Cedar masthead
Contact Us

University of Wyoming
1000 E. University Ave.
Laramie, WY 82071
Phone: (307)-766-1121

Find us on Instagram (Link opens a new window)Find us on Facebook (Link opens a new window)Find us on Twitter (Link opens a new window)Find us on LinkedIn (Link opens a new window)Find us on YouTube (Link opens a new window)

The CEDAR Lab is involved with many different research pursuits. Multiple different topics are currently being researched such as continuous authentications, DDoS detection and mitigation, and artificial immune systems. The lab has also partnered with Idaho National Laboratory to investigate industrial control system security. Below are links to the past and current research projects from the CEDAR Lab.
Different types of drones

UXV Swarm Research

Drone swarms are collections of autonomous devices that move through air, land, sea, or space with no central controller dictating objective or direction. The drones used in these swarms are often limited to having restrained compute resources and little memory due to budget constraints, so developing efficient behaviors is necessary for the drones to work with these restrictions. This research group is concerned with developing swarming behaviors that are light on resources while also being robust to external attacks. Click the title link to learn more.


Cartoon character playing an arcade machine

ARCADE

The Advanced Research in Continuous Authentication through Dynamic Evaluation (ARCADE) initiative is a group of research projects that aim to increase user accounts' security by using the user's behavior as an authentication method. Current research for which behavioral methods as viable for authentication means include keystroke dynamics and sudoku solving strategies. Click the title link to learn more.


Head sillhouette with a leaky faucet in the brain

QUIRK

Modern machine learning methods have helped tackle many problems facing our society. However, despite their ubiquity, there has been little done to understand the security of these methods. The QUIRK project investigates how standard machine learning models could be vulnerable or leak information and then develop secure protections from such attacks. Click the title link to learn more


Picture of virus

ARTEMIS

The human body has evolved over many years to adapt to environmental, bacterial, and viral stressors to protect the complicated processes needed to keep humans alive. This evolution has created a robust immune system that adapts and responds to new threats while developing memory for these threats for future responses. The ARTificial Emulsive Immune System (ARTEMIS) project investigates how techniques used by the biological immune system can develop protections for digital systems. Click the title link to learn more.


Close up of industrial control wiring panel

Industrial Control System Security

Out-of-date and rarely updated computing devices control critical infrastructure systems such as power and water distribution. These devices often are complicated to update and patch for vulnerabilities since they control processes that are difficult or costly to stop. When connected to the internet, these devices pose a security risk which (if exploited) could harm the critical processes they are controlling. This project is concerned with researching methods for securing industrial control systems and developing a physical testbed to research and demonstrate security methods. Click the title link to learn more.


Picture of micro:bit based achievment badge

Micro:Bit

The CEDAR Center has been responsible for hosting the Wyoming edition of the NSA GenCyber camp since 2018. During these camps, the CEDAR Center has used the micro:bit hardware platform as the main focus of their activities. Thanks to the many sensors and ease of program afforded by this platform, CEDAR members have created many different activities to help educate high school students and teachers about cybersecurity. Click the title link to learn more about these activities.


D cubed distributed network

D-Cubed

Distributed Denial of Service attacks have continued to increase in scale and power partly due to the large increase in internet connected devices. This project is working to detect DDoS attacks through incremental machine learning.


Stylized canary

Canary

Project Canary is another Distributed Denial of Service (DDoS) project that is focused on the detection of DDoS attacks. As the power of DDoS attacks increases, early detection and mitigation become ever so important. This project aims to define a rapid detection and mitigation technique to counter the aforementioned DDoS attacks.


Tor Project Onion Logo

Consumer Security

Often times the security measures needed to effectively protect consumers online can be cumbersome or too technologically advanced for the average end-user to properly use. This consumer security research project investigates the feasibility of creating a Tor router using consumer off the shelf technologies. This Tor router then allows the end-user to connect to it as they would a normal wifi router and secures all their communications by using the Tor network.


Contact Us

University of Wyoming
1000 E. University Ave.
Laramie, WY 82071
Phone: (307)-766-1121

Find us on Instagram (Link opens a new window)Find us on Facebook (Link opens a new window)Find us on Twitter (Link opens a new window)Find us on LinkedIn (Link opens a new window)Find us on YouTube (Link opens a new window)