Institute for Cyber Security



Similar documents
The Science, Engineering, and Business of Cyber Security

Cyber Innovation and Research Consortium

PH.D. IN BUSINESS ADMINISTRATION

Cyber Security: What You Need to Know

Cyber Security: Past, Present and Future

Doctoral Education Quality Assurance System of Shanghai Jiao Tong University. Yaguang Wang Nov.14, 2014

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Department of Psychology Policies and Procedures Revised by Faculty Vote February 8, 2012

Associate Dean, Graduate Academic & Faculty Affairs College of Professional Studies Boston, MA

The Science, Engineering, and Business of Cyber Security

A Strategic Plan for Research Growth at UNC Charlotte

College of Medicine Promotion and Tenure Procedure FLORIDA ATLANTIC UNIVERSITY

The Board of Directors

Maxine Goodman Levin College of Urban Affairs

Fast Facts About The Cyber Security Job Market

DISCUSSION ITEM ANNUAL REPORT ON NEWLY APPROVED INDIRECT COSTS AND DISCUSSION OF THE RECOVERY OF INDIRECT COSTS FROM RESEARCH BACKGROUND

NATIONAL NURSING RESEARCH STRATEGY OF SOUTH AFRICA

Leadership Statement Dean College of Design, Construction and Planning

PHD FELLOWSHIPS at the University of Rochester

How To Rank A Graduate School

College of Architecture Strategic Plan

DIRECTOR, POPULATION HEALTH SCIENCES INITIATIVE

How To Become Director Of Development At Northeastern

Jyväskylä Cyber Security Ecosystem

Entrepreneurial Opportunities for Georgia Tech Students

MBA. Master. Market Access. Part-time berufsbegleitend. Pharmacovigilance. Strategic Management. Regulatory Affairs.

Q2 Which university will you be attending? American University (366) Arizona State University (367) Boston University (368) Brown University (439)

The Graduate School STRATEGIC PLAN

College of Architecture Strategic Plan

SMU PhD IN PSYCHOLOGY. Cutting-edge insights into individuals, organisations and societies

US News & World Report Graduate Program Comparison Year ranking was published

Architecture & Design Schools

TAKE IT TO THE NEXT LEVEL. College of Nursing. Graduate Studies. College of Nursing

Tsinghua University School of Economics and Management (Tsinghua SEM) Fact Sheet (As of March 31, 2013)

DRAFT THE CONTEXT: NORTHEASTERN 2015

The Future of Cyber Security

CURRICULUM VITAE. Master of Arts, Library Science (ALA Accredited) 1997 University of Arizona Graduate College, Tucson, Arizona

National Science Foundation Funding Opportunities for Cybersecurity Education and Workforce Development

Position Specification. Texas A&M University. Dean, Mays Business School. August Korn Ferry. All Rights Reserved.

The University of Toledo College of Medicine and Life Sciences Faculty Tracks for Academic Rank and Criteria for Promotion

Building a Successful Cyber-security Program

UNIVERSITY GLOBAL PARTNERSHIP NETWORK (UGPN) RESEARCH COLLABORATION FUND 2014 THIRD CALL FOR PROPOSALS

Research Interests: IT adoption and implementation; human-computer interaction; IT in small business; computer ethics.

A Fast Track to Attaining a Prestigious US Bachelor Qualification

UC AND THE NATIONAL RESEARCH COUNCIL RATINGS OF GRADUATE PROGRAMS

NASCIO 2014 State IT Recognition Awards

I.Program Objectives. Need and Justification

CAREER SYNOPSIS. Marsha L. Lewis, PhD, RN

Darden School. Commission/Schools/Darden/November

in the Rankings U.S. News & World Report

Executive Search Announcement

Celebrating Partnerships: 2015 NACME Continuum Meeting

Tsinghua University School of Economics and Management (Tsinghua SEM) Fact Sheet (As of September 30, 2013)

TARLETON STATE UNIVERSITY COLLEGE OF GRADUATE STUDIES GRADUATE COUNCIL

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

US News and World Report Ranking

OUTLINE FOR AN INTERDISCPLINARY CERTIFICATE PROGRAM

ONUR BAYAR. Graduate School of Industrial Administration, Carnegie Mellon University, M.S. in Financial Economics, 2002.

NATIONAL NURSING RESEARCH STRATEGY FOR SOUTH AFRICA

SUBRAMANIAN BALA BALACHANDER Curriculum Vitae. Purdue University West Lafayette, IN West Lafayette, IN 47907

The University of Louisville College of Business Dean

NORTHEASTERN Distinctively Excellent PhD Education. Context

2001 National Name Exchange

Herman Aguinis, John F. Mee Chair of Management, Indiana University. Federico Aime, William S. Spears Chair in Business, Oklahoma State University

Evaluation of Intellectual Property Course Offerings for undergraduate engineering students in the Mid Atlantic Region

NSF Cyber Security Conference. FBI Counterintelligence Domain Program Briefing

Computer Science Strategic Plan:

REGULATIONS LUISS BUSINESS SCHOOL. SECTION I Purpose and Scope

in the Rankings U.S. News & World Report

National Rankings AND RECOGNITION. Bloomberg Businessweek. Princeton Review. Hispanic Business. Since 2007 inaugural rankings.

