Tweets by @GrantsOffice
More Tweets
Login to UPstream

Secure and Trustworthy Cyberspace (SaTC)

Add to Research Report     Add to Watchlist     Email this Grant
 
  • Grants Office Grantwriting service fee is currently unavailable for this grant
    Get more information on grantwriting

    CFDA#

    47.041; 47.049; 47.070; 47.075; 47.076
     

    Funder Type

    Federal Government

    IT Classification

    B - Readily funds technology as part of an award

    Authority

    National Science Foundation (NSF)

    Summary

    The goals of the Secure and Trustworthy Cyberspace (SaTC) program are aligned with the Federal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.The RDSP identified six areas critical to successful cybersecurity R&D:

    1. scientific foundations;
    2. risk management;
    3. human aspects;
    4. transitioning successful research into practice;
    5. workforce development; and
    6.  enhancing the research infrastructure.

    The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.


    Proposals must be made in one of the following areas:


    Secure and Trustworthy Cyberspace core research (CORE) Designation

    The scope of the SaTC core research program is broad and interdisciplinary, and welcomes foundational research on security and privacy from researchers in computer science, engineering, mathematics, and social, behavioral, and economic sciences. SaTC views cybersecurity as a socio-technical challenge and encourages proposals that advance the field of cybersecurity within a single discipline or multiple disciplines.


    This track focuses only on research directly supporting a safe, secure, resilient, and trustworthy cyberspace, conducted ethically with the highest scientific standards. Of special interest are proposals that are transformative, forward-looking, and offer innovative or clean-slate approaches that provide defenders a distinct advantage. Proposals whose security science exposes underlying principles having predictive value that extends across different security domains are especially encouraged. The program discourages proposals that address a sole vulnerability or device without advancing security science or considering the broader consequences of the proposed remedy. The SaTC program likewise discourages research focused primarily on the design and development of offensive techniques for exploiting vulnerabilities of systems that could be harmful to the operation of existing cyberinfrastructure.


    Some specific research topics of interest for CORE proposals are included in the full program solicitation.


    Transition to Practice (TTP) Designation

    The objective of the TTP designation is to support the development, implementation, and deployment of later-stage and applied security or privacy research into an operational environment in order to bridge the gap between research and production. A TTP-designated proposal must specifically describe how the successful research results will be operationally deployed into an organization or technology. Collaborations with industry are strongly encouraged. The outcome of a TTP project is not solely intended to be commercialization, although the TTP may be a stepping stone to a Small Business Innovation Research (SBIR) proposal, an NSF Innovation Corps„¢ (I-Corps„¢) team, or a commercial venture.


    A TTP may transition later-stage research by other means such as licensing to commercial or government end users or deployment into scientific research cyberinfrastructure or Research and Education Networks. Proposals that target the security of the scientific research cyberinfrastructure, and enable robust and reliable science through advances in reproducibility, provenance, and privacy are highly encouraged. Topics of interest include: tools to detect behavioral anomalies across cyberinfrastructure systems, including detecting the tools and techniques of an attack and methods to mitigate security threats; tools to ensure the integrity of data as it traverses multiple environments such as mobile, cloud(s), and networks. 


    Cybersecurity Education (EDU) Designation

    The results of SaTC-funded research lead to widespread changes in our understanding of the fundamentals of cybersecurity. These new research outcomes, in turn, lead to new ways to educate students about cybersecurity. The EDU designation is interested in the development of evidence-based and evidence generating approaches that will improve cybersecurity education and workforce development. EDU supports projects that: improve cybersecurity learning and learning environments, develop new curricular materials and methods of instruction, develop new assessment tools to measure student learning, promote teacher recruitment and training in the field of cybersecurity, and improve the diversity of the cybersecurity workforce. In addition to innovative work at the frontier of cybersecurity education, the program also encourages replications of research studies at different types of institutions and with different student bodies to produce deeper knowledge about the effectiveness and transferability of findings.


