Email Print Share

Secure and Trustworthy Cyberspace  (SaTC) Crosscutting Programs


CONTACTS
Name Dir/Div Name Dir/Div
Jeremy  J. Epstein CISE/CNS Mohammod  Ali ENG/ECCS
Nina  Amla CISE/CCF Robert  Beverly CISE/OAC
Sol  Greenspan CISE/CCF James  Joshi CISE/CNS
Sara  Kiesler SBE/SES Wei-Shinn  Ku CISE/IIS
Sandip  Kundu CISE/CNS Victor  P. Piotrowski EHR/DGE
Andrew  D. Pollington MPS/DMS Balakrishnan  Prabhakaran CISE/IIS
Indrajit  Ray CISE/CNS Phillip  A. Regalia CISE/CCF
Alexander  Sprintson CISE/CNS Nigamanth  Sridhar EHR/DGE
Kevin  Thompson CISE/OAC Li  Yang EHR/DGE


PROGRAM GUIDELINES

Solicitation  21-500

Important Information for Proposers

A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 20-1), is effective for proposals submitted, or due, on or after June 1, 2020. Please be advised that, depending on the specified due date, the guidelines contained in NSF 20-1 may apply to proposals submitted in response to this funding opportunity.


DUE DATES

Full Proposal Window

    October 1, 2020 - September 30, 2021

        SMALL, MEDIUM, and EDU projects

    January 21, 2021 - January 29, 2021

        LARGE proposals


SYNOPSIS

In today’s increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society’s overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.

The goals of the SaTC program are aligned with the National Science and Technology Council’s (NSTC) Federal Cybersecurity Research and Development Strategic Plan (RDSP) and National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity research and development: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.

The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; education; mathematics; statistics; and social, behavioral, and economic sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both welcome.

Proposals must be submitted pursuant to one of the following designations, each of which may have additional restrictions and administrative obligations as specified in this program solicitation.

  • CORE: This designation is the main focus of the SaTC research program, spanning the interests of NSF's Directorates for Computer and Information Science and Engineering (CISE), Engineering (ENG), Mathematical and Physical Sciences (MPS), and Social, Behavioral and Economic Sciences (SBE).
  • EDU: The Education (EDU) designation will be used to label proposals focusing entirely on cybersecurity education.
  • TTP: The Transition to Practice (TTP) designation will be used to label proposals that are focused exclusively on transitioning existing research results to practice.

CORE and TTP proposals may be submitted in one of the following project size classes:

  • Small projects: up to $500,000 in total budget, with durations of up to three years; and
  • Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years.

CORE proposals (but not TTP or EDU proposals) may also be submitted in the following project size class:

  • Large projects: $1,200,001 to $3,000,000 in total budget, with durations of up to five years.

EDU proposals are limited to $400,000 in total budget, with durations of up to three years. Proposals that demonstrate a collaboration, reflected in the PI, co-PI, and/or Senior Personnel composition, between a cybersecurity subject matter expert (researcher or practitioner) and an education researcher may request up to $500,000 for three years.


RELATED URLS

What Has Been Funded (Recent Awards Made Through This Program, with Abstracts)

Map of Recent Awards Made Through This Program

News