NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security)

Similar documents
Welcome to the NSF Webinar on our newest solicitation on hardware security.

Learning and Learning Environments. Broadening Par2cipa2on in STEM. STEM Professional Workforce

Take My Cash, Please. aka NSF Funding Opportuni/es in Secure and Trustworthy Cyberspace (SaTC) (only be sure always to call it, please, research)

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

BPO. Accerela*ng Revenue Enhancements Through Sales Support Services

NIST Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting

Graduate Systems Engineering Programs: Report on Outcomes and Objec:ves

Update on the Cloud Demonstration Project

Founda'onal IT Governance A Founda'onal Framework for Governing Enterprise IT Adapted from the ISACA COBIT 5 Framework

Mission. To provide higher technological educa5on with quality, preparing. competent professionals, with sound founda5ons in science, technology

Challenges of PM in Albania and a New. Professional Perspec8ve. Prepared by: Dritan Mezini, MBA, MPM B.S. CS

IT Governance in Organizations Experiencing Decentralization. Jelena Zdravkovic

CC-NIE PI Workshop Plenary

Engaging and Maintaining Suppor/ve Rela/onships with School Systems

Council Monitoring & Assessment Program Development

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Welcome! Accelera'ng Pa'ent- Centered Outcomes Research and Methodological Research. Andrea Heckert, PhD, MPH Program Officer, Science

UAB Cyber Security Ini1a1ve

ECEC Europe s Cloud Future. Chambre du Commerce September. October. 14. Mai 2013, Konzerthaus. 1st 2014

CLINES Cluster- based Innova6on through Embedded Systems technology

DEEP FILM ACCESS Project (Digital Transforma4ons in the Arts and Humani4es: Big Data) February 2014 April 2015

Provider Communica/on Interven/on at a Federally Qualified Health Center- based Farmers' Market: Implica/ons for Implementa/on Science

San Jacinto College Banner & Enterprise Applica5on Review Task Force Report. November 01, 2011 FINAL

David S. Lee, MPH. Campus sexual violence preven;on: An overview of opportuni;es and challenges in policy and programs

I- Corps for Learning Teams

The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report:

Update on the Cloud Demonstration Project

GÉANT Cloud Ac-vity Towards Pan- European Cloud Services Kris?n Selvaag

Accountable Care Organizations: Implications for CHCs Serving AA&NHOPIs

Pu?ng B2B Research to the Legal Test

PES Has The Sustainable Solu2on For Chronic Care Management

Capitalize on your carbon management solu4on investment

Business Analysis Center of Excellence The Cornerstone of Business Transformation

Na#onal Cybersecurity Network. Advancing Innova,ve Workforce Solu,ons for America s High- Skilled, High- Demand Jobs December 2, 2014

Introduc)on to the IoT- A methodology

Protec'ng Informa'on Assets - Week 8 - Business Continuity and Disaster Recovery Planning. MIS 5206 Protec/ng Informa/on Assets Greg Senko

Business Analysis Standardization A Strategic Mandate. John E. Parker CVO, Enfocus Solu7ons Inc.

CSER & emerge Consor.a EHR Working Group Collabora.on on Display and Storage of Gene.c Informa.on in Electronic Health Records

U.S.UCAN and its role in Wisconsin

Developing Your Roadmap The Association of Independent Colleges and Universities of Massachusetts. October 3, 2013

Boise State University Social Media Handbook

About the Board. Minnesota Board of Behavioral Health and Therapy 10/24/12. Minnesota Board of Behavioral Health and Therapy

Exchange of experience from a SuccessFactors LMS Implementa9on

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Energy Efficiency Indicators and Target Se3ng in South Africa

Workshop #1. Structuring complex partnered research projects and proposals

Achieving Global Cyber Security Through Collaboration

Data Governance Framework: Bank of Canada

So#ware quality assurance - introduc4on. Dr Ana Magazinius

Fulbright Specialist Program: Loca6ng Collaborators and Developing a Project Proposal. July 15, 2016 Jay Carey

Project Management Introduc1on

Packages for heavy industry : Insights into Industrial Energy Conserva+on Policies. IIP- CECA- CSEP- ERI Workshop February 20, 2012, Beijing

This webinar covers solicitation NSF , The NSF Cloud infrastructure, and its re-issuance.

