Skip navigation

Poly^2 Network Computing Project

This project is no longer active.
This project seeks to evaluate security design principles in combination with functional requirements in the construction of a secure network service architecture.

Goal of the Project

The project plans include creation of a network service platform using commodity hardware and customized software to deliver critical network services. The emphasis for this implementation is primarily on security, though high availability and reliability are also addressed.

Conference Papers

The following papers have been accepted to conferences:

Project Posters and Handouts

These posters and handouts are used to provide information about our project at research symposia, meetings, and colloquia. The poster has an eye-catching graphic and brief information about the project. The handouts provide some additional details and references.
7th Annual Information Security Symposium (March 21-22, 2006)
Negotiating Trust
6th Annual Information Security Symposium (March 23-24, 2005)
Security in Motion
5th Annual Information Security Symposium (March 23-24, 2004)
Energizing the Enterprise: Cyber Security in Context
4th Annual CERIAS Research Symposium (April 8-9, 2003)
Cyber Security & Safety for the 21st Century
3rd Annual CERIAS Research Symposium (April 16-18, 2002)
Protecting Information Resources

Current Members of the Project Group

  • Eugene Spafford, faculty member.
  • Keith Watson, research engineer.
  • Robert Winkworth, graduate student.
  • Hank Wu, graduate student.
  • Dannie Stanley, graduate student.
  • Mike McFail, graduate student.
  • Brent Roth, graduate student.

Former Members of the Project Group

  • Jim Early, graduate student.
  • Rajeev Gopalakrishna, graduate student.
  • Greg Roth, graduate student.
  • Mahesh Tripunitara, graduate student.
  • Paul Williams, graduate student.
  • Scott Yost, graduate student.
  • Michael Armbrust, undergraduate student.
  • Eric Bryant, undergraduate student.
  • David Ehrmann, undergraduate student.
  • Jay Gengelbach, undergraduate student.
  • Bill Harris, undergraduate student.
  • Ryan Keyes, undergraduate student.
  • Kayty Luptak, undergraduate student.
  • Mike Olson, undergraduate student.
  • Greg Ose, undegraduate student.
  • Zach Tatlock, undergraduate student.
  • Bobby Yang, undergraduate student.
  • Nwokedi Idika, graduate student.
  • Mohamed Shehab, graduate student.

Reading List

Papers

Books

Notice

This material is based upon work supported by the National Science Foundation under Grant No. 0523243. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation.

2025-2026 Research Opportunities

LLM Research

While cybersecurity work is dedicated to protecting people and organizations, it may at times negatively impact them. Poorly implemented protection mechanisms may expose the clients to loss of private or confidential information. Intrusion detection processes may lead to mistaken identity that may have significant consequences, from technical to moral ones.

Cybersecurity software designers, system administrators, and users should be trained to reason ethically about their decisions and actions. This requires a methodology for reasoning and an easy-to-use decision support mechanism that provides cybersecurity experts with ethical reasoning tools and advice. In prior work, we have defined an ethical reasoning methodology that relies on six simple principles, which are ranked and compared using a trade-off mechanism. The methodology provides the user, via reasoning steps, advice regarding the advisability of a particular cybersecurity design, system administration, or use decision.

The current project seeks to create a problem-scoping interface that collects the information through a chat interface, weighs the costs and benefits using a reasoning matrix and then generates advice using an LLM agent trained to use the reasoning mechanism.

The successful candidate for this internship should be conversant with using LLM agents programmatically via APIs, preferably in the AWS environment, and have full-stack web development experience. A junior or senior in computer science, electrical engineering, or technology is preferred.

This is a paid internship. The expectation 10 hours of work a week of focused development for ten weeks. If the project generates a paper, the student will be credited as a co-author.

For details, contact Dr. Sorin Adam Matei, smatei@purdue.edu


Research in Generative AI, Software security, Embedded systems, and Compression

The CYNICS group is seeking aspiring researchers to join their research team and engage in exciting cross-disciplinary research projects spanning the areas of generative AI, software security, embedded systems, and compression. Hourly positions are available to both undergraduate and graduate students. All interested students are invited to contact Dr. Hany Abdel-Khalik (abdelkhalik@purdue.edu) with their CVs.

Generative AI
Get into the guts of popular GenAI tools such as ChatGPT and Claude and find out what makes or breaks them. Familiarity with adapting state-of-the-art algorithms and the ability to build machine-learning models from scratch are highly desired.

Software Security and Embedded Systems
Work on state-of-the-art encryption algorithms for software security and investigate lightweight alternatives for pure hardware deployments. A strong background in electronics and a bias towards hands-on projects are preferred. Red-teaming / reverse-engineering experience is a bonus.

Compression
Investigate the inner workings of several compression algorithms for images, audio, video, time-series, and more, and apply to real problems ranging from reactor modeling and simulation to reliable communication in denied environments. A strong background in statistics and signal processing is preferred.

If interested, send your CV to Dr. Hany Abdel-Khalik (abdelkhalik@purdue.edu).


Lilly Research Opportunity

CERIAS will recruit a team of 2-4 student workers. Students will be US citizens. Desirable candidates will have experience in computer security, software development, and language learning models.

