Division of Graduate Education (DGE)
group_project
Submitted by jurban on Tue, 08/27/2019 - 3:48pm
This capacity track project is developing an interdisciplinary, cybersecurity education program for engineers that must be aware of critical design issues for addressing cybersecured control systems for electromechanical devices, more effective techniques for the integration of secure software and hardware devices, and associated law and policy issues.
group_project
Submitted by Jun Dai on Tue, 08/13/2019 - 11:21am
The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational concepts in secure programming, and continuously learn and practice defensive, secure, and robust coding.
group_project
Submitted by Matt Bishop on Tue, 08/13/2019 - 11:16am
The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational concepts in secure programming, and continuously learn and practice defensive, secure, and robust coding.
group_project
Submitted by Ida Ngambeki on Tue, 08/13/2019 - 11:14am
The field of software development needs developers to write secure code, as well as to continuously respond to evolving threats and adapt system designs to meet new security needs. This requires developers to gain a deep understanding of foundational concepts in secure programming, and continuously learn and practice defensive, secure, and robust coding.
group_project
Submitted by ahmirf44 on Tue, 03/19/2019 - 3:18pm
Engineering a secure IT system, in addition to technical skills, requires a particular mindset focused on using cybersecurity solutions effectively against sophisticated and stealthy cyber attacks. The traditional lecture-centric style of teaching has failed to deliver that mindset, which is the direct result of an over-emphasis on specific technical skills (with limited lifespan and insufficient technical depth), abstract rather than deeply technical examination of fundamental concepts, and an impatience in developing broader analytical skills.
group_project
Submitted by Meng Yu on Tue, 03/19/2019 - 3:10pm
With the advancement of technologies, networked devices become ubiquitous in the society. Such devices are not limited to traditional computers and smart phones, but are increasingly extended to cover a wide variety of embedded systems (ES), such as sensors monitoring bridges, electronics controlling the operation of automobiles and industrial equipment, home medicine devices that are constantly reporting patient health information to doctors.
group_project
Submitted by ahmirf44 on Mon, 03/18/2019 - 1:28pm
Cybersecurity is one of the most strategically important areas in computer science, and also one of the most difficult disciplines to teach effectively. Historically, hands-on cyber security exercises helped students reinforce basic concepts, but most of them focused on user level attacks and defenses. Since OS kernels provide the foundations to the applications, any compromise to OS kernels will lead to an entirely untrusted computing. Therefore, it is imperative to teach students the practice of kernel level attacks and defenses.
group_project
Submitted by zlin61 on Mon, 03/18/2019 - 11:42am
Cybersecurity is one of the most strategically important areas in computer science, and also one of the most difficult disciplines to teach effectively. Historically, hands-on cyber security exercises helped students reinforce basic concepts, but most of them focused on user level attacks and defenses. Since OS kernels provide the foundations to the applications, any compromise to OS kernels will lead to an entirely untrusted computing. Therefore, it is imperative to teach students the practice of kernel level attacks and defenses.
group_project
Submitted by Phil P on Mon, 03/18/2019 - 9:36am
SRI International (SRI) and Asylum Labs (Asylum) propose using 3D virtual world gaming technologies to enhance the understanding, engagement factors, and the recruitment impact of Cyber Challenge Competitions (C3). This project intends to address the C3 engagement challenge by designing visualization and presentation technologies that have proven highly successful in e-Sports leagues. The project will demonstrate how C3 forums can be transformed with a high-engagement visualization layer for cybersecurity talent recruitment.
group_project
Submitted by Wu-chang Feng on Fri, 03/15/2019 - 11:13am
It is estimated that a security flaw occurs in in every 100 lines of code written, which makes it difficult to develop secure, and trustworthy software. Given the lack of a sufficient number of developers, the computing industry is turning to smart fuzzing and symbolic execution tools that automatically discover and patch vulnerabilities in computing systems. While these techniques are becoming widely used in industry, few academic programs include these concepts in their educational programs.