Feeds

Berkeley to lead $19m cybersecurity research gig

Our mantra is TRUST

  • alert
  • submit to reddit

High performance access to file storage

The National Science Foundation (NSF) this week gave the University of California, Berkeley, the lead role in a $19m government-funded cybersecurity research project.

Berkley heads a team of eight universities (including Carnegie Mellon University, Cornell University, Mills College, San Jose State University, Smith College, Stanford University and Vanderbilt University) from across the US forming the new Team for Research in Ubiquitous Secure Technology (TRUST). The project, supported by IT industry heavyweights such as Cisco, HP, IBM, Microsoft and Symantec, is one of just two NSF Science and Technology Center schemes to be funded this year. The other project, led by the Kansas Science and Technology Centre, will undertake research into polar ice sheets. TRUST is expected to receive nearly $19m over five years, with the possibility of a five-year, $20m extension.

Republican congressman Sherwood Boehlert, chairman of the House Science Committee, described the academics in the TRUST consortium as a "dream team" of information assurance and complex systems research. Praise indeed especially considering Berkley was obliged to warn 98,000 people that their personal data had been leaked after the theft of a laptop from its graduate school admissions office. Perhaps those boffins at Berkeley ought to be directing part of their attention closer to home instead of worrying about cyber apocalypse, like TRUST centre director S. Shankar Sastry.

"The cybersecurity community has long feared that it would take an electronic Pearl Harbour for people to realize the scale of disruptions possible from a concerted attack by terrorists," said Sastry, UC Berkeley professor of electrical engineering and computer sciences, and the principal investigator and director of the TRUST center.

Such nebulous fear-mongering is not to our taste but it fits well with the prevailing rhetoric from the Bush administration and doubtless did Sastry no harm in winning leadership of the project. The US government drive to increase support for fundamental research in cybersecurity follows a March report by the President's Information Technology Advisory Committee which said that the "information infrastructure of the US is highly vulnerable to disruptive domestic and international attacks."

A release from Berkley outlines its goals for the TRUST project.

TRUST researchers have set their sights on developing new technologies that will radically transform the ability of organizations - from private software vendors to local and federal agencies - to design, build and operate trustworthy information systems that control critical infrastructure. They will go beyond research into how to protect networks from attacks and develop ways to keep systems running properly even when intrusions occur - a concept known as "degrading gracefully under attack."

The center will look at systems problems through modelling and analysis, development of secure embedded systems, and integration of trusted components and secure information management software tools.

The researchers emphasize that the mantra for the center is TRUST, going far beyond cybersecurity research alone. They pointed out that the center relies upon close, interdisciplinary collaboration with experts in economics, public policy, social science and, significantly, human-computer interface.

The "mantra is TRUST". Blimey. Fire up the joss sticks and crank up the whale song - this lot have been sharing PowerPoint presentations with the strategy boutique mob, it would seem. Flippancy aside the TRUST centre has promised to conduct an extensive education and outreach component. It’s hoped this school and university educational program will lay the groundwork for training scientists and engineers who will develop the next generation of trustworthy systems. ®

Related stories

The farce of federal cybersecurity
NSA proposes backdoor detection centre
Slim pickings for cybersecurity in DHS budget
Soon al-Qaeda will kill you on the Internet

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.