Grant Details

Secure and Trustworthy Cyberspace (SaTC)

 
  • Grants Office Grantwriting service fee is currently unavailable for this grant
    Get more information on grantwriting

    CFDA#

    47.041; 47.049; 47.070; 47.075; 47.076
     

    Funder Type

    Federal Government

    IT Classification

    B - Readily funds technology as part of an award

    Authority

    National Science Foundation (NSF)

    Summary

    The goals of the Secure and Trustworthy Cyberspace (SaTC) program are aligned with the Federal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice. The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged. The RDSP identified six areas critical to successful cybersecurity R&D:

    1. scientific foundations;
    2. risk management;
    3. human aspects;
    4. transitioning successful research into practice;
    5. workforce development; and
    6.  enhancing the research infrastructure.

    Proposals must be made in one of the following areas:


    CORE: This solicitation focuses only on core research directly supporting a safe, secure, resilient, and trustworthy cyberspace, conducted ethically with the highest scientific standards. Of special interest are proposals that are transformative, forward-looking, and offer innovative or clean-slate approaches that provide defenders a distinctive advantage. SaTC views cybersecurity as a socio-technical challenge and encourages proposals that advance the field of cybersecurity within a single discipline, or efforts that span multiple disciplines. Some specific research topics of interest for CORE proposals include, but are not limited to:

    • Access Control & Identity Management
    • Authentication & Biometrics
    • Cryptography Applied & Theory
    • Cyber-Physical Systems
    • Data Science
    • Forensics
    • Formal methods & Language-based Techniques
    • Hardware Security Architecture
    • Hardware Security Design
    • Information Trustworthiness
    • Intrusion Detection
    • Mathematics & Statistics
    • Networks
    • Privacy
    • Social, Behavioral, & Economic Sciences
    • Softare Security Engingeering
    • Systems
    • Usability & Human Interaction

    EDU: The Education (EDU) designation will be used to label proposals focusing entirely on cybersecurity education. Proposals submitted to this designation leverage successful results from previous/current basic research in cybersecurity and research on student learning, both in terms of intellectual merit and broader impacts, to address the challenge of expanding existing educational opportunities and resources in cybersecurity. This might include but is not limited to the following efforts:

    • Based on the results of previous and current basic research in cybersecurity, define a cybersecurity body of knowledge and establish curricular recommendations for new courses (both traditional and online), degree programs, and educational pathways leading to wide adoption nationally;
    • Evaluate the effects of these curricula on student learning;
    • Encourage the participation of a broad and diverse population in Cybersecurity Education;
    • Develop virtual laboratories to promote collaboration and resource sharing in Cybersecurity Education;
    • Develop partnerships between centers of research in cybersecurity and institutions of higher education that lead to improved models for the integration of research experiences into cybersecurity degree programs;
    • Develop and evaluate the effectiveness of cybersecurity competitions, games, and other outreach and retention activities; and
    • Conduct research that advances improvements in teaching and student learning in cybersecurity and, where possible, focuses on broadening participation.

    TTP: The Transition to Practice (TTP) designation will be used to label proposals that are focused exclusively on transitioning existing research to practice. The TTP designation may be used for Small and Medium proposals.


    The objective of TTP is to support the development, implementation, and deployment of later-stage and applied security or privacy research into an operational environment in order to bridge the gap between research and production. A TTP proposal must specifically describe how the successful research results will be operationally deployed into an organization or technology. Collaborations with industry are strongly encouraged. The outcome of a TTP project is not solely intended to be commercialization. Proposals that target the security of the scientific research cyberinfrastructure, and enable robust and reliable science through advances in reproducibility, provenance, and privacy are highly encouraged. Topics of interest include: tools to detect behavioral anomalies across cyberinfrastructure systems, including detecting the tools and techniques of an attack and methods to mitigate security threats; tools to ensure the integrity of data as it traverses multiple environments such as mobile, cloud, multiple clouds, and networks; and real-time data analytics for security incident response.

