Skip to Main Content

Apply Now to the University of Wyoming apply now
Cedar masthead

Research Projects

The CEDAR Lab is involved with many different research pursuits. Multiple different topics are currently being researched such as continuous authentications, DDoS detection and mitigation, and artificial immune systems. The lab has also partnered with Idaho National Laboratory to investigate industrial control system security. Below are links to the past and current research projects that have resulted from the CEDAR Lab.
Cartoon shark logo


The Secure, Heterogeneous, Autonomous, and Rotational Knowledge for Swarms (SHARKS) protocol is an investigation into how swarm positioning behavior can be developed for a cluster of drones. These drones are limited to having restrained compute resources and little memory so efficient behaviors need to be developed that can work with these sort of restrictions. This project is focused on securing swarm positioning behaviors so that malicious actors cannot disrupt the swarm. Click the link to read more.

Cartoon character playing an arcade machine


The Advanced Research in Continuous Authentication through Dynamic Evaluation (ARCADE) initiative is a group of research projects that aim to increase the security of user accounts by using the behavior of the user as an authentication method. Some behavioral methods being researched as being viable for authentication means include keystroke dynamics as well as sudoku solving strategies. Click the link to learn more.

Close up of industrial control wiring panel

Industrial Control System Security

Critical infrastructure systems such as power and water distribution are controlled by out of date computing devices. These devices often are very difficult to update and patch for vulnerabilities since they control processes that are difficult or costly to stop. When connected to the internet, these devices pose a security risk which (if exploited) could harm the important processes they are controlling. This project is concerned with researching methods for securing industrial control systems as well as developing a physical testbed to research and demonstrate security methods.

D cubed distributed network


Distributed Denial of Service attacks have continued to increase in scale and power partly due to the large increase in internet connected devices. This project is working to detect DDoS attacks through incremental machine learning. Click the link to learn more.

Stylized canary


Project Canary is another Distributed Denial of Service (DDoS) project that is focused on the detection of DDoS attacks. As the power of DDoS attacks increases, early detection and mitigation become ever so important. This project aims to define a rapid detection and mitigation technique to counter the aforementioned DDoS attacks.

Android phone with Chrome logo

Android Malware Analysis

Coming Soon!

Picture of virus


The human body has evolved over many hundreds of years to adapt to environmental, bacterial, and viral stressors to protect the complicated processes needed to keep humans alive. This evolution has created a powerful immune system that adapt and respond to new threats while developing a memory for these threats for future responses. The ARTificial Emulsive Immune System (ARTEMIS) project investigates how techniques used by the biological immune system can be used to protect digital systems. Click the link to learn more.



RFID technologies allow for an efficient method for tracking products by using small, inexpensive trackers. These trackers can be stickers, cards, or fobs and can be attached to inventory to monitor how that inventory is stored, moved, and used. Certain methods can be applied to these trackers to ensure that some of the information stored in the tracker cannot be modified. If this information could be modified then business and shipping logistics systems can be confused and made to misplace or mishandle the wrong product. The Marconi project aims at investigating whether the immutable data on an RFID tag can be overwritten and how to further secure this information.

Picture of micro:bit based achievment badge


The CEDAR Center has been responsible for hosting the Wyoming edition of the NSA GenCyber camp during 2018 and 2019. During this camp students have the ability to progress through increasingly difficult stages of puzzles in order to earn awards. In order to accomplish this a wearable badge, controlled by a micro:bit, was developed in order to provide students with daily puzzles and progress points. Click the link to learn more.

Ring of crickets


As more devices are added to peer-to-peer (P2P) networks in highly specialized, lightweight, and localized environments, the security and isolation of communication within a network remains a major design challenge. By examining several communication problems in specific domain applications, a secure communication protocol, secure communication for heterogeneous Internet of Things (IoT) with round-robin protection (SCHIRP), is used to explore and define potential minimalistic solutions.

Tor Project Onion Logo

Consumer Security

Often times the security measures needed to effectively protect consumers online can be cumbersome or too technologically advanced for the average end-user to properly use. This consumer security research project investigates the feasibility of creating a Tor router using consumer off the shelf technologies. This Tor router then allows the end-user to connect to it as they would a normal wifi router and secures all their communications by using the Tor network.

Contact Us

Cybersecurity Education and Research

Computer Science Department

Dept. 3315, 1000 E. University ave

Laramie, WY 82071


Find us on Facebook (Link opens a new window) Find us on Twitter (Link opens a new window) Find us on Instagram (Link opens a new window) Find us on YouTube (Link opens a new window) Find us on LinkedIn (Link opens a new window)

1000 E. University Ave. Laramie, WY 82071
UW Operators (307) 766-1121 | Contact Us | Download Adobe Reader

Accreditation | Virtual Tour | Emergency Preparedness | Employment at UW | Privacy Policy | Harassment & Discrimination | Accessibility Accessibility information icon