Focus areas
SRI’s Computer Science Laboratory develops leading-edge tools and methods for areas including computer security, high-assurance systems, advanced user interfaces, computer networking, robotics, biotechnology and nanotechnology.
Cyber security
We improve the security of critical infrastructures that support power grids, refineries, financial systems, telecommunications and the Internet.
Formal methods
SRI is a world leader in formal verification of computer systems. We build and offer specifications for high-assurance systems software and hardware.
Bioinformatics and computational biology
We apply computational methods to study and develop tools, software, databases and ontologies to manage and analyze high-throughput, heterogeneous biological data.
Cyberspace operations
We develop solutions that enable computer network attack, computer network exploitation, and intelligence, surveillance and reconnaissance (ISR) missions.
Our work
more +-
Solving “unsolvable” math challenges with quantum-inspired computers
SRI researchers hope to compete with quantum computing by applying new algorithms to map large problems onto faster, more energy-efficient photonic circuitry.
-
SRI’s FHE accelerator design strengthens security of outsourced data processing
Closing the gap between privacy and computation time.
-
SRI International spearheads two groundbreaking efforts to secure 5G
Deep-tech pioneer addresses 5G network security by leveraging its unique intellectual property and research, extensive experience and relationships with its spinout companies
Latest publications
more +-
Deductive Synthesis of the Unification Algorithm: The Automation of Introspection
We are working to create the first automatic deductive synthesis of a unification algorithm. The program is extracted from a proof of the existence of an output substitution that satisfies a given logical specification.
-
Semantic Instrumentation of Virtual Environments for Training
We discuss an approach in which the virtual environment is semantically instrumented in order to allow for the tracking of and reasoning about open-ended learner activity therein.
-
Diagnosis cloud: Sharing knowledge across cellular networks
This paper presents a novel diagnosis cloud framework that enables the extraction and transfer of knowledge from one network to another. It also presents use cases and requirements. We present the implementation details of the diagnosis cloud framework for two specific types of models: topic models and Markov Logic Networks (MLNs).
-
Keys Under Doormats
In this report, a group of computer scientists and security experts, many of whom participated in a 1997 study of these same topics, has convened to explore the likely effects of imposing extraordinary access mandates.
-
Machine Learning Models and Pathway Genome Data Base for Trypanosoma cruzi Drug Discovery
We have demonstrated how combining chemoinformatics and bioinformatics for T. cruzi drug discovery can bring interesting in vivo active molecules to light that may have been overlooked.
-
Weakness in Depth: A Voting Machine’s Demise
Virginia’s government recently examined the AVS WinVote and learned that the vulnerabilities are more serious than any other voting system, allowing complete exploitation over a Wi-Fi network.