Open Source Software: EMV Scoring Application: Tailored Cybersecurity Threat Evaluation
Type: Special Notice
Overview

Buyer

ENERGY, DEPARTMENT OFENERGY, DEPARTMENT OFBATTELLE ENERGY ALLIANCE–DOE CNTRIdaho Falls, ID, 83415, USA

PSC

IT AND TELECOM - SECURITY AND COMPLIANCE SUPPORT SERVICES (LABOR) (DJ01)
Timeline
    Description

    Special Notice: ENERGY, DEPARTMENT OF is seeking an Open Source Software: EMV Scoring Application for Tailored Cybersecurity Threat Evaluation. This application is designed to assess cybersecurity threats against specific configurations, allowing organizations to fortify their defenses. It offers a highly customizable and user-friendly graphical interface that simplifies the scoring process and integrates seamlessly with STIX objects. The application enables users to create their scoring schema, streamlining the evaluation process and enhancing cybersecurity posture. It has applications in critical infrastructure protection, corporate security, government defense, and healthcare data security. Download the EMV Scoring Application now to customize your cybersecurity threat assessment.

    Point(s) of Contact
    Files
    No associated files provided.
    Similar Opportunities
    Open Source Software: EMRALD: Pioneering Dynamic Risk Assessment for Enhanced Reliability and Safety
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open Source Software: EMRALD for Pioneering Dynamic Risk Assessment for Enhanced Reliability and Safety. This software, developed by the Idaho National Laboratory (INL), sets a new standard in dynamic probabilistic risk assessment (PRA), offering unparalleled capabilities to model and analyze complex system interactions in real-time. EMRALD bridges traditional PRA with dynamic modeling, providing a more intuitive and comprehensive risk assessment process. It features a user-friendly interface, dynamic integration with other simulation applications, comprehensive modeling capturing the sequence and timing of events, flexible application across industries, and supports nuclear safety analysis, industrial risk management, simulation enhancement, and operational decision making. Discover how EMRALD can elevate your risk management strategy to new heights.
    Open Source Software: Structured Threat Intelligence Graph: Revolutionizing Cybersecurity Data Management
    Active
    Energy, Department Of
    Special Notice ENERGY, DEPARTMENT OF Open Source Software: Structured Threat Intelligence Graph: Revolutionizing Cybersecurity Data Management. The Department of Energy is seeking an open source software solution called Structured Threat Intelligence Graph (STIG) to enhance their cybersecurity data management. STIG is a groundbreaking software that offers a comprehensive, graphical approach to threat intelligence by leveraging the capabilities of STIX data through an innovative graphical interface. It simplifies the creation, management, querying, and visualization of threat information, making it easier for analysts to track, analyze, and mitigate threats efficiently. STIG's visualization capabilities allow for explicitly depicting complex object graph structures, enhancing understanding and strategic planning. It is ideal for cybersecurity analysis, incident response, customization and integration, and research and development purposes. Join the forefront of cybersecurity management by embracing the Structured Threat Intelligence Graph today. Download now to discover how this innovative approach can transform your threat intelligence processes.
    Open Source Software: Caldera Charge: Innovating EV Charging Infrastructure Simulation for Grid Efficiency and Sustainability
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open Source Software for Caldera Charge to innovate EV Charging Infrastructure Simulation for Grid Efficiency and Sustainability. Caldera Charge is an advanced simulation platform designed to explore the challenges of EV charging infrastructure and intelligent grid management. It offers critical insights into the impact of EV charging on the grid and fosters innovative charging solutions. Before Caldera Charge, there was a lack of a holistic tool to model the interplay between EV charging infrastructure and grid performance, creating a barrier to developing effective strategies to support the rising demand for electricity. Caldera Charge features two core components: the Infrastructure Charging Module (ICM) and the Charging Decision Module (CDM). The ICM focuses on high-fidelity EV charging models and intelligent charging algorithms, accurately simulating the direct impact of EV charging on the grid. The CDM offers innovative scheduling mechanisms, allowing for studying charging strategies and pricing models to optimize public charging infrastructure. Advantages of Caldera Charge include targeted simulation modules, accurate grid impact analysis, innovative charging management, scalable and flexible design, and comprehensive co-simulation capability. The applications of Caldera Charge include utility companies for strategically managing grid loads, urban and transportation planners for integrating sustainable EV charging solutions, academic and research institutions for conducting in-depth studies on EV integration impacts, EV charging service providers for optimizing network operations, and policy makers and regulatory bodies for informing policy and regulatory guidelines. Unlock the potential of Caldera Charge to revolutionize EV charging infrastructure planning and grid management strategies. Visit the GitHub pages for Caldera Grid and Caldera ICM to access the software and documentation and become part of the innovative community.
