Funded programs
The statewide initiative funds collaborations that reach across disciplines and geography to find new solutions.
FY24
In support of the CCI mission, CCI SWVA funded many programs in FY24. The following list describes the purposes, impacts, and breakthroughs of programs, many of them carried out as collaborations between CCI SWVA researchers and faculty from institutions within the larger CCI network. It includes support from fiscal year 2024 fund allocations.
1. Title: Weighted Graph States for Quantum Network Applications
PI: Ed Barnes
Lead Institution: Virginia Tech
Co-PIs & Institution: None
Funding Program: FY24 Research Program
Summary: This project will explore the usefulness of weighted graph states for quantum networks. This will be done by pursuing two main lines of research: (i) Determine to what extent weighted graph states are useful in their own right for quantum networking protocols, and (ii) develop a systematic method to produce nearly perfect graph states by preparing weighted graph states and measuring a subset of the qubits. The PI has already provided evidence that the latter is possible in a recent work that showed that nearly perfect GHZ states can be produced by preparing linear weighted graph states of 2n + 1 photons and measuring n of them in an appropriately chosen basis (see Fig. 1). However, it remains unknown whether more general (nearly) perfect graph states can be extracted from larger weighted graph states in a similar fashion and, if so, what weighted graph states should be used for this purpose.
2. Title: Using Intelligvent Converstational Agents to Empower Adolescents to be Reslilient Against Cybergrooming
PI: Jin-Hee Cho
Lead Institution: Virginia Tech
Co-PIs & Institution: Lifu Huang, San Won Lee (VT)
Funding Program: FY24 Research Program
Summary: This research will aim to fill this gap by developing a chatbot-based experiential learning intervention program that raises adolescents’ knowledge and awareness about risk factors for cyber grooming and increases self-efficacy to protect themselves from cyber grooming and cope with risky situations. To achieve this, we will develop a chatbot-based intervention program called RY-LAI, representing Resilient Youth Learn through Artificial Intelligence (pronounced as real AI).
3. Title: Timely Communication under Adversarial Attacks
PI: Maice Costa
Lead Institution: Virginia Tech
Co-PIs & Institution: Yalin Sagduyu (VT)
Funding Program: FY24 Research Program
Summary: With this project, we aim to contribute to advancing the state-of-the-art in the communication layer of cyber-physical systems, with an innovative combination of semantic communication and distributed learning. In many cases, the communication should deliver time-sensitive and private information on time, possibly in a hostile environment. Hence, we will consider a framework developed to operate under adversarial effects, to analyze important trade-offs involving reliability and timeliness under the presence of an adversary that may eavesdrop and jam the wireless channel and compromise CPS secure operation. In many cases, it is desirable that communication can go undetected, so we also consider the conditions for covertness and stealth.
4. Title: Fundamentals of Privacy-Detectability-Timeliness Tradeoff in Wireless Networks
PI: Harpreet Dhillon
Lead Institution: Virginia Tech
Co-PIs & Institution: None
Funding Program: FY24 Research Program
Summary: Even though AoI has received significant attention over the past decade, the PI has identified two fundamental open problems that relate to the tradeoffs of AoI with privacy and detectability. As will be discussed shortly, these tradeoffs have important implications for the design of critical defense infrastructure, such as radar networks, and the conceptualization of emerging commercial applications, such as Metaverse. The objective of this project is to obtain preliminary results for the two tradeoffs discussed above so that we can go for large external grant proposals as discussed in the sequel.
5. Title: Privacy-Aware Federated Learning in Heterogeneous IoT
PI: Thang Hoang
Lead Institution: Virginia Tech
Co-PIs & Institution: Tran Viet Xuan Phuong (ODU)
Funding Program: FY24 Research Program
Summary: The overarching objective of this proposal is to design, analyze and implement innovative privacy-aware FL functionalities that enable the computation heterogeneity of real IoT ecosystem thereby, enhancing the its security and performance in overall. We specifically focus on the core secure aggregation functionality, in which we aim to develop new techniques that can securely aggregate local AI models of different sizes and complexity with privacy and integrity guarantees even in the presence of powerful adversaries (e.g., corrupted aggregator, malicious workers).
