- Apply to UW
- Programs & Majors
- Cost & Financial Aid
- Current Students
- UW Life
- About UW
Drone swarms are collections of autonomous devices that move through air, land, sea, or space with no central controller dictating objective or direction. The drones used in these swarms are often limited to having restrained compute resources and little memory due to budget constraints, so developing efficient behaviors is necessary for the drones to work with these restrictions. This research group is concerned with developing swarming behaviors that are light on resources while also being robust to external attacks. Click the title link to learn more.
The Advanced Research in Continuous Authentication through Dynamic Evaluation (ARCADE) initiative is a group of research projects that aim to increase user accounts' security by using the user's behavior as an authentication method. Current research for which behavioral methods as viable for authentication means include keystroke dynamics and sudoku solving strategies. Click the title link to learn more.
Modern machine learning methods have helped tackle many problems facing our society. However, despite their ubiquity, there has been little done to understand the security of these methods. The QUIRK project investigates how standard machine learning models could be vulnerable or leak information and then develop secure protections from such attacks. Click the title link to learn more
The human body has evolved over many years to adapt to environmental, bacterial, and viral stressors to protect the complicated processes needed to keep humans alive. This evolution has created a robust immune system that adapts and responds to new threats while developing memory for these threats for future responses. The ARTificial Emulsive Immune System (ARTEMIS) project investigates how techniques used by the biological immune system can develop protections for digital systems. Click the title link to learn more.
Out-of-date and rarely updated computing devices control critical infrastructure systems such as power and water distribution. These devices often are complicated to update and patch for vulnerabilities since they control processes that are difficult or costly to stop. When connected to the internet, these devices pose a security risk which (if exploited) could harm the critical processes they are controlling. This project is concerned with researching methods for securing industrial control systems and developing a physical testbed to research and demonstrate security methods. Click the title link to learn more.
The CEDAR Center has been responsible for hosting the Wyoming edition of the NSA GenCyber camp since 2018. During these camps, the CEDAR Center has used the micro:bit hardware platform as the main focus of their activities. Thanks to the many sensors and ease of program afforded by this platform, CEDAR members have created many different activities to help educate high school students and teachers about cybersecurity. Click the title link to learn more about these activities.
Distributed Denial of Service attacks have continued to increase in scale and power partly due to the large increase in internet connected devices. This project is working to detect DDoS attacks through incremental machine learning.
Project Canary is another Distributed Denial of Service (DDoS) project that is focused on the detection of DDoS attacks. As the power of DDoS attacks increases, early detection and mitigation become ever so important. This project aims to define a rapid detection and mitigation technique to counter the aforementioned DDoS attacks.
Often times the security measures needed to effectively protect consumers online can be cumbersome or too technologically advanced for the average end-user to properly use. This consumer security research project investigates the feasibility of creating a Tor router using consumer off the shelf technologies. This Tor router then allows the end-user to connect to it as they would a normal wifi router and secures all their communications by using the Tor network.