Analysts deal with large volumes of indicators every day as part of security and intelligence investigations. Given a set of common indicators classes (such as emails, IPs, domains, etc), can we leverage AI/ML technology to add useful context in the form of structured tags, descriptive narratives, and deeper relationship identification between indicators? What kind of succinct and structured tags are useful to the analyst? How can LLMs be used to enrich indicators using them? How can relationships between existing indicators be surfaced and which ones are useful? All of these and more are compelling questions that require a careful, disciplined, and modular approach with an eye toward allowing others to operationalize the solution within different environments.

Deliverables:
At a minimum source code demonstrating the solution as well as a final presentation discussing it at length.

Depending on the approach:

  • A pre-trained model using the assembled corpus.
    • Playbooks on how to train a new model on a different corpus.
  • A RAG AI technique able to retrieve the latest information from external sources.
  • The code will:
    • Use freely available open-source data or data sources available through academic partnerships..
    • Be written in Python.
    • Constitute a modular framework for others to interface with.
    • Be deployable as a software package to a Docker container.
    • Return final summary data in JSON format. It will also include a schema describing the JSON format.
  • The code will not:
    • Implement any kind of user authentication.
    • Implement the ability to query any specific database, TIP, SIEM, or other platform that Lilly may already have deployed. We will design and document the code to simplify the eventual implementation of query capabilities.

    For more information email Dr. Courtney Falk (falkc@purdue.edu)

  • Goldilock

    Ch-ch-ch-changes

    Governance and Responsible AI Lab (GRAIL)

    Purdue cybersecurity researchers secure DARPA Contract to study smartphone vulnerabilities

    Spafford named distinguished professor of Computer Science

    Marc Rogers elected to be American Academy of Forensic Sciences’ treasurer

    2025 Annual Information Security Symposium

    2025 Annual Symposium keynote speakers


    Discover the Future of Cybersecurity at the 26th Annual CERIAS Cybersecurity Symposium

    The 26th Annual CERIAS Cybersecurity Symposium is a premier gathering of thought leaders, innovators and practitioners dedicated to shaping the future of cybersecurity. The event will explore the dynamic interplay between academia and industry, discuss lessons learned from the cyber battle space and learn about the revolutionary framework for building the future of secure cyber-physical systems. It also will examine AI as a tool for advancing the field and spotlight innovations that define the cutting edge of security solutions.

    AGENDA

    Tuesday, April 1, 2025

    8:00am ET

    Registration / Coffee

    Coffee is in PMU 230 (Director’s Room) across the hall from the faculty lounges
    8:30 am

    Welcome

    Dr. Dongyan Xu, Director of CERIAS and Samuel D. Conte Professor of Computer Science

    Faculty Lounges, PMU
    8:45 am

    Keynote Address: “From Artisanal to Industrial Delivering Security at Scale for Business and Technology Agility” 

    Phil Venables, Chief Information Security Officer, Google Cloud

    Faculty Lounges, PMU
    9:45 am

    Fireside Chat

    • Dr. Eugene Spafford, CERIAS Fellow, CERIAS Founder and Director Emeritus, Professor of Computer Science
    • Phil Venables, Chief Information Security Officer, Google Cloud
    • Michael Clothier, Sector Chief Information Security Officer, Aeronautics Systems, Northrop Grumman
    • Dr. Kelley Misata, Chief Trailblazer and Founde, Sightline Security
    Faculty Lounges, PMU
    10:45 am

    Network Break

    11:05am

    Technology Talk: “From Firewalls to Fairness: Securing the Future with Threat Modeling and Ethics”

    Dr. Abhilasha Bhargav-Spantzel, Partner Security Architect, Microsoft

    Faculty Lounges, PMU
    11:35 am

    Technology Talk: “Scalable and Concurrent Targeted Search for Digital Forensics”

    Dr. Umit Karabiyik, Associate Professor Computer and Information Technology and Director of Ubiquitous and Mobile Investigative Techniques and Technologies Lab, Purdue University

    Faculty Lounges, PMU
    12:00 pm – 1:10 pm

    Lunch

    1:10 pm

    Technology Talk: “Modeling, Analysis, and Control of Spreading Processes over Networks

    Dr. Philip E. Paré, Rita Lane and Norma Fries Assistant Professor of Electrical and Computer Engineering

    Faculty Lounges, PMU
    1:35 pm

    Technology Talk: “Socially Contextualized Misinformation Detection”

    Dr. Dan Goldwasser, Associate Professor, Computer Science

    Faculty Lounges, PMU
    2:00 pm

    Technology Talk: “Bridging the Gap: Highlighting Academia’s Limited Role in Governance, Risk, and Compliance (GRC) Education and Research”

    Dr. Ali Al-Haj, Visiting Fulbright Scholar, Princess Sumaya University for Technology, Jordan

    Jeff Angle, Senior Director of Academic and Workforce, ISACA

    Faculty Lounges, PMU
    2:30 pm

    Technology Talk: “Trustworthy IoT Through Usable Security & Privacy

    Dr. Younghyun Kim, Assistant Professor of Electrical and Computer Engineering

    Faculty Lounges, PMU
    3:10 pm

    Networking Break

    Faculty Lounges, PMU
    3:30 pm

    Panel: “Is it Time for the Purdue ICS Model 2.0?”

