In October 2018, NSF implemented the Domain-based Message Authentication, Reporting & Conformance (DMARC) email changes required by the Department of Homeland Security (DHS) to improve email security. Some email routing practices (such as auto-forwarding to personal email accounts and sending messages through third-party providers) may cause messages to be flagged as potentially fraudulent by DMARC security checks and blocked. If your email is auto-forwarded to another account, such as a personal email account, you may not receive emails from NSF in that forwarded account. More information about DMARC and email delivery from NSF.
Division of Computer and Network Systems
Secure and Trustworthy Cyberspace Frontiers (SaTC Frontiers)
|Nina Amlaemail@example.com||(703) 292-7991|
|Shannon I. Beckfirstname.lastname@example.org||(703) 292-2487|
|Dan R. Cosleyemail@example.com||(703) 292-8491|
|Sol Greenspanfirstname.lastname@example.org||(703) 292-8910|
|Sara Kiesleremail@example.com||703 292 8643|
|Wei-Shinn Kufirstname.lastname@example.org||(703) 292-8318|
|Sandip Kunduemail@example.com||(703) 292-8950|
|Victor P. Piotrowskifirstname.lastname@example.org||(703) 292-8670|
|Andrew D. Pollingtonemail@example.com||(703) 292-4878|
|Phillip A. Regaliafirstname.lastname@example.org||(703) 292-2981|
|Alexander Sprintsonemail@example.com||(703) 292-8950|
|Janet P. Striulifirstname.lastname@example.org||(703) 292-2858|
|Kevin Thompsonemail@example.com||(703) 292-4220|
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 19-1), is effective for proposals submitted, or due, on or after February 25, 2019. Please be advised that, depending on the specified due date, the guidelines contained in NSF 19-1 may apply to proposals submitted in response to this funding opportunity.
Letter of Intent Deadline Date
July 5, 2019
Full Proposal Deadline Date
September 30, 2019
In today’s increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society’s overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged. Please see SaTC program solicitation for more details.
Through this solicitation—under the SaTC umbrella—NSF specifically seeks ambitious and potentially transformative center-scale projects in the area of security and privacy that (1) catalyze far-reaching research explorations motivated by deep scientific questions or hard problems and/or by compelling applications and novel technologies that promise significant scientific and/or societal benefits, and (2) stimulate significant research and education outcomes that, through effective knowledge transfer mechanisms, promise scientific, economic and/or other societal benefits. The goal of the SaTC Frontiers program is to advance the frontiers of cybersecurity and privacy, and the areas listed in the SaTC program solicitation are meant to be illustrative but not exhaustive.