Barrie McWha Welcome and Introduc3ons

Bill Sieglein, Founder CSO Breakfast Club PLATINUM SPONSOR: SOLUTIONARY

What Do Our Data Tell Us: Two Reports Examining Correla;ons in Utah Data

Pu#ng together a bioinforma1cs team: 2014 compared with 1997

Everything You Need to Know about Cloud BI. Freek Kamst

CFITS Industry Partners

Distributed Solar: Joyce McLaren. Illinois Solar Energy Conference. July 16, Issues and Op4ons for U4li4es and Decision Makers

Part 1 : STRATEGIC : But let s begin with WHY : Why are we doing this?

CMMI for High-Performance with TSP/PSP

Application of Supply Chain Concepts to the Analysis Process

Vision of Interoperability Jamie Ferguson, Stan Huff, Cris Ross

CS 5150 So(ware Engineering Evalua4on and User Tes4ng

GAME-CHANGING TRENDS IN SUPPLY CHAIN

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

Pathways Programs. Recrui'ng and Hiring Students and Recent Graduates into Federal Careers

Bank of America Security by Design. Derrick Barksdale Jason Gillam

QEM /CAREER Workshop. Wanda E. Ward, PhD. Office of International and Integrative Activities (IIA) National Science Foundation March 14, 2014

Cost Effec/ve Approaches to Best Prac/ces in Data Analy/cs for Internal Audit

Selling Hosted MS Exchange 2010 & SharePoint

The Shi'ing Role of School Psychologists within a Mul7-7ered System of Support Framework. FASP Annual Conference October 29, 2015

Adap%ve Cybersecurity Technologies: Impact

Case Study. The SACM Journey at the Ontario Government

The Great Lakes Futures Project Assessing what the state of the Great Lakes St. Lawrence River Basin could be in 50 years.

Licensing++ for Clouds. Mark Perry

MAXIMIZING THE SUCCESS OF YOUR E-PROCUREMENT TECHNOLOGY INVESTMENT. How to Drive Adop.on, Efficiency, and ROI for the Long Term

IT Change Management Process Training

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Fixed Scope Offering (FSO) for Oracle SRM

Information and Communications Technology Supply Chain Risk Management (ICT SCRM) AND NIST Cybersecurity Framework

Computer Security Incident Handling Detec6on and Analysis

We are pleased to offer the following program to Woodstock Area Educators:

Asset Management and Mobile GIS Data Collec6on: Best Prac6ces Using ipads and Tablet Computers

UCLA: Data management, governance, and policy issues

Rwanda Health Enterprise Architecture (RHEA) Project Mee:ng HEAF/HEART Update 26 October 2012 Kigali

College and Career Readiness Models: The Na3onal Perspec3ve and Illinois STEM CCR Models

WEBINAR: The University Startups Demo Day (USDD) HOW UNIVERSITIES CAN PARTICIPATE April 29, 2016

UNIFIED, END- TO- END EDISCOVERY

Building your cloud porbolio APS Connect

STEM Educa*on in the 21 st Century: Crea*ng a Virtual Community of Prac*ce for STEM Learners

Paco Hope Florence Mo ay <fmo 2012 Cigital. All Rights Reserved. SecAppDev. Define third party so ware

Managed Services. An essen/al set of tools for today's businesses

Research in Simulation: Research and Grant Writing 101

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

Wandering Lonely as a Cloud. Arts and Humani7es, Clouds, Crowds and Seamless Infrastructures

Ana Juan Ferrer Cloud Forward 2015, 07/10/2015

Transcription:

NSF Webinar on NSF Solicita9on 14-571 NSF/Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Farnam Jahanian, Keith Marzullo, Angelos D. Keromy9s, David Corman Jeremy Epstein, Ralph Wachter, Nina Amla Directorate for Computer and Informa9on Science and Engineering N a t i o n a l S c i e n c e F o u n d a t i o n Wen- Hann Wang, J. Christopher Ramming, Ken, Anderson, John Manferdelli I n t e l C o r p o r a t i o n 30 June 2014

Outline Joint NSF- Intel Partnership Cyber- Physical Systems Security Challenges Program Details Breakthrough Awards Synergy Awards Ideas Lab Frequently Asked Ques9ons Program Director Contacts 2

