Visible to the public Solicitation: NSF Secure and Trustworthy CyberSpace (SaTC) [Solicitation 19-603]Conflict Detection Enabled

Secure and Trustworthy Cyberspace (SaTC)

NSF 19-603

NSF 18-572

National Science Foundation

Directorate for Computer and Information Science and Engineering
Division of Computer and Network Systems
Division of Computing and Communication Foundations
Division of Information and Intelligent Systems
Office of Advanced Cyberinfrastructure

Directorate for Social, Behavioral and Economic Sciences
Division of Social and Economic Sciences
Division of Behavioral and Cognitive Sciences

Directorate for Mathematical and Physical Sciences
Division of Mathematical Sciences

Directorate for Engineering
Division of Electrical, Communications and Cyber Systems

Directorate for Education and Human Resources
Division of Graduate Education

Full Proposal Deadline(s) (due by 5 p.m. submitter's local time):

Proposals Accepted Anytime


  • The maximum total budget for proposals submitted to the Education (EDU) designation is reduced from $500,000 to $400,000.
  • The number of CORE proposals that a PI, co-PI or senior personnel can participate in is increased from 1 to 2.
  • The eligibility criteria for PIs is updated.
  • Additional information about the topic areas of interest is added, notably in cryptography, data science, information authenticity, and social/behavioral/economic sciences.
  • Guidance on Broadening Participation in Computing plans is clarified.

Any proposal submitted in response to this solicitation should be submitted in accordance with the revised NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 19-1), which is effective for proposals submitted, or due, on or after February 25, 2019.


General Information

Program Title: Secure and Trustworthy Cyberspace (SaTC)

Synopsis of Program:

In today's increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society's overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.

The goals of the SaTC program are aligned with the National Science and Technology Council's (NSTC) Federal Cybersecurity Research and Development Strategic Plan (RDSP) and National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity research and development: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.

The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; education; mathematics; statistics; and social, behavioral, and economic sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are each welcome.

Proposals must be submitted pursuant to one of the following designations, each of which may have additional restrictions and administrative obligations as specified in this program solicitation.

  • CORE: This designation is the main focus of the SaTC research program, spanning the interests of NSF's Directorates for Computer and Information Science and Engineering (CISE), Engineering (ENG), Mathematical and Physical Sciences (MPS), and Social, Behavioral and Economic Sciences (SBE).
  • EDU: The Education (EDU) designation will be used to label proposals focusing entirely on cybersecurity education.
  • TTP: The Transition to Practice (TTP) designation will be used to label proposals that are focused exclusively on transitioning existing research results to practice.

CORE and TTP proposals may be submitted in one of the following project size classes:

  • Small projects: up to $500,000 in total budget, with durations of up to three years;
  • Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years;

EDU proposals are limited to $400,000 in total budget, with durations of up to three years.

Award Information

  • Anticipated Type of Award: Standard Grant or Continuing Grant
  • Estimated Number of Awards: 73
  • NSF anticipates approximately 13 EDU awards, 35 Small awards, and 25 Medium awards.
  • Anticipated Funding Amount: $53,000,000 per year, dependent on the availability of funds. An additional $15,000,000 is available for Frontier awards via NSF solicitation NSF 19-572.

Eligibility Information
Who May Submit Proposals:

  • Proposals may only be submitted by the following:
    • Institutions of Higher Education (IHEs) - Two- and four-year IHEs (including community colleges) accredited in, and having a campus located in the US, acting on behalf of their faculty members. Special Instructions for International Branch Campuses of US IHEs: If the proposal includes funding to be provided to an international branch campus of a US institution of higher education (including through use of subawards and consultant arrangements), the proposer must explain the benefit(s) to the project of performance at the international branch campus, and justify why the project activities cannot be performed at the US campus.
    • Non-profit, non-academic organizations: Independent museums, observatories, research labs, professional societies and similar organizations in the U.S. associated with educational or research activities.

Who May Serve as PI:

  • By the submission deadline, any PI, co-PI, or other senior project personnel must hold either:
    • a tenured or tenure-track position, or
    • a primary, full-time, paid appointment in a research or teaching position
    • at a US-based campus of an organization eligible to submit to this solicitation (see above), with exceptions granted for family or medical leave, as determined by the submitting organization. Individuals with primary appointments at for-profit non-academic organizations or at overseas branch campuses of U.S. institutions of higher education are not eligible.

Limit on Number of Proposals per Organization:

  • There are no restrictions or limits.

Limit on Number of Proposals per PI or Co-PI: 4

  • An individual can participate as a PI, co-PI or senior personnel on no more than four SaTC proposals. There is a limit of:
    • two proposals designated as CORE (across Small and Medium);
    • one proposal designated as TTP (across Small and Medium); and
    • one proposal designated as EDU.
  • These limits apply for the period from Oct 1st to Sept 30th of the following year to all proposals in response to this solicitation and are unrelated to any limits imposed in other NSF solicitations.
  • To treat everyone fairly and consistently, these eligibility constraints will be strictly enforced. If an individual exceeds these limits, only proposals received within the limits will be accepted, based on earliest date and time of proposal submission. No exceptions will be made.

For more information, please see