Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu



Similar documents
Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas (UTD)

HOW I BUILT A CYBER SECURITY RESEARCH CENTER FROM GROUND ZERO Dr. Bhavani Thuraisingham

CYBER SECURITY RESEARCH AND EDUCATION AT THE UNIVERSITY OF TEXAS AT DALLAS (UTD)

Strategic Initiative Overview An Ecosystem Approach

NSF Workshop on Big Data Security and Privacy

Cyber Security at NSU

Cyber Innovation and Research Consortium

Information Assurance and Computer Security at UB

Developing. and Securing. the Cloud. Bhavani Thuraisingham CRC. Press. Taylor & Francis Group. Taylor & Francis Croup, an Informs business

Department of Computer Science: Graduate Catalog Faculty Professors: Farokh Bastani, R. Chandrasekaran, Ding-Zhu Du, András

WORKSHOP REPORT BIG DATA SECURITY AND PRIVACY Sponsored by the National Science Foundation September 16-17, 2014 The University of Texas at Dallas

Realization of Your Dream: Higher Study, Partnership, Collaboration Opportunities

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Cyber-security Research at Stony Brook

Big Data R&D Initiative

Time: 9:50-12:00 pm on Oct. 9, 2013 Location: TBA. Bios of Panelists

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Keynote 1. Scale and Programmability in Google s Software Defined Data Center WAN. Amin M. Vahdat University of California San Diego

Purdue University Department of Computer Science West Lafayette, IN Strategic Plan

US Federal Cyber Security Research Program. NITRD Program

Sunnie Chung. Cleveland State University

Assured Information Sharing for Security Applications: Malicious Code Detection

UNM Information Assurance Scholarship for Service (SFS) Program

University of Maryland Cybersecurity Center (MC 2 )

Information Assurance and Computer Security at UB

BSc in Information Technology Degree Programme. Syllabus

Information Assurance Program at West Point

Data Mining for Security Applications

Please see web page for the course information.

NATIONAL INITIATIVE FOR CYBERSECURITY EDUCATION SAN DIEGO, CA

US Federal Cyber Security Research Program November 15, 2012 New England Advanced Cyber Security Center Workshop Bill Newhouse (NIST)

End to End Defense against Rootkits in Cloud Environment Sachin Shetty

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

What is going on in Operating Systems Research: The OSDI & SOSP Perspective. Dilma M. da Silva IBM TJ Watson Research Center, NY dilmasilva@us.ibm.

Network Security Using Job Oriented Architecture (SUJOA)

Master s Degree Programs. Global Technology Leadership

Welcome to our Online Information Session! November 2014

Certified Cyber Security Analyst VS-1160

The Future of Cybersecurity Education

SDN Security Challenges. Anita Nikolich National Science Foundation Program Director, Advanced Cyberinfrastructure July 2015

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Outline. Who conducts research related to CIIP in the U.S.? Universities. What is Critical Information Infrastructure? Who sponsors this research?

GLORIA WASHINGTON, Ph.D. CONTACT:

No Free Lunch in Cyber Security

Terry Benzel USC Information Sciences Institute May 19, 2013 The Science of Cyber Security Experimentation

How To Research Security And Privacy Using Data Science

Security Issues for Cloud Computing

Computer Standards & Interfaces

Science or Security. George O. Strawn NSF & NITRD (retired)

TRUST Background. National Science Foundation Office of Integrative Activities (OIA) Core Funding (FY )

SECURE INFORMATION INTEGRATION WITH A SEMANTIC WEB-BASED FRAMEWORK

Courtesy Voicu Popescu

INFORMATION OPERATIONS & SECURITY SPRING REVIEW MTG

Meeting Cyber Security Challenges

capabilities statement

2014 Career Development Report

Center for Information. Security and Assurance (CISA) Charter. Mathematical, Computing, and Information Sciences (MCIS) Department

Curriculum Vitae Summary Employment University of Washington at Bothell Sept 2013 Present BBN Technologies June 2011 May 2013

Master of Cyber Security

Basic understanding of data security tools such as access control mechanisms, authentication tools and cryptographic constructs.