NSF- Intel Partnership on Cyber- Physical Systems Security and Privacy (CPS- Security) Jointly funded partnership between Na9onal Science Founda9on (NSF) and Intel Corpora9on Suppor9ng fundamental research to make Cyber- Physical Systems more trustworthy and secure, integra9ng technical, social, and economic perspec9ves Develop a community of researchers focused in this area Partnership with Intel provides researchers greater insight and access to industry needs/capabili9es/resources; facilitates transi9on to prac9ce; and provides students opportuni9es to engage with industry 3

Cyber- Physical Systems Cyber computaeon, communicaeon, and control that are discrete, logical, and switched Physical natural and human- made systems governed by the laws of physics and operaeng in conenuous Eme Cyber- Physical Systems sociotechnical systems in which the cyber and physical systems are Eghtly integrated at all scales and levels 4

Cyber- Physical Systems Trends ImpacEng Security & Trustworthiness Reci9ng the hallmark characteris9cs: Cyber capability (sensing and/or actua9ng) in every physical component Networked at mul9ple and extreme scales Complex at mul9ple temporal, spa9al, social, and industrial scales Cons9tuent elements are coupled logically and physically Dynamically reorganizing/reconfiguring; open systems High degrees of automa9on, control loops closed at many scales Unconven9onal computa9onal & physical substrates (such as bio, nano, chem, ) OperaEon must be dependable, cerefied in some cases 5

NSF Model for ExpediEng Progress Abstract from sectors to more general principles aeronautics medical agriculture Apply these to problems in new sectors Build a new community automotive Core Science, Technology Engineering manufacturing Safety Verifica-on Security Embedded Distributed Networked Hybrid Control Real- -me/fault tolerant Interoperable Scalable energy chemical materials APPLICATION SECTORS civil CORE SCIENCE, TECHNOLOGY and ENGINEERING informed by social science, economics, and policy

Challenges Sensing and collec9on of informa9on related to a large spectrum of everyday human ac9vi9es Non- reversible interac9ons with physical world Scale of deployment Federated nature of many CPS- based infrastructures Deep embedding ( hidden ) and long projected life9mes Reliance on subtle assump9ons at interface boundaries Hardware and soeware components, human operators and maintainers Human interac9on as an arbitrator of CPS security is limited Mul9- stakeholder environment Manufacturers, operators, users Varying degrees of exper9se and control Mee9ng social needs, balancing economic constraints, and formula9ng policy 7

How can we enable secure and privacy-preserving Cyber-Physical Systems without sacrificing the benefits of integrating automation with the physical environment? 8

CPS- Security Program Goals & ObjecEves Goal: Foster transforma9ve, mul9- disciplinary approaches that address the problem of securing current and emerging cyber- physical systems, the infrastructures they form, and those infrastructures integrated with them ObjecEves: Understand the range of technical issues affec9ng hardware and soeware in infrastructure components, and their integra9on in sociotechnical systems Develop an understanding of the interplay between key technical, social, and policy aspects 9

Sample Topics of Interest Security Architectures for CPS Tools and Methodologies for Secure CPS Development, Verifica9on and Analysis Current and Future Threat Assessment and Countermeasures Balance of technical solu9ons, regula9on, and policy incen9ves to enhance privacy and security Effec9ve, Secure, Reliable Control in Centralized and Decentralized Systems 10

SolicitaEon Details Ideas Lab Synergy Proposals Breakthrough Proposals Eligibility: US Universi9es and Colleges 11

Ideas Lab Precursor to the submission of full proposals Par9cipa9on not required for full proposal submission Goals: Iden9fy and develop novel ideas at the intersec9on of CPS and Cybersecurity Assist in the establishment of research partnerships Par9cipa9on by invita9on, following submission of preliminary proposals 12

Preliminary Proposals Necessary for par9cipa9on in the Ideas Lab Deadline: July 29 Submission via Fastlane only (not Grants.gov) Individual submissions (no co- PIs) Proposal contents 2 pages of Project Descrip9on Must follow specific guidelines (see Solicita9on for details) Biographical Sketch Current & Pending Support All other elements (e.g., Summary, Budget, ) are waived Responses/invita9ons by August 5 13

Ideas Lab Mechanics Intensive 5- day residen9al workshop Real- 9me and itera9ve review process of research ideas Assisted by a team of professional facilitators and a group of mentors (researchers with relevant exper9se) 20-30 par9cipants Dates: August 12-16 LocaEon: Washington DC area Travel expenses will be covered by reimbursement through the Compu9ng Research Associa9on (CRA) Submission of Preliminary Proposal implies agreement to amend the full Ideas Lab if invited 14