    Tech Licensing Opportunity: Generative Adversarial Networks for EM Signature Generation
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking a Tech Licensing Opportunity for Generative Adversarial Networks (GANs) for EM Signature Generation. This technology aims to synthetically generate electromagnetic (EM) signatures from assembly instructions using GANs, enhancing software security analysis. Traditionally, firmware and software verification involves side-channel analysis, which is a labor-intensive method that captures analog signals to detect vulnerabilities or unauthorized changes in software. However, this method can be complex and time-consuming, leading to high costs and extended timelines. The proposed technology automates the generation of EM signatures directly from code using GANs. By automating this process, it simplifies and accelerates the detection of vulnerabilities in software, especially in embedded devices. This technology promises to significantly reduce the cost and complexity of side-channel analysis, potentially revolutionizing software security verification before deployment. Key advantages of this technology include automating the generation of EM signatures, facilitating rapid and reliable anomaly detection in software, reducing the overall cost and time required for side-channel analysis, enabling offline verification of software for side-channel vulnerabilities, and improving the robustness of security analysis against environmental and equipment variability. This technology solves the problems of time-consuming and error-prone manual capturing of EM signals for side-channel analysis, limited applicability of traditional side-channel analysis methods due to their dependency on physical signal capturing, high cost and complexity of ensuring software security in embedded and mission-critical systems, and difficulty in detecting firmware and software-level modifications through conventional methods. Potential market applications for this technology include software security verification, vulnerability identification in embedded devices, and education and research in cybersecurity. It is ideal for companies and organizations looking to secure their software against side-channel attacks before deployment, industries deploying embedded systems in mission-critical environments, and academic institutions and research centers focusing on advanced cybersecurity solutions. The technology is currently at Technology Readiness Level (TRL) 3 and has a US Provisional Patent Application. The contact person for further discussions and licensing opportunities is Andrew Rankin at andrew.rankin@inl.gov. For more information, visit https://inl.gov/technology-deployment/.
    Open Source Software: ICSNPP: Advanced Industrial Control System Protocol Parsing for Zeek
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open Source Software: ICSNPP: Advanced Industrial Control System Protocol Parsing for Zeek. This service is typically used to enhance network security and monitoring in industrial control systems (ICS). ICSNPP is a collection of Zeek plugin protocol parsers tailored for the industrial control sector, providing detailed insights into network activities and enabling more effective monitoring, threat detection, and incident response. The service supports four major ICS protocols: BACnet, DNP3, Ethernet/IP, and Modbus. It offers unmatched depth in parsing ICS-specific protocols, quick and easy integration, open-source accessibility, proactive threat hunting, and CISA-tested reliability. The applications of this service include optimizing renewable energy integration, securing manufacturing processes, protecting water treatment facilities, and enhancing the resilience of critical infrastructure. Elevate your industrial control system's security posture with ICSNPP. Visit the GitHub page for more information and to download the plugin suite.
    Open-Source Software: Revolutionizing Financial Performance Analysis with TEAL: Bridging Engineering and Economics
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open-Source Software for Revolutionizing Financial Performance Analysis with TEAL: Bridging Engineering and Economics. This software, called TEAL (Tool for Economic AnaLysis), is designed to integrate with the RAVEN framework and revolutionize economic assessments by combining engineering insights with financial performance metrics. TEAL offers advanced financial risk metrics, efficient computational use, and versatile application in various fields, including nuclear energy and integrated energy systems. It enhances economic evaluations, investment priority determinations, and cross-sector economic analysis. The software is open source and available for download at no cost on the product's GitHub page.
    Open Source Software: Malcolm: Revolutionizing Network Traffic Analysis with Open Source Innovation
    Active
    Energy, Department Of