    • Dr. Eugene Spafford, (Moderator) CERIAS Fellow, CERIAS Founder and Director Emeritus, Professor of computer Science
    • Dr. Hany Abdel-Khalik, Professor, Nuclear Engineering, Founder, Covert Defenses, LLC
    • Lesley Carhart, Director of Incident Response for North America, Dragos, Inc.
    • Dr. Stacy Prowell, Senior Researcher, National Security Sciences Directorate, Oak Ridge National Laboratory
    • Stephen Kines, co-founder and COO, Goldilock
    Faculty Lounges, PMU
    4:30 pm

    Special Recognition

    Faculty Lounges, PMU
    5:00 pm

    Conference breaks for Day 1 – until Student Poster Session at 6:30pm

    6:30 pm – 9:00 pm

    CERIAS Student Poster Session

    2025 Poster List

    PMU North Ballroom


    Wednesday, April 2, 2025

    8:00am ET

    Registration / Coffee

    Coffee is in PMU 230 (Director’s Room) across the hall from the faculty lounges
    8:30 am

    Welcome

    Joel Rasmus, Managing Director of CERIAS

    Faculty Lounges, PMU
    8:45 am

    CERIAS Awards

    Dr. Eugene Spafford, CERIAS Fellow, CERIAS Founder and Director Emeritus, Professor, Computer Science Department

    Poster Awards

    Pillar of CERIAS Award

    Faculty Lounges, PMU
    9:00 am

    Keynote: “Mission Possible: Securing Nonprofits in the Age of AI

    >Kelley Misata, Chief Trailblazer and Founder, Sightline Security

    Faculty Lounges, PMU
    10:00 am

    Technology Talk: “Weaponizing Fragility in Critical Infrastructures: Implications for Next Generation Resilience”

    Dr. Sean Warnick, Professor of Computer Science, Brigham Young University

    Faculty Lounges, PMU
    10:30 am

    Networking Break

    Faculty Lounges, PMU
    10:50 am

    Panel: “Lessons Learned From The Cyber Battlefield – Protecting the United States From Cyber Attack”

    Panelists:

    • Joel Rasmus (Moderator), Managing Director of CERIAS
    • Richard Wright, Director/Chief Engineer, Technology Transition, Corporate Engineering & Technology, Lockheed Martin
    • Robert Herzog, CISSP, former Special Agent with the FBI
    • Patricia Herndon, Senior Director, Special Projects, Purdue Applied Research Institute (PARI);
    • Dr. Saurabh Bagchi, Professor of Electrical and Computer Engineering & Computer Scienc
    • Randall Brooks, Principal Technical Fellow. Chief Engineer Product Cybersecurity Center, RTX
    Faculty Lounges, PMU
    11:50 am

    Lunch

    1:00 pm

    Technology Talk: “Rationality of Learning Algorithms in Repeated Normal-Form Games”

    Dr. Vijay Gupta, Elmore Professor of Electrical and Computer Engineering and the Associate Head for Graduate and Professional Programs, in ECE

    Faculty Lounges, PMU
    1:25 pm

    Lightning Talk: “Digital Assurance for High Consequence Systems”

    Dr. Will Zortman, Digital Assurance for High Consequence Systems (DAHCS) Campaign Manage, Sandia National Laboratories’ Laboratory Directed Research and Development Office

    Faculty Lounges, PMU
    1:50 pm

    Networking Break

    2:10 pm

    Panel: “The Intersection between A.I. and Cybersecurity”

    • Dr. Dongyan Xu, (Moderator), Director of CERIAS and Samuel D. Conte Professor of Computer Science
    • Tim Benedict, Chief Technology Officer, COMPLiQ
    • Dr. Berkay Celik, Assistant Professor of Computer Science
    • Dr. Jing Gao, Associate Professor, Electrical and Computer Engineering
    • Dr. Ananth Grama, Samuel D. Conte Professor of Computer Science
    Faculty Lounges, PMU
    3:10 pm

    Technology Talk: “Securing Smart Sensing against Physical Adversarial AI Attacks”

    Dr. Tao Li, Assistant Professor, Computer and Information Technology

    Faculty Lounges, PMU
    3:35 pm

    Technology Talk: “Modeling Interaction Dynamics to Influence Human-AI Collaboration in Decision Making”

    Dr. Ming Yin, Assistant Professor, Computer Science

    Faculty Lounges, PMU
    4:00 pm

    Technology Talk: “Cybersecurity of Smart Traffic Signal Systems”

    Dr. Yiheng Feng, Assistant Professor and Assistant Director, Center for Road Safety (CRS), Lyles School of Civil and Construction Engineering

    Faculty Lounges, PMU
    4:30 pm

    Closing Keynote Address: “IT, OT, IoT — It’s Really Just the “T”: An International and Historical Perspective”

    Michael Clothier, Sector Chief Information Security Officer, Aeronautics Systems, Northrup Grumman

    Faculty Lounges, PMU
    5:30 pm

    Conference Ends



    Thursday, April 3

    9:00am-3:00pm

    CERIAS External Advisory Board (EAB) Meeting (for members only) Convergence Building (CONV): 101 Foundry Drive, Suite 3800, WL Campus

    Cloud-native, Cyberinfrastructure and Networks (CYAN) Lab

    Purdue Systems and Software Security Lab (PurS3)

    Xu receives Bement Award for groundbreaking cybersecurity research

    COMPLiQ

    Ananth Grama named to lead Purdue’s Institute for Physical AI

    TracerFire 2025

    image

    Come learn cyber forensics skills, put them to practice, and complete challenges to win prizes!

