*
Bookmark and Share

Security Components and Mechanisms Group

Welcome

In our security research, we focus on the development and management of foundational building-block security mechanisms and techniques that can be integrated into a wide variety of mission-critical U.S. information systems. Our work spans a spectrum from near-term hardening and improvement to the design and analysis of next-generation, leap-ahead security capabilities. Computer security depends fundamentally on the level of trust that can be established for computer software and systems. Our work, therefore, focuses strongly on assurance-building activities ranging from the analysis of software configuration settings to advanced trust architectures to testing tools that surface flaws in software modules. Due to the often manual, and costly, nature of assurance building using current techniques, our work focuses strongly on increasing the applicability and effectiveness of automated techniques wherever feasible. We conduct research collaboratively with government, industry, and academia. The outputs of our research consist of prototype systems, software tools, demonstrations, NIST Special Publications and NIST Interagency Reports, conference papers, and journal papers.

Programs/Projects

Biometric Standards Program and Resource Center—Supporting the national strategy on biometrics and the development of required biometric standards is the cornerstone of our program. We seek to help the U.S. government and private sector meet …

National Checklist Program—The National Checklist Program (NCP) is the U.S. government repository of publicly available security checklists (or benchmarks) that provide detailed low level guidance on setting the security …

Federal Desktop Core Configuration (FDCC)—The Federal Desktop Core Configuration (FDCC) is an OMB-mandated security configuration. The FDCC currently exists for Microsoft Windows Vista and XP operating system software. While not addressed …

Automated Combinatorial Testing for Software (ACTS)—Empirical evidence suggests that nearly all software errors are triggered by the interaction of one to six parameters. These results have important implications for testing. If all faults in a …

Security Configuration Checklists for Commercial IT Products—The solutions to IT security are complex, one basic but effective tool is a security configuration checklist. A security checklist is a document that contains instructions for securely configuring …

 
Contact

General Information:
Mark (Lee) Badger, Group Manager
Phone: 301-975-3176
Email: mark.badger@nist.gov

100 Bureau Drive, M/S 8930
Gaithersburg, MD 20899-8930