Information Trust Institute block of abstract images
Information Trust Institute block of abstract images

News

Mar 20. 2014
Due to advancement in cyber attack methodology, many companies are being encouraged to employ thorough security measures to combat the increasingly widespread attacks. This is evident in the release of cyber security frameworks such as the NIST Cyber Security Framework that was created from Presidential Executive Order 13636. For instance, utility companies, in particular, need to go beyond just guarding their networks at the edge, and begin protecting at deeper network levels as well. The current edge-based firewall approach, as well as the lack of widely deployed security protections in existing protocols, presents problems that require new, resilient and intelligent protection schemes.
3541
Mar 14. 2014
If Alexander Graham Bell came back today and saw the improvement technology has made on his first telephone, he would be astonished. But according to CSL Professor Peter Sauer, if Thomas Edison came back, he wouldn’t be all that surprised at what has developed in the power industry. “Electric power grid utilities have been criticized for being old and decrepit and stodgy and in a way, that’s true,” Sauer said. “So the smart grid is a way of advancing the technology of the power system by using computers, cell phones, etc. The industry is changing and whether we help it or not is up to us. We could sit back and teach the same old stuff we always teach or we could get out and push the edge.”
3534
Feb 26. 2014
Representatives from the University of Illinois at Urbana-Champaign stood alongside President Obama yesterday, February 25, as he announced a new Chicago-based public-private partnership called the Digital Lab for Manufacturing.
3528
Jan 08. 2014
Where are the country’s most innovative and creative tech hubs? The answer to that question used to be easy.
3499
Dec 16. 2013
From financial to medical information, our most private data is increasingly online -- and so are the cyber criminals who seek to sabotage the information systems that support the data. But while the number of cyber crimes has steadily risen over the years, the number of cyber security experts needed to stop them has not kept pace.
3484
Nov 18. 2013
The term “virtual time” typically conjures up images of space age time machines and “Back to the Future” movies, but the reality of virtual time within computer systems isn’t just something of the future. Rather, it’s an old concept in computer science, with new applications that researchers at the Information Trust Institute have been developing.
3471
Oct 14. 2013
ITI Research Scientist Sibin Mohan was recently awarded a three-year, $600,000 grant from the Office of Naval Research to work on integrating security into embedded real-time systems in a fundamental way.
3463
Oct 09. 2013
The Ameren center will provide opportunities for collaboration between the utility and Illinois cyber security researchers.
3460
Oct 08. 2013
CSL Acting Director Klara Nahrstedt, the Ralph and Catherine Fisher Professor of Computer Science, will be inducted in the German National Academy of Sciences Leopoldina, Germany’s foremost academic society, in March 2014. Nahrstedt’s selection to Leopoldina’s membership is in recognition of her scientific achievements and impact on science.
3459
Oct 02. 2013
ITI and CSL Assistant Professor and GSLIS Assistant Professor Masooda Bashir was recently invited to give a presentation to the University of Illinois Board of Trustees at their September meeting.
3448
Sep 26. 2013
Mitra has been awarded the C. Holmes MacDonald Outstanding Teaching Award by IEEE-Eta Kappa Nu, a national recognition given each year to a single electrical engineering professor.
3447
Sep 13. 2013
When designing, operating and maintaining complex cyber security systems for large companies, it is challenging to make sound security decisions that will keep the companies safe from attackers.
3437
Sep 04. 2013
The National Science Foundation has awarded a grant of almost $1.6 million to a team of cybersecurity experts from the International Computer Science Institute (ICSI) and the University of Illinois' National Center for Supercomputing Applications (NCSA) and Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project. The three-year effort will focus on improving the security of critical infrastructure such as electrical grids and other utilities.
3430
Aug 26. 2013
ITI researchers Carl Gunter, Roy Campbell and Klara Nahrstedt have been awarded a $10M NSF Frontier Award to fund a project entitled Trustworthy Health and Wellness (THaW).
3418
Aug 21. 2013
Ameren Illinois today opened a new $3.3 million testing facility that will help facilitate research and development of smart grid technologies and support the state’s economic development and job creation goals. The Technology Applications Center (TAC) will offer collaborative opportunities between ITI researchers and the utility.
3405
Aug 19. 2013
Shade almost always creeps into conversations about solar power. What happens on cloudy days when a rooftop array isn’t producing enough energy for someone’s solar-equipped bungalow? What about the mobile devices that might be operated in remote, wooded research stations where consistent sunlight is never available?
3400
Jul 31. 2013
ITI hosted a summer school on formal methods for the science of security last week, bringing together professionals and students working in the area of cyber security.
3392
Jul 31. 2013
In June, the Trustworthy Cyber Infrastructure for the Power Grid (TCIPG) project held its biannual summer school in St. Charles, Ill. The event drew a record 173 attendees, who came from academia, industry and government for a week-long course on cybersecurity for energy delivery systems, with a focus on the power grid.
3390
Jul 24. 2013
Klara Nahrstedt, the Ralph M. and Catherine V. Fisher Professor in the Department of Computer Science, will serve as acting director of the Coordinated Science Laboratory (CSL).
3380
Jul 23. 2013
NP-View was developed specifically to automate the analysis of utilities' computer networks, offering advanced modeling capabilities and a set of features that support compliance with industry regulations.
3378