    Where: In Person - Purdue University, West Lafayette, IN, LWSN 3102
    When: April 5th & 6th 2025 || 10 am – 6 pm EST
    Cost: FREE!
    Why: Learn – Practice – Win Prizes!
    Requirements: Assemble your team of 3-5 students and fill out the registration form: Register Here

    Saturday, April 5th - DAY 1 - Hands-on training - 10:00a - 6:00pm ET
    Sunday, April 6th - DAY 2 - Skills Challenge - 10:00a - 6:00pm ET

    TracerFIRE is a two-day event teaching students to investigate multiple advanced persistent threat (APT) adversaries in a simulated incident response scenario. Learn cyber forensic techniques to discover:

    • Who’s the adversary?
    • How’d they get in?
    • What did they want; did they succeed?
    • How to prevent recurring incidents?

    Day 1 will consist of fun hands-on training; Day 2 is a skills challenge

    Hurry! Registration is Limited to the First 55 People!

    Questions? Please email Shawn Huddy at: shuddy@purdue.edu

    More info: https://www.youtube.com/watch?v=1ppotM9d1yA


    Sandia Logo University of Illinois

    Fulbright Scholar driving global cybersecurity initiatives with CERIAS at Purdue

    Poster Creation and Session Information 2025


    Poster Creation and Session Information 2025

    Last updated 2025-03-10

    Poster Session Date/Time/Location

    Date: Tuesday, April 1st, 2025
    Time: 6:30 - 9:00pm
    Location: PMU Ballroom

    DEADLINE FOR SUBMISSION: Friday, March 14th, 2025 8am

    CERIAS Affiliated Purdue University Students

    CERIAS will print large, high-quality posters for the 2025 symposium poster session. These posters will be printed on a large-format ink jet printer and prepared for display. CERIAS will cover the cost of preparing the posters if you send the poster to us by the deadline. We strongly encourage you to take advantage of this offer. All posters submitted by the deadline will also be included in materials to be given to attendees and CERIAS staff will place your poster in the appropriate location prior to the session. If you have not registered as a CERIAS affiliated student, please join here.

    Statewide Indiana Cybersecurity Summit Poster Submissions (Universities other than Purdue)

    You are responsible for the cost of printing your own poster. Please bring it with you to the symposium on Tuesday, Apri 2nd. We will provide space to display your poster at our poster session. You are also invited to participate in our Poster Preview session. The Preview is your opportunity for you to present your research in 60 seconds or less.

    Poster Overview

    Please note the deadline for remitting your poster to us is DEADLINE Friday, March 14th, 2025 8am. This deadline is _firm_. If you fail to meet this deadline, your poster will not be included on the symposium materials, and you will need to create your poster with your own resources and deliver the poster to the designated poster session location.

    CERIAS will remove all posters from the room and store them following the session. Please contact us at any time if you wish to use the poster or keep it in your office or lab.

    We ask that you follow these procedures and meet the deadlines:

    We will only print posters that meet the following requirements:

    • You are a CERIAS Affiliated Purdue University Student
    • Posters must be 30.5” x 40” (30 and one half inches wide, 40 inches tall)
    • Posters must use the template provided below.
    • Template graphical elements (including the header and footer) may not be modified or obscured in any way.
    • Posters must be provided either in PDF (preferred) or PowerPoint
    • Posters must be submitted by DEADLINE Friday, March 14th, 2025 8am. Posters received after this deadline will not be accepted for printing but may still be presented at the Symposium Poster Session
    • A maximum of 2 posters can be created per presentation
    • Finalize your presentation information and register as a presenter BEFORE submitting your poster. Put the poster ID key # you are given in the subject of your submission email. Poster submissions that do not include a poster ID key # will be rejected.
    Each submission must include:
    • The presentation title
    • A short abstract
    • A list of all authors/creators
    • A list of all presenters who will attend the poster session (all of whom must register as presenters)
    • A single person to be responsible for poster submission — multiple sources may result in confusion and lead to errors
    Posters will be registered when you:
    • Submit your poster and all related information at the same time
    • Email your posters to posters@cerias.purdue.edu. Put your poster ID (provided when you register as a poster presenter) in the “Subject:” line of _all_ email correspondence regarding this poster.

    If the deadline is not met:

    • Printing costs are the responsibility of the research project

    Design Guidelines

    • Never use text smaller than 24pt
    • Use sans-serif fonts like Arial or Helvetica

    Poster Templates

    Templates

    Information for Poster Presenters 2025

    Last updated: 2024-03-10

    Information for Poster Presenters 2025

    DEADLINE FOR SUBMISSION: Friday, March 14th, 2025 8am


    Purdue Students: CERIAS will print large, high-quality posters for the 2025 symposium poster session. These posters will be printed on a large-format ink jet printer and prepared for display. CERIAS will cover the cost of preparing the posters if you send the poster to us by the deadline. We strongly encourage you to take advantage of this offer. All posters submitted by the deadline will also be included in materials to be given to attendees and CERIAS staff will place your poster in the appropriate location prior to the session.