6. Title: Identifying Human Factors Related Cybersecurity Risks and Vulnerabilities in Driving Automation Systems equipped CMV Fleets
PI: Xiaojian Jin
Lead Institution: Virginia Tech
Co-PIs & Institution: Zeb Bowden, Andrew Krum, Rich Hanowski (VTTI)
Funding Program: FY24 Research Program
Summary: The goal of this project is to investigate the cybersecurity risks and vulnerabilities associated with commercial motor vehicle (CMV) fleets equipped with driving automation systems, including automated driving systems (ADS) and advanced driver assistance systems (ADAS), to develop an understanding of the human factors and behaviors contributing to these risks and vulnerabilities.
7. Title: Quantum Algorithms for Ideal Class Group Computations
PI: Jason LeGrow
Lead Institution: Virginia Tech
Co-PIs & Institution: Travis Morrison, Jamie Sikora (VT)
Funding Program: FY24 Research Program
Summary: In this project we will study quantum algorithms for computing the structure of the ideal class group in the context of cryptography. Our results will yield faster, simpler, and more secure quantum algorithms for ideal class group structure computation, enabling post-post-quantum and quantum-assisted advanced functionalities—such as exotic signatures and trapdoor verifiable delay functions—from modern number theoretic primitives sooner than would be possible using existing algorithms.
8. Title: Digital Twins for Cyber Resilience of a Low Carbon Power and Energy Infrastructure
PI: Chen-Ching Liu
Lead Institution: Virginia Tech
Co-PIs & Institution: None
Funding Program: FY24 Research Program
Summary: By incorporating the insights from our prior work and leveraging the digital twin of the smart grid, our proposed method seeks to develop a robust anomaly detection system. This Machine Learning (ML) approach will enable the identification of abnormal behaviors and potential cyber threats in real-time, thereby enhancing the overall cybersecurity of the distribution system, using the VTES grid model available at the Power and Energy Center as a real-world study case. The combination of digital twins and advanced anomaly detection techniques is critical for proactively mitigating cyber risks and ensuring the secure operation of critical infrastructure systems.
9. Title: Software Defined Radio and O-RAN for Mobile Distributed MIMO (dMIMO)
PI: Lingjia Liu
Lead Institution: Virginia Tech
Co-PIs & Institution: none
Funding Program: FY24 Research Program
Summary:
Massive MIMO is an enabling technology for 3GPP 5G NR and is envisioned as a key one for Beyond 5G networks (e.g., 5G-Advanced, 6G, etc). To circumvent the form factor limitation of gNBs and to ensure a more unified network performance, distributed MIMO (dMIMO) operations such as distributed antenna systems (DAS), dynamic point selection (DPS), coordinated multi-point (CoMP) (a.k.a. network MIMO), and multiple transmit/receive point (multi-TRP) have been introduced in various releases of 3GPP. In the “Mobile Distributed MIMO: Learning Meets Spreading in Networking” project funded by OUSD(R&E)’s FutureG Program, we will be mainly focusing on system design and hardware prototype for mobile dMIMO systems. In this CCI project, we will be focusing on the software defined radio (SDR) prototype of dMIMO as well as the O-RAN system design and prototype for mobile dMIMO systems.
10. Title: Building a High-performance Intrusion Detection System for Virginia Tech's IPv4 and IPv6 Networks
PI: Wenjing Lou
Lead Institution: Virginia Tech
Co-PIs & Institution: Wenjing Lou (VT)
Funding Program: FY24 Research Program
Summary: This proposal outlines a research plan with the following objectives and intellectual merits:
• We will employ representation learning to enhance the IDS performance by learning new network traffic representations. This approach aims to improve the IDS’s ability to differentiate anomalies from benign samples. In this project, we will develop a contrastive learning-based IDS expected to significantly boost performance.
