Skip to main content

Assured Cyber Effects

The Assured Cyber Effects program focuses on developing new approaches in cyber and information technology to support tactical decision makers with agile and responsive battlespace applications that can be achieved in a rapidly evolving cyberspace. This is achieved by producing full-spectrum cyber effects that encompass defensive and other capabilities to assure access to and integrity of all information in the battlespace. Specific research foci are centered around tactical and real-time cyber capabilities that can be delivered from both manned and unmanned naval platforms.

Research Concentration Areas

  • Technologies sought are ones that support both real-time hardware and software sensing, monitoring, analysis and technical applications that protect our information enterprise and also enable our warfighters to dominate adversary information systems.
  • Research ideas are sought that build upon fundamental research in computer and information sciences for ensuring the integrity of the U.S. naval information enterprise, including the protection of our hull, mechanical and electrical (HM&E) systems. The cyber space domain that U.S. naval forces operate in requires advances in cyber that enable our warfighters to remain persistently ahead of our adversaries.
  • Research is also desired in methods to assure access to cyberspace and the integrity of command and control, advancing research on the convergence of cyber and electronic maneuver.
  • Research is needed that achieves proactive cyber dominance capabilities that enable understanding of the cyber situation (health and status) including development of novel protocols, mobile device and computing security, secure computing platforms including HM&E systems, cyber modeling, cyber technology evaluation techniques, and cyber data mining and understanding.

Research Challenges and Opportunities

  • Tools to enable cyber attack resiliency on legacy cyber-physical and industrial control systems (CPS/ICS)
  • Cyber fault-tolerant ICS architectures
  • Binary diversification and functionality retrofitting tools
  • Control system backplane security

How to Submit

For detailed application and submission information for this research topic, please refer to our broad agency announcement (BAA) No. N00014-22-S-B001.

Contracts: All white papers and full proposals for contracts must be submitted through FedConnect; instructions are included in the BAA.

Grants: All white papers for grants must be submitted through FedConnect, and full proposals for grants must be submitted through; instructions are included in the BAA.


Barnawi, Waleed Dr.
Program Officer
Code 311