Graphic representing computer security

Overview

The Cybersecurity group at OSU develops tools and techniques to protect sensitive data & infrastructure against malicious attacks. We study problems that arise as a result of computation & storage in hostile environments. Our work includes adversarial threat modeling, design of novel protection mechanisms, and analysis of their guarantees.

Our faculty members have specific expertise spanning from foundations of cryptography to network security to cyber-physical and IoT system security. For example, we are actively developing techniques for performing computations (database search, data mining) on information while it remains in encrypted form, strategies to detect & mitigate cyber-attacks on power grids and other infrastructure, and authentication mechanisms for extremely low-power devices.

Mike Rosulek (left) and Attila Yavuz (right), assistant professors of computer science in the College of Engineering at Oregon State University, research better ways of keeping our data safe from hackers.
The age of Big Data and cloud computing has created greater demand for advanced cryptography. To store data on the cloud safely it must be encrypted; in order to use the data it needs to be decrypted, at which point it becomes vulnerable to attacks. In this podcast, learn how professors Mike Rosulek and Attila Yavuz are finding new ways to perform operations on encrypted data without leaking critical information.

Sub Areas

  • Theoretical & Applied Cryptography
  • Network Security
  • Security in Outsourced Cloud Settings
  • Privacy Enhancing Technologies
  • Computing on Encrypted Data
  • Cyber-physical Systems Security
  • IoT & Distributed Systems Security
  • Authentication & Integrity in Critical Systems

Related Courses

  • CS 370: Introduction to Security
  • CS 373: Defense Against the Dark Arts
  • CS 427: Cryptography
  • CS/ECE478: Network Security
  • CS 519: Cryptographic Protocols
  • CS 519: Advanced Network Security
  • CS 519: Applied Cryptography
  • CS 519: Advanced Systems Security
  • CS 578: Cyber-Security
 

Faculty

Photo of Rakesh Bobba

Rakesh Bobba
Secure protocols; access controls; key management; power grid & other critical infrastructures; cyber-physical systems, cloud computing

Photo of Mike Rosulek

Mike Rosulek
Cryptography; secure multi-party computation

Photo of Yeongjin Jang

Yeongjin Jang
Secure systems; trustworthy computing; vulnerability discovery and analysis; developing exploit primitives; jailbreaking; side-channel attack; autonomous cyber attack and defense; malware

Photo of Jesse Walker

Jesse Walker
Networking; systems security; cryptography; commutative algebra; algebraic geometry

Photo of Attila Yavuz

Attila Yavuz
Applied cryptography, network security and privacy

Affiliated Faculty

Photo of Eduardo Cotilla-Sanchez

J. Eduardo Cotilla-Sanchez
Cascading outages in power grids; complex systems & complex networks; chaos & nonlinear dynamics; big data & high performance computing; PMU-supported power system stability monitoring

Photo of Tom Dietterich

Tom Dietterich
Machine learning; intelligent systems; intelligent user interfaces; ecosystem informatics

Photo of Alan Fern

Alan Fern
Artificial intelligence, including machine learning, data mining, and automated planning/control

Photo of Bechir Hamdaoui

Bechir Hamdaoui
Mobile computing; wireless networking; network management; distributed systems; cognitive networks; multiagent systems

Photo of Carlos Jensen

Carlos Jensen
Usability aspects of open source software development, distributed collaboration, and social aspects of joining open source projects; information overload; usable privacy and security

Photo of Jinsub Kim

Jinsub Kim
Statistical signal processing; statistical learning theory; power systems state estimation; security of cyber physical system

Photo of Kevin McGrath

Kevin McGrath

Photo of Weng-Keen Wong

Weng-Keen Wong
Data mining; machine learning; anomaly detection; human-in-the-loop learning; ecosystem informatics