Graphic representing computer security

Overview

The Cybersecurity group at Oregon State develops tools and techniques to protect sensitive data & infrastructure against malicious attacks. We study problems that arise as a result of computation & storage in hostile environments. Our work includes adversarial threat modeling, design of novel protection mechanisms, and analysis of their guarantees.

Our faculty members have specific expertise spanning from foundations of cryptography to network security to cyber-physical and IoT system security. For example, we are actively developing techniques for performing computations (database search, data mining) on information while it remains in encrypted form; and strategies to detect & mitigate cyber-attacks on power grids and other infrastructure.

Mike Rosulek (left) and Attila Yavuz (right), assistant professors of computer science in the College of Engineering at Oregon State University, research better ways of keeping our data safe from hackers.
The age of Big Data and cloud computing has created greater demand for advanced cryptography. To store data on the cloud safely it must be encrypted; in order to use the data it needs to be decrypted, at which point it becomes vulnerable to attacks. In this podcast, learn how professors Mike Rosulek and Attila Yavuz are finding new ways to perform operations on encrypted data without leaking critical information.

Sub Areas

  • Theoretical & Applied Cryptography
  • Network Security
  • Security in Outsourced Cloud Settings
  • Privacy Enhancing Technologies
  • Computing on Encrypted Data
  • Cyber-physical Systems Security
  • IoT & Distributed Systems Security
  • Authentication and Integrity in Critical Systems

Related Courses

  • CS 175: Communications Security & Social Movements
  • CS 370: Introduction to Security
  • CS 373: Defense Against the Dark Arts
  • CS 419/519: Cyber Attacks and Defenses
  • CS 427: Cryptography
  • CS/ECE478: Network Security
  • CS 519: Cryptographic Protocols
  • CS 519: Advanced Systems Security
  • CS 578: Cyber-Security
 

Faculty

Photo of Houssam Abbas

Houssam Abbas
Design, control and verification of cyber-physical systems; ethics in AI

Photo of Rakesh Bobba

Rakesh Bobba
Secure protocols; access controls; key management; power grid & other critical infrastructures; cyber-physical systems, cloud computing

Photo of Glencora Borradaile

Glencora Borradaile
Counter-surveillance; human factors in digital security; graph algorithms; computational geometry

Photo of Bechir Hamdaoui

Bechir Hamdaoui
Resilient & intelligent networked systems; network & wireless security; enabling network & communication technologies

Photo of Sanghyun Hong

Sanghyun Hong
Security, privacy, and machine learning, especially on building secure and reliable AI systems from a systems security perspective

Photo of Vincent Immler

Vincent Immler
Next-generation attacks and defenses in hardware security

Photo of Yeongjin Jang

Yeongjin Jang
Secure systems; trustworthy computing; vulnerability discovery and analysis; developing exploit primitives; jailbreaking; side-channel attack; autonomous cyber attack and defense; malware

Photo of Sibin Mohan

Sibin Mohan
Systems; security; networking; autonomous systems

Photo of Dave Nevin

Dave Nevin
Regulatory compliance; policy; incident response; security operations; computer forensics; disaster recovery and business continuity

Photo of Mike Rosulek

Mike Rosulek
Cryptography; secure multi-party computation

Photo of Jiayu Xu

Jiayu Xu
Theoretical and practical aspects of cryptography; applications to network security

Affiliated Faculty

Photo of Eduardo Cotilla-Sanchez

J. Eduardo Cotilla-Sanchez
Cascading outages in power grids; complex systems & complex networks; chaos & nonlinear dynamics; big data & high performance computing; PMU-supported power system stability monitoring

Photo of Tom Dietterich

Tom Dietterich
Machine learning; intelligent systems; intelligent user interfaces; ecosystem informatics

Photo of Alan Fern

Alan Fern
Artificial intelligence, including machine learning, data mining, and automated planning/control

Photo of Jinsub Kim

Jinsub Kim
Statistical signal processing; statistical learning theory; power systems state estimation; security of cyber physical system

Photo of Kevin McGrath

Kevin McGrath

Photo of Anita Sarma

Anita Sarma
Coordination and collaboration in distributed teams; configuration management systems; software maintenance and evolution; software visualization; usable security

Photo of Weng-Keen Wong

Weng-Keen Wong
Data mining; machine learning; anomaly detection; human-in-the-loop learning; ecosystem informatics