    Special Notice ENERGY, DEPARTMENT OF Open Source Software: Malcolm: Revolutionizing Network Traffic Analysis with Open Source Innovation. Malcolm is a comprehensive tool suite designed to enhance the security and robustness of critical infrastructure sectors. It offers in-depth network traffic analysis while being accessible to a wide range of users. Malcolm integrates multiple open-source network analysis tools into a cohesive suite, providing a streamlined solution for capturing, analyzing, and managing network traffic data. Its deployment via Docker containers allows flexibility across various platforms, making it a versatile option for security operations centers (SOCs), incident response teams, and individual cybersecurity enthusiasts. Malcolm's advantages include ease of deployment, comprehensive analysis, secure and compliant data protection, cost-effectiveness as an open-source solution, and specialized support for industrial control systems. Its applications include enhancing resilience against cyber threats in energy, transportation, and water management sectors, providing SOC teams with a powerful toolkit for network monitoring and incident response, enabling enthusiasts and researchers to conduct in-depth analysis, and offering a portable solution for on-site investigations and quick deployment in the face of security incidents. Visit the GitHub page to download Malcolm, access comprehensive documentation, and join a community committed to advancing cybersecurity resilience.
    Open Source Software: TMAP8: Simplifying Diffusion-Reactive Transport Analysis for Fusion and Chemical Applications
    Active
    Energy, Department Of
    Special Notice ENERGY, DEPARTMENT OF Open Source Software: TMAP8: Simplifying Diffusion-Reactive Transport Analysis for Fusion and Chemical Applications. The Department of Energy is seeking an open source software solution called TMAP8 that simplifies diffusion-reactive transport analysis for fusion and chemical applications. TMAP8 is a pioneering MOOSE application designed to streamline and enhance the analysis of 0-1D scalar diffusion-reactive transport. It offers a unique custom syntax that simplifies the setup of diffusive-reactive and heat conduction models. TMAP8 can be used alongside multi-dimensional MOOSE applications for comprehensive multiscale modeling. It is suitable for analysts in fusion, chemical transport, and low-temperature plasma sectors. The software is intended to be used for low-temperature plasma analysis, fusion energy science simulations, chemical transport modeling in industrial applications, and systems-level analysis for chemical reactors and connecting piping. Download TMAP8 today to simplify your diffusion-reactive transport analysis and join a growing community of innovators shaping the future of scientific discovery.
    Open-Source Software: Empowering Energy Analysts with Stochastic Technoeconomic Assessments with HERON
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open-Source Software for empowering energy analysts with stochastic technoeconomic assessments using HERON. HERON is a modeling toolset and plugin for RAVEN that accelerates the stochastic technoeconomic assessment, enabling precise economic viability analysis of various grid-energy system configurations. This software addresses the increasing complexity in electricity demand and the integration of Integrated Energy Systems (IES), paving the way for economically optimal dispatch and robust system planning in the face of uncertainty. It offers advantages such as accelerated analysis, stochastic optimization, comprehensive economic metrics, user-friendly interface, and open-source collaboration. The primary audience for this software includes energy analysts and engineers, academic researchers and students, government agencies, utility companies, developers of renewable energy projects, and industry consultants. Download HERON today from GitHub for free and embrace the future of energy system planning.
    Open Source Software: MASTODON: Pioneering Multi-Hazard Analysis for Critical Infrastructure
    Active
    Energy, Department Of
    Special Notice: ENERGY, DEPARTMENT OF is seeking Open Source Software: MASTODON for pioneering multi-hazard analysis for critical infrastructure. MASTODON is a cutting-edge software tool that offers a comprehensive solution for modeling stochastic nonlinear soil-structure interactions (NLSSI), bringing a new level of sophistication to dynamic probabilistic risk assessments. It is designed to simulate how structures like nuclear facilities, dams, and bridges respond to external hazards, including seismic events. MASTODON excels in the numerical modeling of seismic soil-structure interaction and sets a new benchmark in risk assessment tools. It offers advanced NLSSI modeling, enables precise risk analysis for critical infrastructure against multiple hazards, simulates the entire process from earthquake fault rupture to structural response with high fidelity, enhances the reliability of risk assessments by accurately quantifying uncertainties, and leverages the MOOSE framework for computational efficiency and flexibility. MASTODON is applicable to nuclear facilities, critical infrastructure, and facilitates dynamic probabilistic risk assessments for various external threats. Visit the GitHub page to learn more and download the software for evaluation.