Funded Research Projects
Permanent URI for this collectionhttps://hdl.handle.net/20.500.14641/189
An index of publicly funded research projects conducted by Texas A&M affiliated researchers.
Browse
Browsing Funded Research Projects by Department "Computer Science"
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Research Project Texas A&M University Aggies Secure EventComputer Science; TAMU; https://hdl.handle.net/20.500.14641/514; DOD-National Security Agency1. Overview: Several times a semester Texas A&M Engineering students participate in an Aggies Invent competition. One of the goals of Aggies Invent is for student teams to rapidly create a working prototype over the course of a weekend to solve an ongoing engineering challenge. A problem that occurs during these rapid prototyping sessions is that the security of the product is often not at the forefront of each team’s mind. This issue has led to the idea for Aggies Secure. The Aggies Secure competition will take the more developed projects and prototypes from previous Aggies Invent competitions and give them to teams of Cybersecurity Students to do vulnerability analysis on. Each vulnerability found will be required to be paired with a write-up detailing the vulnerability and potential impact as well as potential remediations for the vulnerability. The overall goal for the competition is to give students experience in finding vulnerabilities in products and to make other engineering students more aware of the cybersecurity pitfalls that can occur during rapid prototyping. The competition will also bring both communities of students together and foster collaboration among the two. 2. Competition Structure: Prior to the Aggies Secure event one or more projects will be selected from the EnMed medical device Aggies Invent competition starting July 6th or the recently finished Assistive Technology Aggies Invent competition. At the beginning of the Aggies Secure event on October 26th each selected project will be presented to the student teams. The size of each student team will be 4-6. The student teams will then have the weekend to find and document as many vulnerabilities in these products as possible. Students will have full access to each project. This includes any source code, documentation, and working prototypes. Where possible each prototype will be replicated for each team so that they all have separate copies. During the competition each team will have access to tools to check out to aid in their vulnerability research. This can include items such as spectrum analyzers, multi-meters, oscilloscopes, or other instruments or tools (purchased for the event or provided by the sponsor). At the conclusion of the competition, each team will be required to turn in a report detailing each vulnerability found along with proposed remediations for each vulnerability. Each team will also present their findings along with any proof-of-concept demos to a panel of judges. Judging will be based on the number of vulnerabilities identified and demonstrated, the severity of each vulnerability found, and the efficacy of the proposed remediations. The scoring will be weighted more heavily towards the severity of each vulnerability rather than the number found. Each Aggies Invent team whose prototypes are being used for Aggies Secure will be invited to the presentations. Each Aggies Invent team will also be given the reports and proof of concept code after the end of the competition. The top three teams will receive a prize.Research Project The 2018 IASP Cyber-Leader Scholarship Program: Developing Human Capital in Cybersecurity for the Department of DefenseComputer Science; TAMU; https://hdl.handle.net/20.500.14641/464; DOD-National Security AgencyTexas A&M University (TAMU) proposes an Information Assurance Scholars Program (IASP) cohort of 9 total students for the one year duration of the project. One of these students is a continuing graduate student. Of these 9 students, 6 are undergraduate, and 3 are graduate. Undergraduate students come from the majors of computer science and engineering, management information systems, sociology, and technology management. Graduate students are coming from the George Bush School of Government and Public Service and computer science and engineering. Students who have been recommended for the program at the undergraduate level will complete a minor field of study in cybersecurity utilizing either the engineering track or technology track. Graduate students will work in consultation with the Texas A&M Cybersecurity Center (TAMC2) and their chair to interpolate appropriate courses into their degree plans. The cohort will meet every two weeks throughout the academic year in a zero semester credit hour course that will focus on leadership development and tying concepts of leadership to their growing cybersecurity expertise. Individually, students will meet once a month with a faculty mentor, who will be monitoring for continued satisfactory academic progress. The program objectives are to: - Provide a quality group of trained and capable future employees to the Department of Defense with a 100% placement rate. - Facilitate development of cybersecurity skills in student-leaders that combine theory and application. - Augment traditional classroom experiences with co-curricular training in leadership through deployment of a zero semester hour leadership course for the scholarship cohort that will relate cybersecurity and leadership. - Require participation in extra-curricular activities through the TAMU Cybersecurity Club and cybersecurity-related activities (such as TAMU capture-the-flag, etc.) sponsored by the Texas A&M Cybersecurity Center.Research Project The 2018 P3 Cyber-Leader Scholarship Program: Developing Human Capital in Cybersecurity for the Department of Defense:Computer Science; TAMU; https://hdl.handle.net/20.500.14641/464; DOD-National Security AgencyTexas A&M University (TAMU) proposes a 2018 DoD Public Private Partnership cohort of 7 total students for the one year duration of the project. One of these students is a continuing undergraduate student. Of these 7 students, 6 are undergraduate, and 1 is graduate. Undergraduate students come from the majors of computer science and engineering, electronic systems engineering technology, management information systems, sociology, and technology management. The graduate student is coming from computer science and engineering. Students who have been recommended for the program at the undergraduate level will complete a minor field of study in cybersecurity utilizing either the engineering track or technology track. The Graduate student will work in consultation with the Texas A&M Cybersecurity Center (TAMC2) and their chair to interpolate appropriate courses into their degree plans. The cohort will meet every two weeks throughout the academic year in a zero semester credit hour course that will focus on leadership development and tying concepts of leadership to their growing cybersecurity expertise. Individually, students will meet once a month with a faculty mentor, who will be monitoring for continued satisfactory academic progress. The program objectives are to: - Provide a quality group of trained service reservists and guardsmen to the Department of Defense. - Facilitate development of cybersecurity skills in student-leaders that combine theory and application. - Augment traditional classroom experiences with co-curricular training in cyber leadership through deployment of a zero semester hour leadership course for the scholarship cohort that will relate cybersecurity and leadership. - Require participation in extra-curricular activities through the TAMU Cybersecurity Club and cybersecurity-related activities (such as TAMU capture-the-flag, etc.) sponsored by the Texas A&M Cybersecurity Center.