text-only page produced automatically by LIFT Text Transcoder Skip all navigation and go to page contentSkip top navigation and go to directorate navigationSkip top navigation and go to page navigation
National Science Foundation Home National Science Foundation - Computer & Information Science & Engineering (CISE)
Computer & Information Science & Engineering (CISE)
design element
CISE Home
About CISE
Funding Opportunities
Awards
News
Events
Discoveries
Publications
Advisory Committee
Career Opportunities
Advisory Committee for Cyberinfrastructure
See Additional CISE Resources
View CISE Staff
CISE Organizations
Advanced Cyberinfrastructure (ACI)
Computing and Communication Foundations (CCF)
Computer and Network Systems (CNS)
Information & Intelligent Systems (IIS)
Proposals and Awards
Proposal and Award Policies and Procedures Guide
  Introduction
Proposal Preparation and Submission
bullet Grant Proposal Guide
  bullet Grants.gov Application Guide
Award and Administration
bullet Award and Administration Guide
Award Conditions
Other Types of Proposals
Merit Review
NSF Outreach
Policy Office
Additional CISE Resources
Contact CISE OAD
Subscribe to receive special CISE announcements
Serving and Working at NSF
Assistant Director's Presentations and Congressional Testimony
CISE Dear Colleague Letters
CISE Distinguished Lecture Series
Webcasts/Webinars
Designing Disruptive Learning Technologies Webinars
WATCH Series
Workshops
CS Bits & Bytes
Big Data Research Initiative
US Ignite at NSF
CISE Strategic Plan for Broadening Participation
Science, Engineering and Education for Sustainability NSF-Wide Investment (SEES)
Other Site Features
Special Reports
Research Overviews
Multimedia Gallery
Classroom Resources
NSF-Wide Investments

Email this pagePrint this page

Discovery
At the Forefront of Cyber Security Research

It's all about the Team for Research in Ubiquitous Secure Technology (TRUST)

DETER testbed server bank

DETER testbed server bank.
Credit and Larger Version

August 11, 2011

Suzanna Schmeelk works at the forefront of cyber security research. In her role as both Berkeley R&D Engineer and a member of the Team for Research in Ubiquitous Secure Technology (TRUST), she examines critical cyber security issues.

TRUST is a university and industry consortium that's focused on cyber security issues and it significantly impacts computer technologies around the globe. Specifically, TRUST examines cyber security issues related to health care, national infrastructures, law and other issues facing the general public.

"TRUST is an international flagship program that explores a multitude of cyber security aspects that will directly impact the future of the United States--and the planet at large," Schmeelk said. "My role has been to design and test cyber security tools and mentor students as they learn about cyber security issues."

TRUST testing

Many cyber security issues can be recreated and researched on a test bed. The cyber-Defense Technology Experimental Research (DETER) test bed was developed to conduct repeatable experiments in computer security and it is also used for components of TRUST-related research. Co-located at the Information Science Institute at the University of Southern California and the University of California at Berkeley, the test bed provides a safe venue to explore cyber security vulnerabilities since it is isolated from the outside internet.

The test bed is useful for exploring aspects of traditional information security, including integrity, availability and confidentiality. Availability assures that users can access information without interference or obstruction and in a usable format. Confidentiality assures that information can only be accessed by humans with sufficient privileges and adequate motivations. Integrity is the state of information being whole, complete and uncorrupted.

Cyber security research uses various combinations of theory, simulation and emulation-based experimentations. Theoretical research examines security threats through purely formal mathematical models. Simulation research traditionally studies an abstract system model. Emulation research examines actual system scenarios where a full-blown realistic system is constructed to duplicate the system under study. The research techniques can be blended to examine theoretical and/or realistic scenarios. After such an experiment is created, it can be executed on DETER to obtain repeatable results.

Gaining TRUST

"The best parts of my personal TRUST experience have been working with the brilliant individuals associated with TRUST coupled with the avant-garde and dynamic nature of the investigated issues and solutions," said Schmeelk.

Schmeelk explained that TRUST also sponsors the TRUST Academy Online, a web-based portal providing cyber security teaching and learning resources to interested faculty and researchers. Resources include literature, presentations, videos, sample code and open courseware to help facility cyber security understanding. The academy also offers courseware in information security, network security, trustworthy systems and social sciences.

For undergraduates interested in TRUST, the TRUST Research Experiences for Undergraduates (TRUST-REU) provides excellent summer research opportunities and a great introduction to cyber security research led by world class experts.

--Suzanna Schmeelk, Polytechnic Institute of New York University, sschme01@students.poly.edu

This Behind the Scenes article was provided to LiveScience in partnership with the National Science Foundation.

Investigators
Adrian Perrig
Stephen Wicker
John C. Mitchell
Suzanna Schmeelk
S. Shankar Sastry
Janos Sztipanovits

Related Institutions/Organizations
Cornell University
Stanford University
Vanderbilt University
University of Southern California
University of California at Berkeley
Polytechnic Institute of New York University

Locations
California
New York
Tennessee

Related Programs
Computing and Communication Foundations (CCF): Core Programs

Related Awards
#0424422 Team for Research in Ubiquitous Secure Technology (TRUST)

Total Grants
$24,245,840

Related Websites
LiveScience.com Behind the Scenes: At the Forefront of Cyber Security Research: http://www.livescience.com/15423-forefront-cyber-security-research-nsf-bts.html
Suzanna Schmeelk's website: http://suzannaschmeelk.com/research.html
DETER: https://www.isi.deterlab.net/
TRUST Academy Online: https://tao.truststc.org/
TRUST Research Experiences for Undergraduates: http://www.truststc.org/reu/

border=0/


Email this pagePrint this page
Back to Top of page