Ideas Lab Proposals Mentors will provide recommenda9ons to NSF about ideas developed in the Lab Within 7-14 days, NSF will determine which par9cipant teams will be invited to submit full proposals Invita9on does not imply funding guarantee! Non- invited ideas can s9ll be submimed as full proposals Repeat: par9cipa9on or invita9on not required for full proposal submission 15

Full Proposal Submission Details Proposal Type BREAKTHROUGH SYNERGY CondiEons < $500,000 & up to 3 years < $3,000,000 & up to 3 years Proposal Limits Two (2) Proposals per PI Dis9nct from the PI limits of SaTC or CPS solicita9ons Title Format Begins with Breakthrough: Begins with Synergy: Deadline Thu 28 October 2014 5:00PM Proposers Local Time Must upload statement of consent (as Supplemental Documenta9on) that indicates NSF may share with Intel the proposal, the reviews generated for the proposal, and any related informa9on No classified proposals will be accepted 16

Full Proposal Review Process Administered by NSF, in accordance with NSF standards and procedures NSF and Intel program directors coordinate on review panels and award recommenda9ons for Synergy proposals Projects selected for joint funding by NSF and Intel will be funded through separate NSF and Intel funding instruments 17

CPS- Security Synergy Proposals Jointly funded by NSF and Intel Expected number of awards: 2 Take a holis9c view of the challenges in protec9ng CPS Account for technical, human, policy, and economics factors Separate 2- page collabora9on plan is required Addi9onal Solicita9on Specific Review Criteria 1. Degree of integra9on of the technical research with the broader security context in CPS 2. Pursue the development of a Systems perspec9ve and drive toward demonstra9ons of interrelated component research ideas 18

CPS- Security Breakthrough Proposals Funded by NSF Encourage the collabora9on of at least two PIs Bring together the CPS and SaTC communi9es Separate 2- page collabora9on plan is required Expected number of awards: 4 19

Award Details NSF and Intel will manage their respec9ve award according to their own procedures and guidelines All Synergy awards involving Intel funds will be made under a contract that requires: 1. All source code that has been authored while working on such an award will be distributed under a BSD, Apache or other equivalent open- source license. GNU s GPL or LGPL, the Ar9s9c License, or the Mozilla Public License are not considered equivalent. See solicita9on for details. 20

Award Details All Synergy awards involving Intel funds will be made under a contract that requires: 2. No incorpora9on of any third- party code or background intellectual property, except by separate pre- arrangement with NSF and Intel, into data or soeware generated while performing the work under the award, if said incorpora9on would limit or restrict the ability to distribute the data or code under an open source license. 3. Awardees may file patent applica9ons, providing that they grant to Intel a non- exclusive, worldwide, royalty- free, sub- licensable license to all intellectual property rights in any inven9ons or works of authorship resul9ng from research conducted under the joint award. Note that condi9ons 1, 2 and 3 do not apply to Breakthrough awards 21

Intel ParEcipaEon in Research Intel may separately fund its own personnel to directly par9cipate in awardee ins9tu9ons Under mutual consent by Intel and awardee ins9tu9on Goal: iden9fy opportuni9es for technology transfer, act as advisors or collabora9ng researchers Intel may also designate (by mutual agreement) a senior researcher as a member of the Project Management Team 22

Post Award Management For all: Awardees must submit annual reports to the appropriate funder(s) For all: One or more project representa9ves must amend the next NSF/SaTC PI mee9ng (following project award) Synergy- only: Intel will conduct annual retreats Synergy- only: Annual on- site reviews may be conducted jointly by NSF and Intel Synergy- only: Intel may lead the organiza9on of phone calls with project teams; NSF may par9cipate 23

Takeaways CPS- Security is an exci9ng new opportunity for NSF funded researchers to work closely with industry and to explore an increasingly important area domain. CPS- Security researchers will help provide assurance that sociotechnical Cyber- Physical Systems will be secure and trustworthy into the future. Proposals due 28 October 2014 to NSF Contact an NSF and/or Intel program officer with ques9ons! 24

