Securely Taking on New Executable Software of Uncertain Provenance

As part of a program to automatically remove software vulnerabilities, Cyc was used to model software behaviors in order to detect potentially malicious code. 

Sponsor: 
IARPA
Contract #: 
FA8650-10-C-7023
Project Duration: 
2009 to 2012