Enhancing University Research through Corporate Engagement and Collaboration

A business school like no other

the school of PUBLIC POLICY

Master of Public Administration. A Fast Track to Attaining a Prestigious US MPA Qualification

Master of Business Administration. A Fast Track to Attaining a Prestigious US MBA Qualification

COMING TOGETHER, ENVISIONING THE FUTURE: THE STRATEGIC PLAN OF THE DEPARTMENT OF COMMUNICATION, UNIVERSITY OF MARYLAND

Bachelor of Business Administration

Transcription:

Institute for Cyber Security The Institute for Cyber Security (ICS) conducts basic and applied research in partnership with academia, government and industry. The Institute's Executive Director Prof. Ravi Sandhu reports to the Dean, College of Science and to the Vice-President of Research. Research Our researchers bring exceptional expertise in cyber security models, architectures, protocols and technologies, and world-class laboratories, to basic and applied research. Their past innovations are widely practiced and their foundational results have had sustained influence. Philosophy ICS research is motivated by the two big questions in cyber security: What does it mean to be secure? Modern cyber systems involve numerous stakeholders with different, and typically conflicting, security and privacy priorities. Reconciliation of these multiple priorities and allocation of costs, liability and recourse responsibilities is at best an art today. ICS seeks to develop the knowledge, insights and tools necessary to make this process more of a science. How do we achieve the desired security? Of equal priority is study of how to achieve the desired security by use of existing security technology where applicable and invention of new security technologies where needed. Progress on these two questions requires collaboration with researchers and practitioners in various application and technology domains. Collaboration is crucial to the ICS research agenda. Research Excellence Cyber security research at ICS encompasses four major thrust areas with mutual synergy. Foundations: Core principles, models and theories for cyber security and their translation to practice. ICS researchers have a distinguished record of contributions to cyber security foundations and continued activity in this fundamental arena. Application-Centric: Theory and practice of security for new and emerging application domains. Current projects include: Secure Information Sharing Social Computing Security Infrastructure Assurance Assured Data Provenance Privacy Policies and Enforcement Technology-Centric: Theory and practice of security in context of specific technologies which present novel challenges due to the intrinsic nature of the technology. Current projects include:

Trustworthy Cloud Computing Attack-Centric: Theory and practice of malware analysis and detection. Current projects include: Botnet Analysis and DefenseICS research leaders bring a deep knowledge of cyber security models, architectures, mechanisms and protocols, as well as a deep knowledge of cyber technologies to their research. Past innovations by ICS researchers are widely recognized and practiced in industry. Additionally, ICS researchers have produced significant foundational results with sustained influence in the cyber security research community. ICS can mobilize world-caliber multi-disciplinary teams to address specific research problems utilizing researchers within UTSA and external to UTSA amongst our network of national and international R&D partners, collaborators and friends. Research Labs ICS has built and operates two world-class academic research laboratories dedicated to studying current and emerging cyber security issues. Both environments are managed by full-time dedicated technical staff who possess cyber security experience in industry, government, and academia. The laboratories were funded by a $1 million grant from the UT System as part of Professor Ravi Sandhu s initial recruitment package to UTSA and have received additional support from Dell Computers and the United States Airforce. ICS FlexCloud The ICS FlexCloud is one of the first dedicated academic Cloud Computing research environments focused on studying security challenges surrounding Cloud Computing. It offers significant compute capacity and similar design features adopted by Cloud Computing providers. ICS FlexFarm The ICS FlexFarm is an Internet connected environment providing researchers with a dedicated platform to conduct academic research on malware programs and methods for improving malware detection, faster response times to malware infections and effective malware removal techniques, with a special focus on botnets. Research Sponsors National Science Foundation (NSF) Air Force Office of Scientific Research (AFOSR) Air Force Research Laboratory (AFRL) Office of Naval Research (ONR) Department of Homeland Security (DHS) Texas Emerging Technology Fund (ETF) The University of Texas System External Corporate Partners BAE Systems Dell Denim Group Rackpace Silicon Informatics Southwest Research Institute Symantec

External Partners Arizona State University Georgia Institute of Technology University of Illinois at Urbana Champaign University of Maryland at Baltimore County University of Massachusetts Boston University of Michigan University of North Carolina at Charlotte Pennsylvania State University Purdue University Texas A&M University University of Texas at Dallas University of Wisconsin Madison UTSA Partners College of Sciences Department of Center for Infrastructure Assurance and Security College of Engineering Department of Electrical and Computer Engineering College of Business Department of Information Systems and Technology Management Center for Education and Research in Information and Infrastructure Security Center for Innovation and Technology Entrepreneurship Office of the Vice-President for Research South Texas Technology Management Publications Publications by ICS researchers are available at their individual home pages at their discretion. Projects Assured Information Sharing LifeCycle Provsec People Management Ravi Sandhu

