About CERIAS

Page Content

Mission Statement

The mission of CERIAS is to advance the knowledge and practice of information assurance and security through the performance of world-class research, the delivery of the highest quality education, and by serving as an unbiased source of information locally, nationally, and internationally.

Vision Statement

The Purdue University Center for Education and Research in Information Assurance and Security (CERIAS) will be recognized as the preeminent interdisciplinary and multidisciplinary research and education center in information assurance and security.

Organizational Goals

  • Empower faculty and research staff from diverse disciplines to address infosec problems, formulate research and education solutions, and secure funding and support.
  • Strengthen meaningful partnerships with Discovery Park and its affiliated centers.
  • Establish and advance the scientific rigor of the field.
  • Discover, develop, and transfer technologies, methods, and information that enhance practice in the field.
  • Establish CERIAS’s prominence as a leader in the development and delivery of educational curriculum from K-12 to graduate programs and continuing education and training.
  • Engage industry, government, and other academic institutions as awareness, education, and research partners.
image

The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information security that are crucial to the protection of critical computing and communication infrastructure. CERIAS is unique among such national centers in its multidisciplinary approach to the problems, ranging from purely technical issues (e.g., intrusion detection, network security, etc) to ethical, legal, educational, communicational, linguistic, and economic issues, and the subtle interactions and dependencies among them.

The Research conducted through CERIAS includes faculty from six different colleges and 20+ departments across campus. The eight areas below summarize the research focus areas for the faculty involved with the center:

Policy, Law and Management

This area includes tools and methods for understanding the context of security, and how to best allocate resources for protection of assets. This includes research into risk assessment and mitigation methodologies, policy development, the role of law and social pressure on security, economic aspects of security, cross-cultural issues governing security, cyberethics, simulation and modeling of security, and policy languages and proofs.

Associated personnel: B. Alge, J. Anderson, M. Bernstein, A. Chaturvedi, H. Cho, J. Goldman, K. Kannan, R. Mislan, J.Rees, J. Richardson, D. Schoorman, E. Spafford, L. Tsoukalas

Departments: Communication, Computer Science, Education, ITaP, Management, Nuclear Engineering, Philosophy, Sociology, Computer & Information Technology

Human Centric Security

How does IT change our interactions, and how can more trustworthy IT change them further? This includes studies of on-line trust, ecommerce (business-to-business and business-to-consumer), digital government services, e-conferencing, on-line personae and anonymity, online news, on-line research and the ephemeral nature of information, on-line propaganda, and spam.

Associated faculty: J. Boyd, H. Cho, M. Dutta, A. Elmagarmid, J. Hahn, K. Kannan, S. Matei, P. Meunier, J. Mills, S. Offenbach, M. Rogers, E. Spafford, H. Sypher

Departments: Communication, CERIAS Staff, Computer Science, Hospitality & Tourism Management, Management, Psychology, Computer & Information Technology

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Education, Linguistics, Management

End System Security

This area includes tools and methods for building software artifacts, servers, and networks that are resistant to attacks and failures. This includes research into vulnerability assessment and identification, programming languages and tools for secure programming, mobile code and “sandboxes,” proof-carrying systems, trusted embedded systems, resilient server architectures, protection against malicious software, dynamic reconfiguration of systems, hardware architecture design, fault-tolerance, code tamperproofing, and penetration testing. Research into more secure operating systems and database systems falls in this area, as does research into better human-computer interfaces for security (HCI).

Associated personnel: W. Aref, M. Atallah, E. Bertino, B. Bhargava, C. Clifton, R. Eigenmann, A. Elmagarmid, A. Ghafoor, A. Grama, A. Hosking, E. Houstis, C. Justice, P. Meunier, N. Li, C. Nita-Rotaru, K. Park, S. Prabhakar, R. Proctor, J. Rice, G. Salvendy, M. Salvo, L. Si, T.N. Vijaykumar, J. Vitek, K. Watson, D. Xu

Departments: CERIAS staff, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, Linguistics, Psychology

Network Security

Security becomes more complex when participating entities are physically separated from the current location; knowing who and what is communicating from a remote location complicates security decisions. Research in this area includes wireless computing, communication protocol design and verification, agent computation, quality-of-service protection, firewall design and testing, SCADA security, dynamic and protective routing, security for grid computing, and sensor net security.

Associated personnel: S. Bagchi, W. Cleveland, E. Coyle, R. Dejoie, P. Eugster, S. Fahmy, J. T., Korb, S. Ksander, J. Lehnert, S. Matei, P. Meunier, C. Nita-Rotaru, S. Nof, S. Rao, P. Rawles, A. Schroll, N. Shroff, E. Spafford, K. Watson, D. Xu, D. Yau, M. Zhu, M. Zoltowski

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, ITaP

Prevention, Detection and Response

Systems are attacked, and sometimes attacks succeed. This area of our expertise includes intrusion and misuse detection, integrity management issues, audit and logging analysis, sensor and alarm design, strike-back mechanisms, dynamic reconfiguration, honeypots and “jails”, cyberforensics, hacker profiling, deception and psychological operations, information warfare, cyberterrorism, criminal law and computer crime.

Associated personnel: S. Bagchi, J.T. Korb, S. Ksander, P. Meunier, R. Mislan, M. Rogers, A. Schroll, E. Spafford, H. Sypher, K. Watson, T. Wedge

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, ITaP

Assured Identity and Privacy

There is a tension between increased confidence and granularity of authorization provided by better identification of on-line entities, and with the need to protect the privacy rights of individuals and organizations. This area includes research in role-based access control (RBAC), biometrics, pervasive surveillance (“Panoptic Effects”), privacy-protecting transformations of data, privacy-protecting data mining methods, privacy regulation (e.g., HIPAA and COPPA), oblivious multiparty computation, and trusted proxy research.

Associated personnel: J. Anderson, M. Atallah, E. Bertino, W. Cleveland, C. Clifton, S. Elliott, A. Ghafoor, N. Li, C. Nita-Rotaru, L. Si, J. Siskind, S. Wagstaff, B. Xi

Departments: Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Technology, Sociology, Statistics

Departments: Computer Science, Electrical & Computer Engineering, Linguistics, Mathematics

About our logo

What it represents
CERIAS Logo
The CERIAS Logo is of a magnifying glass, of the kind often seen in old Sherlock Holmes movies and artist conceptions of scientists at work. In both cases, the magnifying glass makes small features visible, providing important clues to an investigator. This represents our own work in research and the practice of infosec - making new features visible to students, researchers and practitioners. In the field of the magnifying glass, the “IAS” is enlarged. This signifies the Center’s focus on issues of Information Assurance and Security.

Our logo was designed for CERIAS by Michael Tieman of MT Studios. He donated his efforts to Purdue University, and we are grateful for his work.

You can get print-ready versions of the CERIAS logo on the Public Relations Materials page.