• In collaboration with Virginia Tech’s IT Security lab, our project aims to develop, evaluate, and deploy the proposed IDS systems specifically tailored for the Virginia Tech campus network. We will focus on IDS’s functionality in a dual-stack environment, where both IPv4 and IPv6 coexist. We will specifically examine the transferability of IDS models built for IPv4 traffic to effectively handle and protect against threats in IPv6 traffic.
• We also plan to create a well-curated NIDS dataset that can be used by the broader community.
11. Title: Coding theory for security and privacy
PI: Gretchen Matthews
Lead Institution: Virginia Tech
Co-PIs & Institution: None
Funding Program: FY24 Research Program
Summary: In this proposal, we consider techniques to train machine learning models on data held by individual entities while preserving the privacy of the data. We consider the standard setting in which the holders are honest but curious, meaning they accurately share information related to the data they hold (though not the data itself) and are willing to work with others to gain access. We also consider settings in which adversarial nodes which report false information related to the data they hold. Encoding the individual datasets and distributing the compu- tations across nodes can address this issue, but a number of questions remain about how to best do that even in the standard setting.
12. Title: Graduate Research & Innovation Design: Secure Connectivity for Renewable Devices in the grid (GRID-SECURED)
PI: Ali Mehrizi-Sani
Lead Institution: Virginia Tech
Co-PIs & Institution: none
Funding Program: FY24 Research Program
Summary:
The electric energy delivery system, commonly known as the power grid, is a critical infrastructure and a component of the national security. Transition to renewable energy resources, which can be deployed in a distributed manner close to power consumption sites, has necessitated the availability of communication infrastructure. Such infrastructure additionally has the potential to enhance the performance of control and protection facilities in the power grid. However, this also makes the power grid an attractive target for cyber-attacks. The overarching objective of this project is to create and demonstrate the GRID-SECURED framework. GRID-SECURED is a scalable, distributed, and cost-effective technology to enable secure and resilient communication to control and monitor distributed energy resources (DER), including grid-forming (GFM) inverters, within the power system and/or microgrids.
13. Title: Use & Abuse of Personal Information
PI: Alan Michaels
Lead Institution: Virginia Tech
Co-PIs & Institution: Madison Boswell (VT)
Funding Program: FY24 Research Program
Summary: Since 2020, Virginia Tech National Security Institute (VTNSI) has run a multi-disciplinary Vertically Integrated Project called Use & Abuse (U&A) of Personal Information (PI). U&A is an experiential learning project aligning with all three of CCI’s mission objectives, exploring how PI propagates across the Internet. Over the last academic year, a team of 58 students from 15 academic majors at Virginia Tech and Radford University developed an innovative database of 100,000 realistic fake identities that conform to the U.S. population [1]. During the upcoming year, we will disseminate these fake IDs, which stand up to reasonable scrutiny, with online second parties at scale using one-time transactions during a partially-automated signup event in Fall 2023.
14. Title: Robust Classification of Adversarial Images from Generative AI Models
PI: Bimal Viswanath
Lead Institution: Virginia Tech
Co-PIs & Institution: Taejoong Chung, Peng Gao (VT)
Funding Program: FY24 Research Program
Summary: In this project, we focus on the capability of generative models to produce convincing synthetic images. This capability can be easily misused today, raising several security threats. Therefore, we will develop new tools and methods to systematically investigate the effectiveness of existing defenses against this rapidly evolving threat and propose new directions for robustly detecting synthetic images.
15. Title: Real-time Integrated Misinformation Campaign Alarm and Tracking System in the Age of AI
PI: Yaling Yang
Lead Institution: Virginia Tech
Co-PIs & Institution: Lingjia Liu, Yang Yi (VT)
Funding Program: FY24 Research Program
Summary: The objective of this project is to conduct a comprehensive analysis of the most recent cases of misinformation campaigns, examining their tactics in exploiting diverse online platforms, and ultimately seeking effective solutions to mitigate their substantial threat to our society. By delving into these cases, we aim to gain a deeper understanding of the strategies employed by these campaigns, their impact on public discourse, and the extent of their societal implications. Through this research, we endeavor to develop robust countermeasures to combat the detrimental effects of misinformation and safeguard the integrity of our information ecosystem.