Executive Director Lutcher Brown Endowed Professor of Cyber Security Robert W. Gracy Vice-President for Research George Perry Dean College of Science Advisory Board John Dickson Principal Denim Group Pradeep K. Khosla PhD, Dean of the College of Engineering and the Philip and Marsha Dowd University Professor at Carnegie Mellon University William Hugh Murray Executive Consultant, Information Assurance, Associate Professor, Naval Postgraduate School Joe Sanchez Department of Defense Research Faculty Ravi Sandhu Executive Director and Chief Scientist Lutcher Brown Endowed Professor of Cyber Security Rajendra V. Boppana Ram Krishnan Assistant Professor of Electrical and Computer Engineering Qi Li Postdoctoral Fellow Bao Liu Assistant Professor of Electrical and Computer Engineering Jianwei Niu Assistant Professor of Jaehong Park Research Associate Professor of Cyber Security

Murillo Pontual Postdoctoral Fellow Chunjiang Qian Associate Professor of Electrical and Computer Engineering Yilun Shang Postdoctoral Fellow Visiting Research Scholar, Shanghai Jiao Tong University Ram Tripathi Professor of Management Science and Statistics Jeffery von Ronne Assistant professor of Gregory White Director of ICS-CIAS and Associate Professor of Shouhuai Xu Associate Professor of Keying Ye Professor of Management Science and Statistics Research Scholars Md. Shamim Ashik Jared Bennatt Khalid Zaman Bijon Prosonjit Biswas Yuan Cheng Omar Haider Chowdhury

Andreas Gampe Ruting Jia Electrical and Computer Engineering Ying Ji Management Science and Statistics Xin Jin Weiliang Luo Dang Nguyen Hui "Catherine" Shen Bo Tang Li Xu Zhenxin Zhan Wanying Zhao Yun "Amy" Zhang Qingji Zheng Research and Professional Staff Carlos Cardenas Associate Director Administrative Staff

Suzanne Tanaka Administrative Manager Stanley Dappa Student Assistant About ICS Vision Cyber space is becoming ever more pervasive and entangled with physical space and our daily work and social lives. We need new methodologies and endless innovation to keep cyber space safe for our nation and its individual citizens, so we can fully realize the productivity and quality-of-life potential offered by cyber technologies. UTSA and its Institute for Cyber Security put Texas in a prominent position for this effort. ICS Mission The Institute for Cyber Security pursues world-leading research with real-world impact, including development of commercializable technologies and services. ICS Goals Be a world leader in cyber security research, and thereby put UTSA, San Antonio and Texas on the cyber security research map. Advance the cyber security profession towards a sound scientific and engineering discipline from its current immature state. Improve the cyber security posture of the United States of America so its citizens can fully benefit from the ongoing cyber revolution. ICS History The Institute for Cyber Security was created at UTSA in June 2007 through a competitive $3.5 million grant from the Texas Emerging Technology Fund. Prof. Ravi Sandhu, a world-renowned cyber-security researcher, scholar, educator and entrepreneur, was invited to join UTSA as the Founding Executive Director as a condition of the funding. UTSA awarded a $1.0 million Lutcher Brown Endowed Chair to Prof. Sandhu. The STARS program of the University of Texas System subsequently awarded a $1.0 million grant to Prof. Sandhu for furthering the Institute s mission. Cyber security was identified as an area of strategic importance for UTSA and for San Antonio in 2000. The Center for Infrastructure Assurance and Security was established at UTSA in 2001. Cyber-security research and education activities were pursued in the Colleges of Science, Engineering and Business. Exercises, training and competition activities were pursued in the Center. A vision for the Institute for Cyber Security was articulated in 2005 with the goal of strengthening and synergizing the already substantial cyber security activities and expertise across UTSA, and particularly to develop a worldleading research reputation in cyber security. A winning proposal to establish the Institute was submitted to the Texas Emerging Technology Fund, leading to founding of the Institute and invitation of Prof. Sandhu to lead it as a condition of the funding. San Antonio business, government and academic leaders were crucial to this process with special acknowledgement of the leadership of David Spencer. The Institute reports to the Dean of the College of Science and to the Vice-President for Research.

Join Us Staff positions are posted at the UTSA jobs site at http://www.utsajobs.com as they become available. Tenure-track faculty positions are advertised directly by the respective Departments. Current tenure-track faculty and graduate students can become members of the Institute through research collaboration. Recruitment of research faculty and post-doctoral researchers is opportunistic. If you are interested in contributing to the ICS research agenda please reach out directly to Prof. Sandhu or other Institute members. Incoming graduate students need to apply to the individual departments for admission. ICS plays no role in the admission process but once students are at UTSA they can reach out to Prof. Sandhu or other Institute members. Contact ICS Mailing Address: Office: SB 4.02.08 Institute for Cyber Security University of Texas at San Antonio One UTSA Circle, San Antonio, TX 78249. You can also contact the ICS Administrative Manager Suzanne Tanaka for more information at: Phone: +1.210.458.6327 Fax: +1.210.458.6921 E-mail: suzanne.tanaka@utsa.edu