Scholarship for Service (SFS) PhD with Information Assurance (IA) Concentration*

Computer Science. College of Engineering

Security Framework for Cloud Computing Environment: A Review Ayesha Malik, Muhammad Mohsin Nazir

Computer Security and Investigations

Xianrui Meng. MCS 138, 111 Cummington Mall Department of Computer Science Boston, MA (857)

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Cloud storage Security Mechanism with Authentication in Public Cloud

Global Virtualization and Cloud Management Software Market

Discover Viterbi: Cyber Security Engineering & Informatics Programs

Addressing Human Behavior in Cyber Security

NSF Cyber Trust Report

Big Data - Security and Privacy

POSTGRADUATE OPEN DAY

Cyber Security and Big Data: The Role of CCICADA

The Science of Cyber Security. Peter Weinberger (Google Inc) (based on a study for DDR&E s Steven King, with no any conneceon to Google at all)

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

The Pratt Community Fiscal Year 2013

Outline. IT Security: General Trends and Research Directions. Technical Attacks. Typical attack. Automated attacks via Worms, Trojans, & Viruses

Cybersecurity at the Nexus of a Hyper- Connected World

Courtesy Voicu Popescu

Cybersecurity Definitions and Academic Landscape

Ccybersecurity Education

S 2 Virginia Tech Program Overview

Murat Kantarcioglu, Joint work with (Sharad Mehrotra(UCI), Bhavani Thuraisingham, Kerim Oktay(UCI), Vaibhav Khadilkar, Erman Pattuk)

What s the Big Deal? Big Data, Cloud & the Internet of Things. Christine Kirkpatrick San Diego Supercomputer Center, UC San Diego

Proposal for a Graduate Certificate in Information Assurance Education Track 2. Submitted. by the. School of Technology West Lafayette Campus

Cloud Computing: Outsourcing Computation without Outsourcing Control

NITRD and Big Data. George O. Strawn NITRD

d. City: State: Zip Code: i. Ethnicity: (check one) African American/Black Hispanic/Chicano(a)/Latino(a) Caucasian/White

Academic and Professional Degree Students

CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST618 Designing and Implementing Cloud Security CAST

Northrop Grumman Cybersecurity Research Consortium

PANEL SESSION: INFORMATION SECURITY RESEARCH AND DEVELOPMENT IN ACADEMIA

Firewall and VPN Investigation on Cloud Computing Performance

Certifications and Standards in Academia. Dr. Jane LeClair, Chief Operating Officer National Cybersecurity Institute

A Multi-Tier Approach to Cyber Security Education, Training, and Awareness in the Undergraduate Curriculum (CSETA)

Information and Network Security & Privacy Research

Testimony of. Before the. May 25, 2011

Transcription:

Cyber Security Research and Education Institute (CSI) The University of Texas at Dallas http://csi.utdallas.edu January 2014 1/29/2014 1

Our History NSA/DHS Center for Excellence in Cyber Security Education June 2004 Cyber Security Research Center (CSRC) Established October 4, 2004 NSA/DHS Center for Excellence in Cyber Security Research June 2008 Cyber Security Research and Education Center (CySREC) Established September 2010 Cyber Security Research and Education Institute (CSI) Established April 1, 2013

Our Faculty Founder Bhavani Thuraisingham, PhD, DEng (U of Wales, U of Bristol - UK) Core Faculty Michael Baron, PhD (U of MD) - Statistical Methods for Security Alain Bensoussan, PhD (University of Paris) - Risk Analysis for Security Nathan Berg, PhD (U of Kansas) - Economics and Security Alvaro Cardenas, PhD (U of MD) - Control Systems Security Yvo Desmedt, PhD (U. Leuven-Belgium) - Cryptography Zygmunt Haas, PhD (Stanford) Wireless Network Security Kevin Hamlen, PhD (Cornell) - Language and Software Security Murat Kantarcioglu, PhD (Purdue) - Data Security and Privacy Latifur Khan, PhD (U of Southern CA) - Big Data Analytics for Security Daniel Krawczyk, PhD (UCLA) - Psychosocial Aspects of Security Zhiqiang Lin, PhD (Purdue) - Systems Security and Forensics Yiorgos Makris, PhD (UC San Diego) - Hardware Security Kamil Sarac, PhD (UC Santa Barbara) - Education, Network Measurements

