Information Trust Institute Slide
ITI inaugural director Bill Sanders is named head of ECE ILLINOIS.
FEATURED
RESEARCH
Information Trust Institute Slide
Shobha Vasudevan's research in code coverage of assertions using RTL source code analysis took the top honor at DAC.
FEATURED
RESEARCH
Information Trust Institute Slide
The Lablet will focus on security at the systems level, employing scientific methodologies.
FEATURED
RESEARCH
Information Trust Institute 10th anniversary Save the date
Save the Date - September 17 and 18
FEATURED
RESEARCH
Information Trust Institute Slide
Learn new skills in cyber security and information assurance through this multidisciplinary certificate program.
FEATURED
RESEARCH

RESEARCH
THEMES

News

Oct 22. 2014
When an energy company sustains a cyber attack, control system operators must quickly identify, isolate and reroute around the affected network areas in order to maintain critical energy delivery functions. A global view of all communication flows would make that task much easier, but unfortunately, such an overview map isn’t available to the energy sector at this time.
3775
Oct 21. 2014
Graduate student Yutian Lei won the award for best paper out of 128 peer-reviewed contenders at the 2014 IEEE Workshop on Control and Modeling for Power Electronics, or COMPEL, which took place at the University of Cantabria in Spain. Lei’s publication, co-written with former graduate student Ryan May (now at Texas Instruments) and ITI researcher and Assistant Professor Robert Pilawa-Podgurski, explored their research into switched-capacitor power converters.
3769
Oct 08. 2014
Researchers at the University of Illinois at Urbana-Champaign are seeking to accelerate the technology transfer processes – perhaps by as much as 50 percent – through a new grant funded by the National Science Foundation.
3767
Sep 04. 2014
The 2014 winner of the prestigious ACM Special Interest Group on Multimedia (SIGMM) award for Outstanding Technical Contributions to Multimedia Computing, Communications and Applications is CS Professor, CSL Acting Director and ITI researcher Klara Nahrstedt.
3716
Aug 25. 2014
The best way to combat cyberattacks may be a joint public-private partnership between government and business, says a new paper from Jay Kesan, the H. Ross and Helen Workman Research Scholar at the University of Illinois College of Law.
3660

Take This On Trust...

Oct 3. 2013 NSA, data privacy and the complexities of trust

Current events have pushed concerns about personal and data privacy into the limelight. Each new round of revelations about classified government programs highlights for me that at the heart of them all are issues of trust.

Jun 25. 2013 NetAPT and NP-View: How We Developed a Network Security Analysis Solution for Power Utilities

NetAPT is a software tool that performs an automated, comprehensive security policy analysis to identify any respects in which a network containing firewalls deviates from global access policy. The idea is that it provides a means for a system analyst to review his or her security controls and ensure that they do what the analyst intends them to do. The whole idea is to reduce the number of people that can access critical systems and potentially compromise those systems.