Systems & Technology Research
  • WHAT WE DO
    • Acoustic Systems
    • Battle MANAGEMENT, COMMAND & CONTROL
    • VIDEO & IMAGE PROCESSING
    • CYBER PHYSICAL SYSTEMS
    • DATA ANALYTICS
    • RF SYSTEMS
  • WHO WE ARE
  • CAREERS
    • Diversity & Inclusion
    • Professionals
    • Students & Grads
  • VISIT US
    • Massachusetts
    • Ohio
    • Virginia
  • WHAT WE DO
    • Acoustic Systems
    • Battle MANAGEMENT, COMMAND & CONTROL
    • VIDEO & IMAGE PROCESSING
    • CYBER PHYSICAL SYSTEMS
    • DATA ANALYTICS
    • RF SYSTEMS
  • WHO WE ARE
  • CAREERS
    • Diversity & Inclusion
    • Professionals
    • Students & Grads
  • VISIT US
    • Massachusetts
    • Ohio
    • Virginia
  • ACOUSTIC SYSTEMS
  • BATTLE MANAGEMENT, COMMAND & CONTROL
  • DATA ANALYTICS
  • RF SYSTEMS
  • VIDEO & IMAGE PROCESSING
  • WHAT WE DO
  • CYBER PHYSICAL SYSTEMS

CYBER PHYSICAL SYSTEMS

STR secures legacy and emerging military platforms, which are critical for our national security.

These solutions also assess existing systems to rapidly identify and mitigate complex vulnerabilities. STR’s approach to cybersecurity is differentiated by our multi-disciplinary approach in which we work in small teams across diverse technologies including: reverse engineering, vulnerability research, formal methods, model-based engineering, machine learning, signal processing, and optimization. This approach enables STR to satisfy the full spectrum of cybersecurity applications.

Applications include:
​
  • Reverse engineering
  • Cyber physical system modeling and simulation
  • Scalable, human-assisted vulnerability research
  • Security evaluation of non-traditional cyber physical systems
  • System configuration security analysis
  • Formal analysis and verification of security properties
  • Cyber requirements generation
  • Semi-automated methods for reverse engineering
  • Cyber-physical system informed methods for dynamic program analysis
Picture
Picture

Autonomous Botnet Cleansing

A key challenge today is the proliferation of botnets—networks of infected computers and devices controlled by an attacker. ​
Learn More
Picture

Sensing Cyber States at a Distance

Detecting the presence of malware or changes in digital hardware configuration is an ongoing challenge with impact on fielded system and ones still in the supply chain.
Learn More
Picture

Copyright © 2020 SYSTEMS & TECHNOLOGY RESEARCH
AN EMPLOYEE OWNED COMPANY  |  CAReers

ARLINGTON, VA  |  BEAVERCREEK, OH  | WOBURN, MA |  844.204.0963  | INFO@STRESEARCH.COM