
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | March 21, 2017 |
Latest Amendment Date: | July 28, 2020 |
Award Number: | 1651344 |
Award Instrument: | Continuing Grant |
Program Manager: |
Nina Amla
namla@nsf.gov (703)292-7991 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | July 1, 2017 |
End Date: | October 31, 2020 (Estimated) |
Total Intended Award Amount: | $450,000.00 |
Total Awarded Amount to Date: | $423,413.00 |
Funds Obligated to Date: |
FY 2018 = $17,360.00 FY 2019 = $0.00 FY 2020 = $0.00 |
History of Investigator: |
|
Recipient Sponsored Research Office: |
3451 WALNUT ST STE 440A PHILADELPHIA PA US 19104-6205 (215)898-7293 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
3451 Walnut Street Philadelphia PA US 19104-6205 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
01001819DB NSF RESEARCH & RELATED ACTIVIT 01001920DB NSF RESEARCH & RELATED ACTIVIT 01002021DB NSF RESEARCH & RELATED ACTIVIT 01002122DB NSF RESEARCH & RELATED ACTIVIT |
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
Cryptography is a cornerstone of modern computer security and is ubiquitous on the computer systems we depend on daily. However, there is a significant gap between the theoretical guarantees provided by formalized security models, and the reality present in deployed systems today. The central research goals of this project are to perform an empirical study of cryptographic deployments on a global scale and to develop a framework for experimental cryptographic security research. This project develops and disseminates tools for measuring cryptographic security, and will result in increased security for cryptographic software and hardware in real use by detecting and eliminating flaws. Results are published for the academic community as well as popularized for nonacademic and industry audiences and incorporated into course materials.
The project yields fundamental new insights and deepens the understanding of cryptographic deployments in the real world. The main activities include the refinement of existing methods and development of new tools for collecting and processing large-scale cryptographic datasets. The research also investigates the development of efficient algorithmic tools for real-time cryptographic anomaly detection, improved methodology for tracing vulnerabilities to implementations, advancements in the state of high-performance computing for cryptanalysis, and the development of more precise security models and requirements for cryptographic systems.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
Please report errors in award information by writing to: awardsearch@nsf.gov.