    Proposals submitted to the EDU designation are expected to leverage successful results from previous and current basic research in cybersecurity and research on student learning, both in terms of intellectual merit and broader impacts, to address the challenge of expanding existing educational opportunities and resources in cybersecurity. This may include, but is not limited to, the following efforts:

    • Improve teaching methods for delivering cybersecurity content to K-12 students that promote correct and safe online behavior, and the understanding of the foundational principles of cybersecurity;
    • Develop and implement activities to help K-12 teachers to integrate cybersecurity into computing courses;
    • Support institutional collaborations between community colleges and four-year colleges or universities;
    • Based on the results of basic research in cybersecurity, define a cybersecurity body of knowledge and establish curricular activities for new courses, degree programs, and educational pathways leading to wide adoption nationally;
    • Evaluate the effects that new and existing curricula have on student learning;
    • Develop partnerships between centers of research in cybersecurity and institutions of higher education that lead to improved models for the integration of research experiences into cybersecurity degree programs;
    • Conduct research that advances improvements in teaching and student learning in cybersecurity and, where possible, focuses on the participation of a broad and diverse population in cybersecurity education and workforce;
    • Develop effective evidence-based curricular and co-curricular activities for students studying cybersecurity at the K-12, undergraduate, or graduate level; and
    • Evaluate the effectiveness of cybersecurity competitions, games, and other outreach and retention activities.

    EDU projects are expected to contribute to the cybersecurity education knowledge base. The complexity, scope, and size of those contributions should be commensurate with the relevant experience and expertise of the project team and the institution. All EDU proposals must include a dissemination strategy that is tied to broader impact goals and a clear plan to report on the project and its successes and lessons learned to appropriate audiences.

     

    History of Funding

    Previous recipients can be viewed online at https://nsf.gov/awardsearch/advancedSearchResult?WT.si_n=ClickedAbstractsRecentAwards&WT.si_x=1&WT.si_cs=1&WT.z_pims_id=504709&ProgEleCode=&BooleanElement=Any&BooleanRef=Any&ActiveAwards=true&#results.

    Additional Information

    All proposals must include a prioritized list of 1-3 keywords, drawn from the list of topic areas listed below, that best characterizes the project. Proposals submitted to the EDU designation must choose Cybersecurity Education as one of the keywords, and proposals submitted to the TTP designation must choose Transition to Practice as one of the keywords.

    • Authentication and Biometrics
    • Cryptography, Applied
    • Cryptography, Theory
    • Cyber-Physical Systems
    • Cybersecurity Education
    • Data Science
    • Formal Methods and Language-based Security
    • Hardware Security Architecture
    • Hardware Security Design
    • Information Authenticity
    • Intrusion Detection
    • Mathematics and Statistics
    • Networking, Wired
    • Networking, Wireless
    • Privacy, Applied
    • Privacy, Theory
    • Social, Behavioral and Economic Sciences
    • Software
    • Systems
    • Transition to Practice
    • Usability and Human Interaction

    All proposals must have a separate section in the project description titled œRelevance to Secure and Trustworthy Cyberspace that discusses the potential impact of the research with respect to the goals of the SaTC program, and clearly justifies the keywords selected in the Project Summary with respect to the research plan.


    Any proposal submitted to the CORE or TTP designation for this solicitation must be consistent with one of the two project classes defined below. 

    • SMALL Projects are well suited to one or two investigators (PI and one co-PI or other Senior Personnel) and at least one student and/or postdoc.
    • MEDIUM Projects are well suited to one or more investigators (PI, co-PI and/or other Senior Personnel) and several students and/or postdocs.
      • Medium projects must be comprehensive, well-integrated, and should establish that the collaborative contributions of the project team will be greater than the sum of each of their individual contributions.
      • All Medium proposals that include more than one investigator must include a Collaboration Plan.