    Step 1

    Review the poster creation tips, guidelines, templates and session information.

    Step 2

    Register your poster

    Step 3

    Register as an Attendee.

    Vijay Raghunathan appointed to national advisory board to help shape U.S. semiconductor workforce

    Ananth Grama named Distinguished Professor of Computer Science

    Purdue Prof. Santiago Torres-Arias delivers keynote on Open Source Security at KubeCon 2024

    National Academy of Inventors names two Purdue faculty as 2024 fellows

    2024 Annual Information Security Symposium


    Our next security symposium will be on April 1st and 2nd, 2025

    West Lafayette, IN

    The 25th annual (1999-2024) CERIAS Security Symposium will bring together researchers, scientists, academics, and industry professionals to hear prestigious keynote addresses, thought provoking panel discussions, and innovative lighting and technology talks.

    2024 Symposium

    Speakers

    AGENDA

    Printable Agenda Booklet (PDF)
    Agenda coming soon.

    Research Posters

    Travel Information

    For More Information…

    For further information on the symposium or current and future CERIAS initiatives, contact:

    Joel Rasmus CERIAS
    Managing Director
    Phone: 765 494-7806
    E-mail: info@cerias.purdue.edu

    Information Security Graduate Programs

    Note about CERIAS

    CERIAS is a research center, and not an academic department, and therefore does not offer degrees. However, the programs described above allow you to get your degree and to be associated with CERIAS.

    There are currently 5 different approaches to graduate study in InfoSec at Purdue University:

    INSC

    Interdisciplinary Information Security Program (INSC)

    This degree program (MS & PhD) is structured around a central core of classes that give students a fundamental grounding in basic issues of cybersecurity and encryption, network security, and related topics.

    More...

    MS & Ph.D.

    Students can receive graduate degrees in existing programs with a specialization in infosec areas.

    Students can also receive graduate degrees in existing programs with a specialization in infosec areas. To do this, the students enroll in a traditional major, take a core of common courses, and then are able to take electives related to their interests. Masters students may choose to research and write a Master’s thesis that involves further study in a particular area of interest, or they may simply take 30 or more credit hours of coursework. PhD students must choose a specialized topic for their dissertation research. The most common major for students interested in information security is Computer Sciences, but degrees are also associated with Electrical & Computer Engineering, Management, Philosophy, Political Science, and many other departments associated with CERIAS.

    Note that specific requirements for individual department degrees are given on departmental WWW pages. What follows is a summary of the requirements for a CS graduate degree, serving as an example of what is expected. You need to consult one of the definitive references to get the whole picture. ([CS graduate degree requirements are available on the WWW; information on other graduate programs can be found by starting at the grad school www page.)

    CYBER FORENSICS

    Ph.D. Specialization in Cyber Forensics

    The Purdue Polytechnic offers a Ph.D. in Technology with a specialization in cyber forensics. This ranked Ph.D. program specializes in all aspects of cyberforensics, cyber Infrastructure, cyber learning, and cybersecurity.

    More...

    CYBERSECURITY MANAGEMENT

    MS in Cybersecurity Management

    Online Degree

    This Purdue Global program prepares graduates for leadership roles directing and protecting critical information infrastructures.

    More...

    CYBERSECURITY AND TRUSTED SYSTEMS

    MS in Cybersecurity and Trusted Systems

    Only available at Indianapolis location of study

    This MS program in cybersecurity prepares students for a career in the rapidly advancing field by providing a comprehensive background in cybersecurity engineering, a multidisciplinary area that combines information technology, computing, and engineering to address daily security challenges and risks in various industries.

    More...

    ECE’s Machiry receives NSF CAREER award

    Purdue Prof. Saurabh Bagchi finalist for global engineering award

    Chad Laux honored with International Book of the Year Award for ‘Lean Sustainability’

    101 definitions of cybersecurity with Gene Spafford (Podcast Interview)

    Purdue NE startup wins top tech prize from the Venture Club of Indiana

    Institute for Physical Artificial Intelligence (IPAI)

    Helping virtual cycling belong on the global stage

    Can science make it too costly for hackers to attempt to steal information?

    Purdue, IU, Notre Dame join to create statewide consortium for national defense research

    Spafford to chair external board for $45M Sandia Labs digital assurance campaign

    PurSec Lab

    Trust is at center of all cybersecurity work, DOD’s Shyu tells CERIAS crowd

    Defense award launches Purdue project to strengthen cyber-physical systems

    2024 Matt Huber

    2024 Umit Karabiyik

    CERIAS symposium tackles digital risks, threats to innovation

    2024 James Davis

    2024 Hemanta Maji

    2024 Saurabh Bagchi

    2024 Ashok Vardhan Raja

    2024 Ruby Booth

    2024 Romilla Pradhan

    2024 Jing Gao

    2024 Jordan Awan

    2024 Wenhai Sun

    2024 Greg Shannon

    2024 Doug Kiehl

    2024 David Rottier

    2024 Claudionor Coelho

    2024 Vaneet Aggarwal

    2024 Mung Chiang

    2024 Lin Tan

    Considering a Career in Cybersecurity?

