NSA and Universities Partnering to Advance Cybersecurity Research

The NSA has collaborated with leading university research institutions to advance cybersecurity research, inviting them to a day-long event at the National Cryptologic Museum. This initiative is part of the Laboratory for Advanced Cybersecurity Research's effort to kick off the Science of Security (SoS) Virtual Institute (VI). The event focused on three critical areas: Trusted Systems, Artificial Intelligence and Cybersecurity, and Defensive Mechanisms. These VIs foster collaboration between industry, academic communities, and NSA research liaisons, supporting the Research Directorate’s mission to anticipate technological advances, prevent disruptive technology surprises, and transition research into operational outcomes. Dr. Rita Bush, chief of the Laboratory for Advanced Cybersecurity Research, emphasized the importance of these partnerships and the continuation of the SoS program in her opening remarks.

The Science of Security program, which began in 2012, has evolved from funding small multidisciplinary labs, known as "lablets," to adopting the Virtual Institute model this year. This new approach maintains the foundational research of the lablets while allowing for greater flexibility in adding or retiring projects as knowledge advances. Among the participants, Professors Xenofon Koutsoukos, Kevin Leach, and Taylor T. Johnson are undertaking significant projects within the program. The research conducted by these VIs is extensively documented and shared through the SoS Virtual Organization, an online repository aimed at maturing the scientific basis for security. This year's kickoff meeting featured principal investigators from institutions such as Arizona State University and Carnegie Mellon University, presenting on topics ranging from neural network security to cybersecurity for Bluetooth IoT devices. Dr. Glenn L., Acting Technical Director of the Laboratory for Cybersecurity Research, highlighted the significant impact of these research efforts, noting their influence on national cybersecurity strategies.


Read the full article here.