Expanding The Breadth And Impact Of Cybersecurity And Privacy Research
NSF announces two Frontier-scale projects, part of a $74.5 million investment to support foundational cybersecurity research and education
As our lives and businesses become ever more intertwined with the Internet and networked technologies, it is crucial to continue to develop and improve cybersecurity measures to keep our data, devices and critical systems safe, secure, private and accessible.
On July 31, 2014, the National Science Foundation’s (NSF) Secure and Trustworthy Cyberspace (SaTC) program announced two new center-scale “Frontier” awards to support large, multi-institution projects that address grand challenges in cybersecurity science and engineering with the potential for broad economic and scientific impact.
The Frontier awards are part a diverse $74.5 million portfolio of more than 225 new projects in 39 states. These cybersecurity research and education projects are aimed at minimizing the misuses of cyber-technology, bolstering education and training in cybersecurity, establishing the science of security, and transitioning promising cybersecurity research into practice.
“NSF’s investments are advancing knowledge to protect cyber-systems from malicious behavior, while preserving privacy and promoting usability,” said Farnam Jahanian, head of NSF’s Directorate for Computer and Information Science and Engineering (CISE).
“The cybersecurity research and education efforts we support enable our nation to continue as a world leader in innovating secure technologies and solutions. These new Frontier awards will enable novel approaches to cybersecurity, with potential benefits to all sectors of our economy.”
The first of the Frontier awards helps establish the Center for Encrypted Functionalities (CEF). The goal of the center is to use new encryption methods to make a computer program–and not just its output–invisible to an outside observer, while preserving its functionality–a process known as program obfuscation. Such a technology enhances cybersecurity by hiding vulnerabilities from potential adversaries, thereby preventing tampering and deterring reverse engineering; and by allowing one to hide cryptographic keys within software, thereby strengthening encryption and information transfer.
“Humanity has been encrypting messages using mathematics for hundreds of years. But the question of encrypting a functionality seemed out of reach,” said Amit Sahai, a professor of computer science at the University of California, Los Angeles (UCLA), and the lead principal investigator of the project. “In human terms, this question is like asking whether it is possible for someone to keep a secret, if an adversary can see how every neuron in her brain behaves.”
Last year, some members of Sahai’s team discovered the first mathematically sound approach to encrypting functionalities. This breakthrough could reshape the way we think about security and computation.
“Our center’s mission is to explore every aspect of the new world that is opened up by encrypted functionalities,” Sahai said.
The project is a collaboration among researchers at UCLA, Stanford University, Columbia University, The University of Texas at Austin and Johns Hopkins University.
The second Frontier grant was awarded to the Modular Approach to Cloud Security (MACS) project, which aims to build information systems for the cloud with meaningful multi-layered security.
In the project, researchers will design and test a modular approach to cybersecurity. The project will build the cybersecurity system from smaller, separate functional components, each asserting its own security individually. As a result, the security of the system as a whole will be derived from the security of its components.
“Our goal is to build a cloud with clear and transparent security properties,” said Ran Canetti, a professor of computer science at Boston University and lead researcher on the project. “Furthermore, we intend to make it modular, thus enabling the construction of cloud services from basic components in a security-preserving way. If successful, this project will transform the way we currently build and argue about secure systems.”
The team–made up of researchers from Boston University, Massachusetts Institute of Technology, the University of Connecticut and Northeastern University–comprises experts in different aspects of information security and cryptography.
A key component of the MACS project is its integration into the Massachusetts Open Cloud, which provides the research team with a testbed for deploying and testing the mechanisms they develop at reasonable scale. The project continues NSF’s commitment to support the transition of great ideas from research to practice.
Members of the MACS team will interpret early research results and code them into a privacy-preserving solution to allow users of the Massachusetts Open Cloud to share systems data, a novel idea that has no precedent. Allowing multiple users access to such information will provide more choices for researchers conducting experiments on cloud computing and allow them to build high-performance systems at a fraction of the current cost.