    Contacts

    Nina Amla

    Nina Amla

    , 703) 292-8910
    namla@nsf.gov
    https://www.nsf.gov/pubs/2018/nsf18572/nsf18572.pdf

    Victor P. Piotrowski

    Victor P. Piotrowski
    Directorate for Education and Human Resources
    4201 Wilson Boulevard
    Arlington, VA 22230
    (703) 292-5141
    (703) 292-9015
    vpiotrow@nsf.gov
    https://www.nsf.gov/pubs/2018/nsf18572/nsf18572.pdf

    SaTC Questions

    SaTC Questions
    4201 Wilson Boulevard
    Arlington, VA 22230
    satc@nsf.gov
    https://www.nsf.gov/pubs/2018/nsf18572/nsf18572.pdf
     
  • Grantwriting By Grants Office -- Grants Office would be happy to start writing this grant for you. If the cost is not listed above, please call or email us to get more specific information.<br /><br />Due to the nature of grantwriting, some grants cost more than others.

    Eligibility Details

    Proposals may only be submitted by the following:

    • Institutions of Higher Education (IHEs): Two- and four-year IHEs (including community colleges) accredited in, and having a campus located in the US, acting on behalf of their faculty members.
      • Special Instructions for International Branch Campuses of US IHEs: If the proposal includes funding to be provided to an international branch campus of a US institution of higher education (including through use of subawards and consultant arrangements), the proposer must explain the benefit(s) to the project of performance at the international branch campus, and justify why the project activities cannot be performed at the US campus.
    • Non-profit, non-academic organizations: Independent museums, observatories, research labs, professional societies and similar organizations in the U.S. associated with educational or research activities.

    Deadline Details

    Proposals for all categories are accepted throughout the year.

    Award Details

    The estimated total funding available for FY20 is $53,000,000. Cost sharing is not required. The NSF anticipates approximately 13 EDU awards, 35 Small awards and 25 Medium awards.


    CORE and TTP proposals may be submitted in one of the following project size classes:

    • Small projects: up to $500,000 in total budget, with durations of up to three years;
    • Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years;

    EDU proposals are limited to $400,000 in total budget, with durations of up to three years.


    Note - Budgets for Education, Small, and Medium projects must include funding for one or more project representatives (PI/co-PI/senior researcher or NSF-approved replacement) to attend the first SaTC PI meeting held after the beginning of the award. The first PI meeting for awards made under this solicitation is expected in Fall 2021. These requirements for PI meeting attendance apply to collaborative proposals as a whole, not to each part of a project.

    Recent FUNDED Articles   Use the links below to view the recorded playback of these webcasts


    • 2020 Budget Q&A: Go Ahead and Take Grants for Granted
    • The STEM Funding is Here!
    • How is a Budget Justification like Chess?…and other Grant Budget Quandaries

    Related Webcasts Use the links below to view the recorded playback of these webcasts


    • NSF Funding for Campus Cyberinfrastructure in Higher Education - Sponsored by NetApp - Playback Available
    • Funding High Performance Computing in Support of University Research – Sponsored by NetApp - Playback Available
    • Getting A Virtualization Project Funded - Sponsored by NetApp - Playback Available

 

You have not selected any grants to Add


Please select at least one grant to continue.


  Okay  

Selections Added


The selected grant has been added to your .



  Okay  

Research Reports


One of the benefits of purchasing an UPstream® subscription is
generating professional research reports in Microsoft® Word or Adobe® PDF format
Generating research reports allows you to capture all the grant data as
well as a nice set of instructions on how to read these reports


  Close         Subscribe to UPstream®  

Watchlists and Grant Progress


With an UPstream® subscription you can add grants to your
own personal Watchlist. By adding grants to your watchlist, you will
receive emails about updates to your grants, be able to track your
grant's progress from watching to awards, and can easily manage any
step in the process through simplified workflows.

  Close         Subscribe to UPstream®  

Email this Grant


With an UPstream® subscription, you can email grant details, a research report,
and relevant links to yourself or others so that you never lose your
details again. Emailing grants is a great way to keep a copy of the
current details so that when you are ready to start seeking funding
you already know where to go

  Close         Subscribe to UPstream®  
 
UPstream™
.info Sites
FUNDED
© 2019 Grants Office, LLC Site Map 510 Clinton Square, Rochester, NY 14604          info@grantsoffice.com           877-476-8457