of deploying cyber-defenses in an enterprise environment. QUASAR also was developed at MIT LL.
  • A Novel Intrusion Prevention System for Android (APE) is an application for Android devices that performs deep-packet inspection and filtering of traffic entering and leaving the device, thus blocking malicious traffic and lowering its attack profile. APE was developed by the Mitre Corporation.
  • Akatosh: Automated Cyber Incident Verification and Impact Analysis enables automated, real-time forensic analysis of endpoints after malware-attacks and other cybersecurity incidents by automatically maintaining detailed snapshots of host-level activity on endpoints over time. The technology was developed at Oak Ridge National Laboratory (ORNL).
  • Real-Time Cyber-Physical Attack Detection (CPAD) protects power transmission and distribution and other highly sensitive control systems by performing analytics and automatically inferring underlying physical relationships to detect sensor failures, replay attacks and other data-integrity issues in real time. CPAD also was developed at ORNL.
  • StreamWorks: Continuous Pattern Detection on Streaming Data supports continuous detection of emerging patterns in a system of graph-structured data, which are used to detect emerging events in massive netflow or event log data streams. It was developed at the Pacific Northwest National Laboratory.
  • Keylime: Enabling Trusted Platform Module-Based Trust in the Cloud enables users to securely bootstrap secrets (e.g., cryptographic keys, passwords, etc.) and continuously verify trust in their cloud computing resources without needing to trust their cloud provider. Keylime also was developed at MIT LL.
  • Policy Enforcement and Access Control for Endpoints (PEACE) protects endpoint devices in an enterprise network by intercepting all new network connections and vetting them at a centralized network controller, allowing administrators to enforce network policy and control access to proactively defend their networks. PEACE was developed at the Worchester Polytechnic Institute.

The 2017 cohort will be introduced to cybersecurity professionals—investors, developers and integrators—through a series of “Demonstration Day” events around the country that also will showcase the technologies to companies, including those from the energy, financial and government sectors. These events will help spur pilot opportunities and kick start commercialization by connecting the technologies with those who can advance the technologies and turn them into commercially viable products.

The cohort’s unveiling to the cybersecurity community will be at a May 16 Technology Demonstration Day in Washington, D.C. at the J.W. Marriott. “We are excited to introduce to the private sector and investor communities all of the innovative technologies that comprise the 2017 TTP cohort, beginning with the May 16 event in the nation’s capital. We also look forward to forging new relationships that will help the technologies reach the marketplace faster” said TTP Program Manager Nadia Carlsten.

TTP currently has a total of 40 technologies in its portfolio. Several TTP technologies already successfully transitioned to the marketplace, including: Quantum Secured Communications, Hyperion (first as a nonexclusive license; then as an exclusive license), Hone, NeMS, PathScan, PACRAT, LOCKMA and ZeroPoint.

The TTP program is administered by S&T’s Cyber Security Division’s (CSD), part of the Homeland Security Advanced Research Projects Agency. It complements the S&T process of funding projects through the full research-and-development lifecycle. For more information about the TTP program and its technologies, visit the program’s webpage, view its video, review its technology guide, or email ST.TTP@hq.dhs.gov.

CSD’s mission is to enhance the security and resilience of the nation’s critical information infrastructure and the Internet by developing and delivering new technologies, tools and techniques to defend against cyberattacks. The division conducts and supports technology transitions and leads and coordinates R&D among DHS customers, government agencies, the private sector and international partners. For more information visit CSD's webpages.

###

Last Updated: 06/07/2023
Was this page helpful?
This page was not helpful because the content