    2024 Evercita Eugenio

    2024 Nate Gleason

    2024 Dave Tian

    CISA

    CERIAS is designated as a National Center of Academic Excellence in Cyber Research

    The CAE program was established by the NSA in late 1998. Purdue was one of the first seven universities certified as CAEs, in May of 1999.

    The Center of Academic Excellence Seal

    From caecommunity.org:

    The Center of Academic Excellence in Cyber Research (CAE-R) designation indicates that an institution increases the understanding of robust cyber defense technology, policy, and practices that will enable our Nation to prevent and respond to a catastrophic event. Eligible institutions must be a DoD school, a Ph.D. producing military academy, or a regionally accredited Ph.D. degree-granting college or university. Institutions must identify as a Doctoral University – Highest Research Activity (R1), Doctoral University – Higher Research Activity (R2), or Doctoral University – Moderate Research Activity (R3) as determined by the Carnegie Foundation Basic Classification system (and/or other independent body to measure CD) or provide a written justification as to significant CD research. An institution or program must apply for re-designation every five academic years.

    2024 Anand Raghunathan

    Elisa Bertino receives the inaugural Elena Lucrezia Cornaro Piscopia International Award

    2024 Samuel Visner

    Information for Poster Presenters 2024

    Last updated: 2024-02-03

    Information for Poster Presenters 2024

    DEADLINE FOR SUBMISSION: Monday March 18th, 5pm ET


    Purdue Students: CERIAS will print large, high-quality posters for the 2024 symposium poster session. These posters will be printed on a large-format ink jet printer and prepared for display. CERIAS will cover the cost of preparing the posters if you send the poster to us by the deadline. We strongly encourage you to take advantage of this offer. All posters submitted by the deadline will also be included in materials to be given to attendees and CERIAS staff will place your poster in the appropriate location prior to the session.

    Step 1

    Review the poster creation tips, guidelines, templates and session information.

    Step 2

    Register your poster

    Step 3

    Register as an Attendee.

    Poster Creation and Session Information 2024


    Poster Creation and Session Information 2024

    Last updated 2024-03-18

    Poster Session Date/Time/Location

    Date: Tuesday, April 2nd, 2024
    Time: 6:30pm ET
    Location: Convergence Center Lobby (CONV) 101 Foundry Dr. in Discovery Park [Map]

    DEADLINE FOR SUBMISSION EXTENDED: Monday, March 25th, 2024 5:00pm ET

    CERIAS Affiliated Purdue University Students

    CERIAS will print large, high-quality posters for the 2024 symposium poster session. These posters will be printed on a large-format ink jet printer and prepared for display. CERIAS will cover the cost of preparing the posters if you send the poster to us by the deadline. We strongly encourage you to take advantage of this offer. All posters submitted by the deadline will also be included in materials to be given to attendees and CERIAS staff will place your poster in the appropriate location prior to the session. If you have not registered as a CERIAS affiliated student, please join here.

    Statewide Indiana Cybersecurity Summit Poster Submissions (Universities other than Purdue)

    You are responsible for the cost of printing your own poster. Please bring it with you to the symposium on Tuesday, Apri 2nd. We will provide space to display your poster at our poster session. You are also invited to participate in our Poster Preview session. The Preview is your opportunity for you to present your research in 60 seconds or less.

    Poster Overview

    Please note the deadline for remitting your poster to us is Monday, March 25th, 2024 5:00pm ET. This deadline is _firm_. If you fail to meet this deadline, your poster will not be included on the symposium materials, and you will need to create your poster with your own resources and deliver the poster to the designated poster session location.

    CERIAS will remove all posters from the room and store them following the session. Please contact us at any time if you wish to use the poster or keep it in your office or lab.

    We ask that you follow these procedures and meet the deadlines:

    We will only print posters that meet the following requirements:

    • You are a CERIAS Affiliated Purdue University Student
    • Posters must be 30.5” x 40” (30 and one half inches wide, 40 inches tall)
    • Posters must use the template provided below.
    • Template graphical elements (including the header and footer) may not be modified or obscured in any way.
    • Posters must be provided either in PDF (preferred) or PowerPoint
    • Posters must be submitted by Monday, March 25th, 2024 5:00pm ET.. Posters received after this deadline will not be accepted for printing but may still be presented at the Symposium Poster Session
    • A maximum of 2 posters can be created per presentation
    • Finalize your presentation information and register as a presenter BEFORE submitting your poster. Put the poster ID key # you are given in the subject of your submission email. Poster submissions that do not include a poster ID key # will be rejected.
    Each submission must include:
    • The presentation title
    • A short abstract
    • A list of all authors/creators
    • A list of all presenters who will attend the poster session (all of whom must register as presenters)
    • A single person to be responsible for poster submission — multiple sources may result in confusion and lead to errors
    Posters will be registered when you:
    • Submit your poster and all related information at the same time
    • Email your posters to posters@cerias.purdue.edu. Put your poster ID (provided when you register as a poster presenter) in the “Subject:” line of _all_ email correspondence regarding this poster.