For further queseons If you have addi9onal ques9ons aeer the webinar concludes, please send them via email to Angelos D. Keromy9s, NSF CISE/CNS, (703) 292-8061, adkeromy@nsf.gov David Corman, NSF CISE/CNS, (703) 292-8754, dcorman@nsf.gov J. Christopher Ramming, Intel, (408) 765-4640, james.c.ramming@intel.com John Manferdelli, Intel, (510) 643-8691, john.l.manferdelli@intel.com Jeremy Epstein, NSF CISE/CNS, (703) 292-8950, jepstein@nsf.gov Ralph Wachter, NSF CISE/CNS, (703) 292-8950, rwachter@nsf.gov with the subject line star9ng with CPS- Security: The presenta9on will be available following the WEBINAR at hmps://www.nsf.gov/funding/pgm_summ.jsp?pims_id=505047 The solicita9on is available at hmp://www.nsf.gov/pubs/2014/nsf14571/nsf14571.htm 25

Q u e s t i o n s? The telephone line is now open 26

Frequently Asked QuesEons 27

Frequently Asked QuesEons Proposal Submission Related Q: Can I submit the same proposal to SaTC or CPS, and CPS- Security? A: No, you must choose one program. Q: Does a submission to CPS- Security count towards the 2 proposal limit for SaTC? A: No, you can submit 2 proposals to SaTC and 1 to CPS- Security. Q: Can a CPS- Security proposal include a TransiEon to PracEce OpEon? A: No, those are for SaTC only. 28

Frequently Asked QuesEons Scope Related Q: How do I decide whether to submit to SaTC or CPS- Security? A: If you are interested in the benefits that go along with Intel funding then please submit to CPS- Security. Talk to a SaTC or Intel program director if you are unsure. Q: Does the new CPS- Security program mean that SaTC will be reducing funding for CPS security? A: No. CPS security is sgll a priority for SATC. 29

Frequently Asked QuesEons Award Related Q: How many awards will be made? A: We expect to make 6 CPS- Security awards (4 Breakthrough and 2 Synergy), subject to the availability of funds. Q: Is there a difference contractually between an NSF award and an Intel award? A: The NSF funding agreement is a grant ; the Intel funding agreement is a contract. Deliverables vary. 30

Frequently Asked QuesEons Award Related Q: If co- funded, is the same proposal used for both NSF and Intel? A: Yes. There is a single technical descripgon or Statement of Work for each project, but two funding agreements. Awardees will be provided guidance on how to split the budget. Q: Will Intel fund parecipants at non- US insetueons (which are not funded by NSF)? A: No. All funded pargcipants must follow standard NSF eligibility requirements. 31

Frequently Asked QuesEons Financial Related Q: Is this new money (in addieon to SaTC)? A: NSF is funding CPS- Security out of SaTC funds. We are pleased to combine NSF funds with Intel funds. Q: Is CPS- Security a mule- year program? A: Yes. NSF angcipates congnuing investment in this area for mulgple years, subject to the availability of funds. 32

Frequently Asked QuesEons Intellectual Property Related Q: Are there any restriceons on intellectual property as a result of Intel involvement? A: For Synergy awards: Under the standard Intel contract, the University retains ownership and Intel receives a non- exclusive royalty free license to any IP developed. For Breakthrough awards: These are standard NSF awards with no pargcipagon by Intel. The University retains full ownership. Q: Can we get access to Intel technology? A: PotenGally. This would be handled on a case by case basis between Intel and the awardee university. 33

Frequently Asked QuesEons AddiEonal PI Requirements Q: Do I have to abend the NSF biennial SaTC PI MeeEngs and Intel reviews? A: For Synergy awards: yes For Breakthrough awards: only the NSF biennial SaTC PI MeeGngs Q: Do I have to submit reports to both Intel and NSF on a CPS- Security award? A: Yes, for Synergy awards. The contents of the two are similar. 34

Frequently Asked QuesEons Post Award Related Q: Will Intel be acevely involved as collaborators and working on spin- off projects, or provide in- kind support? A: Intel may fund its own personnel to directly pargcipate in research done through Synergy awards, via its Researchers in Residence program. This will require mutual consent between Intel and the awardee. Intel may designate (and self- fund) one of its senior researchers to work alongside the Synergy PI(s), as member of the project management team, providing perspecgve on commercial aspects, help with day- to- day leadership of the center, and coordinate engagement of all other Intel researchers. 35