16. Title: Understanding and Protecting the Privacy for Health Data Sharing and Analysis in Virginia
PI: Hailong Zhang
Lead Institution: Virginia Tech
Co-PIs & Institution:
Funding Program: FY24 Research Program
Summary: The overarching goal of this project is to assess the practical impacts of privacy regulations and technologies, and to develop new PETs for health data. Our specific objectives are:
-Delineate the social, societal, political, and health impacts (e.g., disparities) of legislative and technological protections on sharing and analysis of health data.
-Enhance the quantitative understanding of the practicality and efficacy of existing PETs in various applications of health data analysis.
-Develop a robust framework and solution tailored for a multi-source environment, wherein different sets of health data demand varying degrees of privacy protection.
1. Title: FY24 CCI SWVA and NextUp Solutions Internships
PI: Steve Cooper
Lead Institution: Virginia Tech
Co-PIs & Institution: none
Funding Program: FY24 Workforce
Summary: Next Up Solutions provided 6 internships working with a local county government. The students performed a variety of cybersecurity tasks including: 1) Assist in conducting vulnerability assessments and penetration testing to identify potential security weaknesses in our systems and networks, 2) Support the implementation and maintenance of security controls, policies, and procedures, 3) Participate in the monitoring and analysis of security events and incidents, including log analysis and threat intelligence research, 4) Assist in the development and execution of security awareness training programs, 5) Collaborate with cross-functional teams to identify and mitigate security risks across different departments and projects.
2. Title: Virginia Cybersecurity Education Conference Teacher Sponsorships
PI: David Raymond
Lead Institution: Virginia Tech
Co-PIs & Institution: none
Funding Program: FY24 Workforce
Summary: The Virginia Cybersecurity Education Conference, gives high school and college educators in the Commonwealth an opportunity to share ideas and continue to build the Virginia cybersecurity education ecosystem. This year, we are working with CCI partners in the Central node to host the conference in Charlottesville, in collaboration with the University of Virginia.
1. Title: CryptoQuest: An Interactive Animation Series for Teaching Cryptography, Post-Quantum Cryptography, and Cybersecurity using Augmented Reality
PI: Sherif Abdelhamid
Lead Institution: Virginia Military Institute
Co-PIs & Institution: Blain Patterson (VMI), Sarah Patterson (VMI), Gretchen Matthews (VT), Hiram Lopez (VT)
Funding Program: FY24 Innovation Program
Summary:
The objective is to develop an interactive animation series to teach high school and university students' various cryptography, cybersecurity, and post-quantum cryptography concepts. The series will be designed to create an immersive learning experience that is engaging, fun, and rewarding. The project team will identify specific learning outcomes for each series episode and use student responses to tailor the content to their understanding levels. The project will align with the CCI mission to advance major research thrusts in cybersecurity and serve as a catalyst for Virginia's long-term leadership in cybersecurity.
2. Title: In-Network Information Flow Control for Lightning-Fast Cross-Host Attack Prevention Enabled by Programmable Switches
PI: Peng Gao
Lead Institution: Virginia Tech
Co-PIs & Institution: Bo Ji (VT)
Funding Program: FY24 Innovation
Summary: In this project, we aim to develop a new network defense system that enables end-to-end network visibility across multiple hosts and enforces security decisions in real time to prevent sophisticated cross-host attacks. Our key idea is to develop a new tag-based network information flow control (IFC) mechanism to precisely track and control inter-host and intra-host information flows, through user-defined IFC tags. The critical challenge is to implement this IFC model and enforce it at the network level in an efficient way, without affecting the linespeed processing of high volumes of benign network traffic in modern enterprise networks. To achieve this, we will develop the first in-network realization of the IFC mechanism, by uniquely leveraging the emerging programmable switches [10] and eBPF [11]. The IFC enforcement occurs entirely within the network data plane, which is essential to lightning-fast attack prevention.
-
General Item
-
General Item
-
General Item
-
General Item