Information Trust Institute Slide
ITI inaugural director Bill Sanders is named head of ECE ILLINOIS.
FEATURED
RESEARCH
Information Trust Institute Slide
Shobha Vasudevan's research in code coverage of assertions using RTL source code analysis took the top honor at DAC.
FEATURED
RESEARCH
Information Trust Institute Slide
The Lablet will focus on security at the systems level, employing scientific methodologies.
FEATURED
RESEARCH
Information Trust Institute Slide
From financial to medical information, our most private data is increasingly online -- and so are the cyber criminals.
FEATURED
RESEARCH
Information Trust Institute Slide
She is an ITI researcher and currently working with ITI's Trustworthy Cyber Infrastructure for the Power Grid project.
FEATURED
RESEARCH

RESEARCH
THEMES

News

Nov 13. 2014
CSL Professor Sayan Mitra (ECE) and CS Professor Mahesh Viswanathan were recently awarded $500,000 from the National Science Foundation to support a grant entitled “From Simulations to Proofs for Cyberphysical Systems” that will seek additional ways to verify such systems in conjunction with simulations.
3786
Nov 04. 2014
With a tight gubernatorial race in Illinois, voters are being bombarded today with TV ads, yard signs and robo calls. But what if candidates could use their campaign dollars to subtlety influence your vote on social media? It might as simple as paying to promote the status of a friend who just voted or downplaying negative status posts on Facebook.
3779
Nov 03. 2014
It's tense in the situation room. A cyber attack on the electrical grid in New York City has plunged Manhattan into darkness on a day that happens to be the coldest in the year. Concurrently, the cellular phone network has been attacked, silencing smartphones and sowing confusion and panic. A foreign power has claimed responsibility for the attacks and says more are coming. Your job is to look at geopolitical factors, intelligence feeds, military movements and clues in cyberspace to predict what may be happening next. Your goal is to make a recommendation to the President.
3778
Oct 22. 2014
When an energy company sustains a cyber attack, control system operators must quickly identify, isolate and reroute around the affected network areas in order to maintain critical energy delivery functions. A global view of all communication flows would make that task much easier, but unfortunately, such an overview map isn’t available to the energy sector at this time.
3775
Oct 21. 2014
Graduate student Yutian Lei won the award for best paper out of 128 peer-reviewed contenders at the 2014 IEEE Workshop on Control and Modeling for Power Electronics, or COMPEL, which took place at the University of Cantabria in Spain. Lei’s publication, co-written with former graduate student Ryan May (now at Texas Instruments) and ITI researcher and Assistant Professor Robert Pilawa-Podgurski, explored their research into switched-capacitor power converters.
3769

Take This On Trust...

Oct 3. 2013 NSA, data privacy and the complexities of trust

Current events have pushed concerns about personal and data privacy into the limelight. Each new round of revelations about classified government programs highlights for me that at the heart of them all are issues of trust.

Jun 25. 2013 NetAPT and NP-View: How We Developed a Network Security Analysis Solution for Power Utilities

NetAPT is a software tool that performs an automated, comprehensive security policy analysis to identify any respects in which a network containing firewalls deviates from global access policy. The idea is that it provides a means for a system analyst to review his or her security controls and ensure that they do what the analyst intends them to do. The whole idea is to reduce the number of people that can access critical systems and potentially compromise those systems.