    If the deadline is not met:

    • Printing costs are the responsibility of the research project

    Design Guidelines

    • Never use text smaller than 24pt
    • Use sans-serif fonts like Arial or Helvetica

    Poster Templates

    Templates

    2024 Christopher Cleary

    2024 Mark Lewis

    2024 Nathaniel Husted

    2024 Max Dewees

    2024 Michael Sangid

    2024 Randall Brooks

    2024 Julia (Taylor) Rayz

    2024 Phillipe Biondi

    2024 Heidi Shyu

    2024 Dongyan Xu

    2024 Joel Rasmus

    2024 Eugene Spafford

    2024 Daniel J. Ragsdale

    CERIAS, PARI spur Jordan’s youth toward interest in cybersecurity

    Vaneet Aggarwal

    Hemanta Maji

    Ninghui Li

    Intel Technology Exchange Meeting 2024

    Wenhai Sun’s mission to bridge AI and online privacy with NSF award

    Cybersecurity Youth Academy for Jordan

    Logo for Cybersecurity Youth Academy for Jordan
    Logos for Purdue Applied Research Institute (PARI), Princess Sumaya University for Technology, and CERIAS

    Last Updated: 2023-12-08

    The Purdue Applied Research Institute (PARI), a wholly owned non-profit subsidiary of Purdue University, in partnership with the Princess Sumaya University for Technology is launching the Cybersecurity Youth Academy for Jordan (Cyber Academy). The goal of this academy is to support the strengthening of Jordan’s overall cybersecurity posture through increasing resilience to cyberattacks and cyber workforce strengthening.

    To achieve this goal, PARI and PSUT are implementing a training program for 50 Jordanian youths aged 18-24. The program consists of three phases:

    1. Phase 1: Virtual training program in the fundamentals of cybersecurity. Training modules will provide a general overview of the basic concepts of cybersecurity, including:
      • the nature, scope, and urgency of the cybersecurity landscape
      • types of threats
      • basic preventive actions (technological and procedural)
      • introduction to cryptography
      • individual cybersecurity threats and precautions
      • enterprise-level cybersecurity systems and management.
    2. Phase 2: An in-person cybersecurity boot camp that offers classroom instruction, experiential learning, real-world simulations, and job shadowing opportunities with cybersecurity practitioners in Amman. Topics will include:
      • Intro to Cybersecurity
      • Cyber Hygiene
      • Threat Landscapes
      • Asset Management
      • Vulnerability Assessment
      • Cyber-law
      • Cyber Ethics and Privacy
      • Auditing and Compliance
      • Risk Assessment and Management
      • Building Digital Infrastructure
      • Network Security
      • Database Security
      • Cloud Security
      • IOT
      • Forensics
      • AI in Cyber
    3. Phase 3: Virtual career exploration series that exposes students to a broad range of cybersecurity career paths, study and scholarship opportunities, and career counseling and networking.

    Participants who successfully complete the program will receive a cybersecurity certification from the sponsoring entities.


    Program Schedule

    Phase 1: May 1, 2024 – July 30, 2024. Class meets virtually for 2 hours once per week.

    Phase 2: Aug. 26, 2024 – Sept. 20, 2024. Class meets in person in Amman on PSUT campus, 5 days per week, 8 hours per day.

    Phase 3: Sept. 23, 2024 – Dec. 13, 2024. Class meets virtually for 2 hours once per week.

    Financial Support

    The program will cover the following expenses for all student participants:

    • All training and materials costs
    • Meals and coffee breaks during in-person training sessions.

    For those students residing in Amman, additional benefits include:

    • Daily travel stipend for roundtrip transportation from accommodations in Amman to training and event venues (up to $300/student)

    For those students residing outside of Amman, additional benefits (up to $1,690/student) include:

    • Travel stipend for roundtrip transportation between participants’ home city/region to/from Amman.
    • Overnight accommodations for the duration of the in-person boot camp event in Amman (participants will also be given the option of staying with a family member in Amman).
    • A meals and incidentals allowance to defray costs on weekends/non-training days in Amman.

    Accepted participants may also request a technology allowance to cover costs associated with accessing the virtual training components, such as a laptop rental, internet café fees, data connectivity packages, or similar.

    Application Information

    The Cyber Academy application is currently closed. The deadline to submit your application was February 15, 2024.

    Applications are no longer being accepted

    Eligibility

    Applicants of any race, ethnicity, color, religion, gender, or dis/ability are welcome. To be eligible to participate, applicants must meet the following criteria:

    • Age 18–24
    • Citizen of Jordan (applicants with refugee status may be given consideration).
    • Currently living and studying/working in Jordan at the time of application and plan to remain in Jordan for the foreseeable future.
    • Demonstrated interest in learning foundational cybersecurity skills and/or exploring careers related to cybersecurity.
    • Commitment to participation in the entire program, including a four-week, in-person boot camp in Amman.
    • Proficient in spoken and written English.
      • Finalists should be able to fulfill most communication goals, even on unfamiliar topics. They should understand the main ideas of both concrete and abstract writing and should be able to interact with proficient English speakers easily.