Our Accomplishments NSA/DHS Center for Excellence in Education (2004) and Research (2008) $22m in research funding and $3m in education funding Prestigious grants and contracts including: Multiple NSF Career, AFOSR YIP, DoD MURI Fellowships and Awards: IEEE, AAAS, IACR Fellowships; IBM Faculty Award, IEEE and ACM Awards e.g., IEEE CS Technical Achievement, IEEE SMC/Homeland Security Technical Achievement, ACM SIGSAC Outstanding Contributions Award Numerous keynote addresses, top-tier journal and conference publications, open source tools and prototypes, patents Collaborative research with AFRL, Raytheon, Rockwell, IBM (joint projects) Known for Interdisciplinary Research PhD Student placements at IBM TJ Watson, Google Privacy, Microsoft, Amazon, E-Bay, Raytheon, L-3, UCSD Medical School, Vanderbilt Medical School, UT Southwestern Medical Center, Blue Cross Blue Shield, Cisco, Clemson U,

Our Sponsors

Our Academic Collaborators

Research Thrust 1 Active Malware Defense Sponsors: AFOSR, NSF, NASA, Sandia, ONR Reactively Adaptive Malware and Frankenstein Reverse Engineering for Malware Detection Android Malware Detection Novel Data/Stream Mining Techniques for: Malware detection Insider threat analysis Intrusion detection Host Health Management Risk Analysis for Botnets

Research Thrust 2 Data Security and Privacy Sponsors: AFOSR, NSF, NIH, ARO Privacy Preserving Record Linkage and Mining Adversarial Data Mining Secure Data Provenance Policy and Incentive-based Assured Information Sharing Security and Privacy for Social Networks Inference Control Risk-aware Data Security and Privacy

Research Thrust 3 Secure Cloud Computing Sponsors: AFOSR, VMware Virtual Machine Introspection and VM Space Traveler Secure Virtualization Hybrid Cloud Security Secure Cloud Data Storage Secure Cloud Query Processing Cloud-based Assured Information Sharing Cloud-based Malware Detection Cloud Forensics

Research Thrust 4 Systems/Language/Networks/Hardware Security Sponsors: AFOSR, NSF, ARO, DARPA, CISCO Safe Re-use Oriented Reverse Engineering Binary Code Analysis In-Line Reference Monitor Hardware Trojan Detection Network Measurements Control Systems Security Cryptographic Techniques

Research Thrust 5 Data/Security Analytics Sponsors: IARPA, Raytheon, Tektronix, Nokia, NASA, NGA, AFOSR, MITRE Semantic Web Data Management and Integration Geospatial Data Management and Integration Stream-based Novel Class Detection for Text Social Network Data Analytics Multimedia Data Management and Mining

Education Thrust Sponsors: NSF, DoD NSF SFS Scholarship for Service DoD IA Scholarship NSF Assured Cloud Computing Degrees and Certificates Courses Offered Computer/Information Security, Network Security, Data and Applications Security, Digital Forensics, Cryptography, Data Privacy, Secure Web Services, Secure Cloud Computing, Hardware Security, CISSP Modules Secure Social Networks, Data Mining for Security, Big Data Analytics, Critical Infrastructure Protection, Biometrics, Security Engineering

Intellectual Property and Technology Transfer Tweethood Dr. Latifur Khan Patent pending technology that started with location mining on Tweets and extended to mining several demographic attributes Complete system built around Tweethood Presented to CIA and USAF, and CIA will introduce the technology to IN-Q-TEL VM Space Traveler Dr. Zhiqiang Lin Patent pending technology on virtualization security VMware has expressed interest in licensing; 70K gift from VMware for further development SNOD Stream-based Novel Class Detection Patent-pending technology jointly by Dr. Latifur Khan and Dr. Jiawei Han (UIUC) System being developed around SNOD IBM has expressed interest in licensing

Contact Ms. Rhonda Walls, Project Coordinator rhonda.walls@utdallas.edu, (972) 883-2731 Dr. Bhavani Thuraisingham, Founding Executive Director bhavani.thuraisingham@utdallas.edu, (972) 883-4738