Defense
Software Assurance
Analysis, Optimization and Modernization
The devices that power our digital lives grow more and more sophisticated over short periods of time. This developing complexity can lead to reasoning gaps among engineers that expose vulnerabilities, as well as software failures and hacks from random chance or determined adversary action.
The same is true for the software embedded in systems on the front lines of our nation’s defense, except the challenge is compounded both by their mission and by their software restrictions. Unlike consumer digital devices such as cell phones that can be replaced every few years, these national security systems are required to provide service for many decades.
This is partly because the computers that run this software have unique features and may also rely on previous-generation technology. The software development environments used to program them are no longer part of the mainstream software development ecosystem. Given their critical role, it is essential to overcome the challenges involved in the reasoning gap when it comes to the software powering national security systems at scale.
The Lab leverages its unique portfolio of software and data science tools and capabilities to accelerate and secure software releases for front-line platforms using a systems-engineering approach.
The Lab leverages its unique portfolio of software and data science tools and capabilities to accelerate and secure software releases for Department of Defense (DoD) front-line platforms using a systems-engineering approach.
Protecting Defense Systems against Cyber Threats
We partner directly with acquisition program offices to bring mission critical software analysis, transformation and test automation capabilities to the latest generation systems. These same capabilities are used to modernize legacy systems so they remain viable in our rapidly evolving threat environment.
Can this system survive DefCon?
Our vulnerability analysis tools are designed to test for the presence of backdoors and errors in the system that may be exploited. These tools include Fuzzers, Rules-Based Software Screening, Buffer, Overflow/Underflow, Binary Analysis Tool Suite and Concolic Testing.
Will this software successfully cross the international dateline?
Does the software in the system operate as expected? System verification will evaluate software functionality without requiring testing of all possible scenarios, ensuring critical signals behave as required before deployment.
Will all systems still work after an update?
Compliance checking can block upgrades to legacy platforms and systems that require time consuming retesting. Source-to-source translation to modern languages can cut the time to field.
Can this software automate testing?
Automated unit-test generation is necessary to lower the time to certify and field platforms and systems.
How do we handle vendor end-of-life?
Once an aging software application has outlived its original development environment, the Software Assurance and Optimization team can translate contemporary languages and operating systems so that modern software analysis tools can be applied.
We partner directly with acquisition program offices to bring mission critical software analysis, transformation and test automation capabilities to the latest generation systems. It brings these same abilities to the legacy systems undergoing modernization so they can remain viable in our rapidly evolving threat environment.
- Make capabilities available across organizations
- Adapt existing or prior work to specific efforts
- Implement custom transformations
- Consult on software analysis, optimization and modernization
Read more about Defense
Join Our Team
The Global Security Directorate at LLNL offers a diverse, collaborative environment where multidisciplinary teams work together to support the Lab’s mission and address a range of global and national security needs. Find impactful careers, talented teams and a great company culture.