The National Security Agency Research Directorate began funding foundational research at Lablet institutions beginning in 2012 through the Science of Security (SoS) Initiative. The Lablets were funded in order to promote foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. In 2014, the SURE project was founded to investigate cybersecurity in the cyber-physical systems realm. The Lablet and SURE projects are listed below.

Project Title Lead PI Project Abstract All terms Last Updatedsort icon
Coordinated Machine Learning-Based Vulnerability & Security Patching for Resilient Virtual Computing Infrastructure Xiaohui (Helen) Gu This research aims at aiding administrators of virtualized computing infrastructures in making services more resilient to security attacks through applying machine learning to reduce both security and functionality risks in software patching by... Resilient Architectures, NCSU Aug 7 2019 - 5:47pm
Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities Andy Meneely The goal of this project is to aid security engineers in predicting the difficulty of system compromises through the development and evaluation of attack surface measurement techniques based upon attacker-centric vulnerability discovery processes. Metrics, Predicting the Difficulty of Compromise through How Attackers Discover Vulnerabilities Jul 18 2019 - 3:34pm
Principles of Secure BootStrapping for IoT Ninghui Li This project seeks to aid developers in designing and implementing protocols for establishing mutual trust between users, Internet of Things (IoT) devices, and their intended environment through identifying principles of secure bootstrapping, including... Policy-Governed Secure Collaboration, Principles of Secure BootStrapping for IoT Jul 18 2019 - 3:34pm
Reasoning about Accidental and Malicious Misuse via Formal Methods Munindar Singh This project seeks to aid security analysts in identifying and protecting against accidental and malicious actions by users or software through automated reasoning on unified representations of user expectations and software implementation to identify... Policy-Governed Secure Collaboration, Reasoning about Accidental and Malicious Misuse via Formal Methods Jul 18 2019 - 3:34pm
Side-Channel Attack Resistance Heechul Yun Cyber-Physical Systems (CPS)--cars, airplanes, power plants, and etc.--are increasingly dependent on powerful and complex hardware for higher intelligence and functionalities. However, this complex hardware may also introduce new attack vectors--hardware... Side-Channel Attack Resistance, Scalability and Composability Dec 3 2018 - 1:44pm
Scalable Trust Semantics & Infrastructure Warren Alexander Remote attestation provides a run-time capability for appraising system behavior and establishing trust. Using remote attestation, an appraiser requests evidence describing a target. The target responds by performing measurement to gather evidence then... Policy-Governed Secure Collaboration, Scalable Trust Semantics & Infrastructure, Scalability and Composability Dec 3 2018 - 1:44pm
Formal Approaches to the Ontology & Epistemology of Resilience John Symons Security Science requires reflection on its foundational concepts. Our contention is that in order to make informed decisions about trade-offs with respect to resilient properties of systems we must first precisely characterize the differences between the... Formal Approaches to the Ontology & Epistemology of Resilience, Resilient Architectures Dec 3 2018 - 1:44pm
Cloud-Assisted IoT Systems Privacy Fengjun Li The key to realizing the smart functionalities envisioned through the Internet of Things (IoT) is to securely and efficiently communicate, store, and make sense of the tremendous data generated by IoT devices. Therefore, integrating IoT with the cloud... Cloud-Assisted IoT Systems Privacy, Metrics, Resilient Architectures, Scalability and Composability Sep 27 2018 - 4:19pm
Multi-model Test Bed for the Simulation-based Evaluation of Resilience Peter Volgyesi We have developed the SURE platform, a modeling and simulation integration testbed for evaluation of resilience for complex CPS [1]. Our previous efforts resulted in a web-based collaborative design environment for attack-defense scenarios supported by a... Metrics, Multi-model Test Bed for the Simulation-based Evaluation of Resilience Jun 27 2018 - 12:06pm
Foundations for Cyber-Physical System Resilience Xenofon Koutsoukos The goals of this project are to develop the principles and methods for designing and analyzing resilient CPS architectures that deliver required service in the face of compromised components. A fundamental challenge is to understand the basic tenets of... Foundations of a CPS Resilience, Resilient Architectures Jun 6 2018 - 3:36pm
Analytics for Cyber-Physical System Cybersecurity Nazli Choucri Mounting concerns about safety and security have resulted in an intricate ecosystem of guidelines, compliance measures, directives and policy reports for cybersecurity of all critical infrastructure. By definition, such guidelines and policies are written... Analytics for Cyber-Physical System Cybersecurity, Policy-Governed Secure Collaboration Jun 6 2018 - 3:11pm
Resilience and security in component-based software architectures for CPS Gabor Karsai Abstract:

Cyber-Physical Systems are converging towards a component-oriented and platform-based implementation. The community-driven Robotic Operating Systems and the proprietary Residential Operating System (of Prodea) are just two examples that...