     

    History of Funding

    Previous recipients can be viewed online at https://nsf.gov/awardsearch/advancedSearchResult?WT.si_n=ClickedAbstractsRecentAwards&WT.si_x=1&WT.si_cs=1&WT.z_pims_id=504709&ProgEleCode=&BooleanElement=Any&BooleanRef=Any&ActiveAwards=true&#results.

    Additional Information

    Proposals may address, but are not limited to, the following efforts:
    • Based on the results of previous and current basic research in cybersecurity, define a cybersecurity body of knowledge and establish curricular recommendations for new courses (both traditional and online), degree programs, and educational pathways leading to wide adoption nationally;
    • Evaluate the effects of these curricula on student learning;
    • Encourage the participation of a broad and diverse student population in Cybersecurity Education;
    • Develop virtual laboratories to promote collaboration and resource sharing in Cybersecurity Education; Develop partnerships between centers of research in cybersecurity and institutions of higher education that lead to improved models for the integration of research experiences into cybersecurity degree programs;
    • Develop and evaluate the effectiveness of cybersecurity competitions, games, and other outreach and retention activities; 
    • Conduct research that advances improvements in the teaching and student learning in cybersecurity.
    Applicants submitting Small, Medium or Frontier proposals (but not Cybersecurity Education projects) should identify a primary and, optionally, a secondary topic area:
    • Access control
    • Authentication
    • Biometrics
    • Cryptography, theory
    • Cryptography, applied
    • Cyber-physical systems (CPS)
    • Data science
    • Forensics
    • Formal methods
    • Hardware, security architecture
    • Hardware, security design
    • Information trustworthiness
    • Intrusion detection
    • Language based security
    • Mathematics and statistics
    • Privacy, theory
    • Privacy, applied
    • Social networks
    • Social, behavioral and economic science
    • Software
    • Systems
    • Usability and human interaction
    • Wired networking
    • Wireless networking

    Contacts

    Nina Amla

    Nina Amla

    , 703) 292-8910
     

  • Eligibility Details

    Eligible applicants include:
    • Universities and Colleges
    • Non-profit, non-academic organizations
    • For-profit organizations
    • State and Local Governments
    • Unaffiliated Individuals
    • Foreign organizations
    • Other Federal agencies

    Deadline Details

    Proposals for all categories are accepted throughout the year.

    Award Details

    The estimated total funding available for FY19 is $68,000,000. Approximately 93 awards will be funded through this program, including 10 education awards, 55 small awards, and 28 medium awards. Cost sharing is not required.

    • Small projects: up to $500,000 in total budget, with durations of up to three years 
    • Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years 
    • Education projects: $500,000 in total budget, with durations of up to three years.

    Related Webcasts Use the links below to view the recorded playback of these webcasts


    • NSF Funding for Campus Cyberinfrastructure in Higher Education - Sponsored by NetApp - Playback Available
    • Funding High Performance Computing in Support of University Research – Sponsored by NetApp - Playback Available
    • Getting A Virtualization Project Funded - Sponsored by NetApp - Playback Available

 

You have not selected any grants to Add


Please select at least one grant to continue.


Selections Added


The selected grant has been added to your .



  Okay  

Research Reports


One of the benefits of purchasing an UPstream® subscription is
generating professional research reports in Microsoft® Word or Adobe® PDF format
Generating research reports allows you to capture all the grant data as
well as a nice set of instructions on how to read these reports


Watchlists and Grant Progress


With an UPstream® subscription you can add grants to your
own personal Watchlist. By adding grants to your watchlist, you will
receive emails about updates to your grants, be able to track your
grant's progress from watching to awards, and can easily manage any
step in the process through simplified workflows.

Email this Grant


With an UPstream® subscription, you can email grant details, a research report,
and relevant links to yourself or others so that you never lose your
details again. Emailing grants is a great way to keep a copy of the
current details so that when you are ready to start seeking funding
you already know where to go

 
© Grants Office, LLC 2019
Grants Office    |     UPstream™    |     FUNDED    |     Terms Of Use     |     Privacy Statement