Cybersecurity Workforce

group_project

Visible to the public SaTC-EDU: EAGER: Transforming Usable Security and Privacy Education

Usability is widely recognized as important to the design of security and privacy systems. Despite this, very few of the lessons learned through usable security and privacy research are taught to students as part of a security or computing curriculum. There are few educational materials, no consensus as to the knowledge units and learning objectives, and little research on how to best integrate usable security concepts into security curricula.

group_project

Visible to the public TWC: TTP Option: Small: Collaborative: Scalable Techniques for Better Situational Awareness: Algorithmic Frameworks and Large-Scale Empirical Analyses

Attacks on computer networks are an all too familiar event, leaving operators with little choice but to deploy a myriad of monitoring devices to ensure dependable and stable service on the networks they operate. However, as networks grow bigger and faster, staying ahead of the constant deluge of attack traffic is becoming increasingly difficult. A case in point is the attacks on enterprise name servers that interact with the Domain Name System (DNS). These name servers are critical infrastructure, busily translating human readable domain names to IP addresses.

group_project

Visible to the public SBE: Small: Collaborative: Improving Security Behavior of Employees in Cyberspace through Evidence-based Malware Reports and E-Learning Materials

As the use of Web applications has increased, malicious content and cyber attacks are rapidly increasing in both their frequency and their sophistication. For unwary users and their organizations, social media sites such as Tumblr, Facebook, MySpace, Twitter, and LinkedIn pose a variety of serious security risks and threats. Recent studies show that social media sites are more in use for delivering malware than were previously popular methods of email delivery. Because of this, many organizations are looking for ways to implement effective security policies.

group_project

Visible to the public TWC: Small: STRUCT: Enabling Secure and Trustworthy Compartments in Mobile Applications

Society's dependence on mobile technologies rapidly increases as we entrust mobile applications with more and more private information and capabilities. Existing security research follows a common threat model that treats apps as monolithic entities and only captures attack surface between apps. However, recent research reveals that app internal attacks are emerging quickly as complex entities with conflicting interests are commonly included inside a single app to allow for rich features and fast development.

group_project

Visible to the public EDU: Lightweight Environment for Network Security Education

The goal of this project is to develop a lightweight infrastructure for supporting hands-on network security education (NSE) and a compelling set of exercises that rely on the infrastructure, covering the three basic aspects of the security: attack, analysis, and defense. Historically, building realistic Cybersecurity exercises has been both a laborious and resource-intensive task.

group_project

Visible to the public TWC: Frontier: Collaborative: Enabling Trustworthy Cybersystems for Health and Wellness

This frontier project tackles many of the fundamental research challenges necessary to provide trustworthy information systems for health and wellness, as sensitive information and health-related tasks are increasingly pushed into mobile devices and cloud-based services.

group_project

Visible to the public TWC: Small: Middleware for Certificate-Based Authentication

Every time someone uses a phone or computer to connect to an Internet site, software determines whether the connection is safe or being intercepted by attackers. Unfortunately, this software is error-prone, leaving users vulnerable to having their privacy violated or their personal information stolen due to phishing attacks, identity theft, and unauthorized inspection of their encrypted traffic. A number of solutions are being proposed, but the software is fragmented across many platforms and redundantly or incorrectly implemented.

group_project

Visible to the public TWC: Medium: Secure and Resilient Vehicular Platooning

The goal of the project is to provide a secure foundation for a transportation system that increasingly relies on the cooperation, connectedness, and automation of vehicles to achieve increases in safety, efficiency, and capacity. The financial losses attributable to congestion in America's transportation infrastructure are more than $1 trillion annually and the parallel loss of life in vehicle collisions is 40,000 deaths per year.

group_project

Visible to the public SaTC-EDU:EAGER:A Wiki Space for Information Security Education Exchange

Information security remains a persistent and growing problem in the United States due to ever-progressing reliance on information technologies and systems to provide critical services and enable society's contemporary way of life. The economics of computing favor performance and functionality over security and may continue to do so for some time. This environment is created by graduates of education programs, programs which can be argued to be lacking in emphasis on security impacts associated with this new information age.