Architectures, Architectures, composability, Resilient Architectures, Scalability, Vanderbilt, Resilient Systems Aug 21 2017 - 1:08am
A Language and Framework for Development of Secure Mobile Applications Jonathan Aldrich Mobile applications are a critical emerging segment of the software industry, and security for web-based mobile applications is of increasing concern. We hypothesize that many of the most important security vulnerabilities in web-based mobile... A Language and Framework for Development of Secure Mobile Applications, A Language and Framework for Development of Secure Mobile Applications, CMU, CMU Aug 21 2017 - 12:55am
Decentralization in Security: Consequences and Incentive Design Yevgeniy Vorobeychik In security, our concern is typically with securing a particular network, or eliminating security holes in a particular piece of software. These are important, but they miss the fact that being secure is fundamentally about security of all constituent... Resilient Architectures, Science of decentralized security, Vanderbilt Aug 21 2017 - 12:52am
Threat Modeling/Risk Analysis Xenofon Koutsoukos With the increased use of cyber physical systems in current defense, medical, and energy applications, it is critical for the infrastructure to remain secure. As such, it is important to identify potential security flaws early in the design process in... Resilient Architectures, Modeling, Vanderbilt, Resilient Systems Jun 26 2017 - 10:13pm
Evaluation and Experimentation Peter Volgyesi This research thrust focuses on the design and development of a highly accessible and scalable testbed environment for supporting the evaluation and experimentation efforts across the entire SURE research portfolio. This work is based on our existing... Resilient Architectures, Testing, Control, Modeling, Vanderbilt, Evaluation and experimentation, Resilient Systems, Simulation Jun 26 2017 - 10:13pm
Resilient Monitoring and Control Xenofon Koutsoukos CPS employ Networked Control Systems (NCS) to facilitate real-time monitoring and control. Security of the NCS infrastructure is a large problem due to (1) the wide deployment of commercial-off-the-shelf (COTS) computing devices, (2) the connectivity of... Resilient Architectures, Resilient monitoring and control, Vanderbilt, Resilient Systems Jun 26 2017 - 10:13pm
Reasoning about Protocols with Human Participants Jonathan Katz Existing protocol analysis are typically confined to the electronic messages exchanged among computer systems running at the endpoints. In this project we take a broader view in which a protocol additionally encompasses both physical technologies as well... Understanding and Accounting for Human Behavior, UMD Jun 22 2017 - 7:05pm
Trust, Recommendation Systems, and Collaboration John Baras Our goal is to develop a transormational framework for a science of trust, and its impact on local policies for collaboration, in networked multi-agent systems. The framework will take human bahavior into account from the start by treating humans as... Policy-Governed Secure Collaboration, Scalability and Composability, Understanding and Accounting for Human Behavior, UMD Jun 22 2017 - 7:04pm
Anonymous Messaging Pramod Viswanath Anonymity is a basic right and a core aspect of Internet. Recently, there has been tremendous interest in anonymity and privacy in social networks, motivated by the natural desire to share one's opinions without the fear of judgment or personal reprisal (... Scalability and Composability, UIUC Jun 22 2017 - 5:50pm