    Individuals in the following circumstances are NOT eligible for the Cyber Academy:

    • U.S. citizens and/or permanent residents of the United States
    • Individuals who are locally employed by the U.S. Government at the time of application and their immediate family members.
    • Individuals residing or working outside Jordan at the time of application.
    • Individuals who have applied for U.S. permanent residency in the past three years.

    Selection Process

    The selection process will be composed of two stages. In Stage 1, written applications (submitted on paper or electronically) will be reviewed and a short list of semi-finalists selected based on the following criteria.

    • A demonstrated interest in learning foundational cybersecurity skills and/or exploring careers related to cybersecurity.
    • The ability to work cooperatively in diverse groups and to respect the opinions of others.
    • Strong social and communication skills.
    • Strong commitment to the program.
    • An energetic, positive attitude.
    • Proficiency in written and spoken English.
    • Adaptability and learner mindset: ability to reflect on own skills, learn new skills, and self-develop.

    In Stage 2, semi-finalists will participate in brief telephone interviews to evaluate English language capabilities (i.e., ability to communicate clearly in conversational English).

    NOTIFICATION

    All applicants will be notified via email about the result of their applications by March 25, 2024.

    2023 Annual Information Security Symposium

    2023 SYMPOSIUM OVERVIEW

    The 24th annual CERIAS Security Symposium will bring together experts and practitioners from all areas of cyber and cyber-physical systems with interests in security, privacy, resiliency, autonomy, trusted electronics, and explainable AI. Attendees will consist of a mix of academic, industry, government and military representatives who are interested in learning new and innovative ways to secure our future. Join us as we celebrate the 25th anniversary of CERIAS!

    2023 INDIANA STATEWIDE CYBERSECURITY SUMMIT

    Raising Indiana’s Cybersecurity Awareness

    Logos of: Purdue University, University of Notre Dame, IUPUI, Indiana University

    The 2nd Indiana Statewide Academic Alliance Summit will be held as part of the CERIAS Symposium on day 1. Universities from across Indiana will present their research and initiatives in Lightning Talks.

    Cybersecurity literacy is increasingly vital to business executives and leaders across industries, sectors and nations. Cyber attackers, ranging from hacktivists to organized crime networks to nation-states are targeting vulnerable networks and are frequently successful in stealing funds as well as valuable intellectual property. Cybersecurity is central to economic competitiveness and national security. Indiana’s universities are undertaking groundbreaking research and have robust operational capabilities that can help in this fight.

    Speakers

    Agenda

    Printable Agenda Booklet (PDF)
    No agenda at this time.


    Research Posters

    Travel Information

    For More Information…

    For further information on the symposium or current and future CERIAS initiatives, contact:

    Joel Rasmus CERIAS
    Managing Director
    Phone: 765 494-7806
    E-mail: info@cerias.purdue.edu

    Reflecting on the Internet Worm at 35

    Taram wins ACM SIGMICRO Dissertation Award

    Securing 5G for Military Operations: Purdue is part of NSF’s Convergence Accelerator Track G a

    Purdue’s b01lers Win Raymond James CTF 2023, Earn $10,000 Prize

    CERIAS’ Shawn Huddy receives 2023 Community Spirit Award

    Spaf has a Fireside Chat with Ret. Admiral Michael Rogers for Cybersecurity Awareness Month

    Spaf takes a seat among the elite

    October Cybersecurity Month Events

    Autonomous & Intelligent Multi-agent Systems (AIMS) Lab

    Center for Secure Microelectronics Ecosystem

    2023-2024 Research Opportunities

    Prof. Sabine Brunswicker / Prof. Santiago Torres Arias

    sbrunswi@purdue.edu) / santiagotorres@purdue.edu

    https://rcodi.org/project/guac-alytics

    We are particularly interested in new incoming PhD students but also undergraduates etc. that are interested in getting involved with OSS supply-chains.

    Prof. Hany Abdel-Khalik

    abdelkhalik@purdue.edu

    Looking for Graduates and Undergrads. https://engineering.purdue.edu/CYNICS

    Prof. Yung-Hsiang Lu

    yunglu@purdue.edu

    https://yhlu.net/prospective.html

    Looking for a doctoral student for the AI Institute (AI for cybersecurity https://action.ucsb.edu/).

    Prof. Suranjan Panigrahi

    spanigr@purdue.edu

    https://polytechnic.purdue.edu/profile/spanigr

    I am looking for undergraduate students - advanced sophomore, junior or senior from computer science or computer information technology or other science or engineering disciplines with skills in computer programming, and data analysis. Experience or interests in cybersecurity is a plus.

    Flexible hours; 8- 30 hours per week depending on the student’s availability. Competitive pay.

    Prof. Lin Tan

    lintan@purdue.edu

    I have exciting projects listed here: https://www.cs.purdue.edu/homes/lintan/ongoingProjects.html

    I am looking for strong students but in particular US citizens and permanent residents.

    Prof. Samuel Wagstaff

    ssw@cerias.purdue.edu

    I have a project suitable for an undergrad. It involves programming mostly in “python” on a compute cluster in RCAC.

    Assured autonomy: What, from where, how, and what next?