Skip to main content

US/Brazil Workshop organized by Prof. Oliveira

August 30, 2015

The US National Science Foundation (NSF), US Department of Homeland Security (DHS), and Brazil Ministry of Science, Technology, and Innovation (MCTI) are sponsoring a pair of invitation-only workshops that will promote innovation in solving cyber security and privacy problems, by bringing together the top researchers from the US and Brazil, to share their research and […]

Read more »

Counterfeit Integrated Circuits Book, Prof. M. Tehranipoor, U. Guin, Prof. D. Forte

August 30, 2015

This timely and exhaustive study offers a much-needed examination of the scope and consequences of the electronic counterfeit trade. The authors describe a variety of shortcomings and vulnerabilities in the electronic component supply chain, which can result in counterfeit integrated circuits (ICs). Not only does this book provide an assessment of the current counterfeiting problems […]

Read more »

WSJ Article: Researchers Find Security Flaws in Developing-World Money Apps

August 30, 2015

Mobile-money services are growing at a rapid clip in the developing world, but new research suggests many of the apps that give the poor access to banking services have woeful security protections, leaving users exposed to fraud and theft. Computer scientists at the University of Florida studied seven mobile-money apps from Brazil, India, Indonesia, Thailand […]

Read more »

University of Florida designated as a CAE-R

August 30, 2015

Led by Prof. Joe Wilson, University of Florida has been designated as a National Center of Academic Excellence in Cyber Defense Research through academic year 2019 by National Security Agency (NSA).

Read more »

Prof. Prabhat Mishra Received IBM Faculty Award

August 30, 2015

The IBM Faculty Awards is a competitive worldwide program intended to: (1) Foster collaboration between researchers at leading universities worldwide and those in IBM research, development and services organizations, (2) Promote courseware and curriculum innovation to stimulate growth in disciplines and geographies that are strategic to IBM. Faculty Awards are cash awards granted annually. The […]

Read more »

Prof. Yier Jin’s Paper Receives Best Paper Award

August 30, 2015

The paper authored by Prof. Yier Jin, a member of FICS, titled “HAFIX: Hardware-Assisted Flow Integrity Extension” received the prestigious best paper award from the 2015 Design Automation Conference (DAC 2015)

Read more »

IEEE Computer’s Special Issue on “Supply Chain Security for Cyber-Infrastructure” Led by Prof. Forte and Bhunia

August 30, 2015

IEEE Computer Magazine plans an August 2016 special issue on security of hardware and software supply chain. Design, fabrication, assembly, distribution, system integration, and disposal of today’s electronic components, systems, and software involve multiple untrusted parties. Recent reports demonstrate that this long and globally distributed supply chain is vulnerable to counterfeiting (cloning, overproduction, recycling, etc.) […]

Read more »

Prof. Butler secures a new award for CPS Security

August 30, 2015

Associate Professor and FICS member Kevin Butler, along with his co-principal investigators, FICS co-director Patrick Traynor and CISE faculty My Thai and Prabhat Misra, was awarded a $200K grant from the Army Research Office on developing research capabilities in cyber-physical systems at the University of Florida. Cyber-physical systems (CPS) play a large role in our […]

Read more »

HOST-2016 Chaired by Prof. Bhunia

August 7, 2015

IEEE International Symposium on Hardware –Oriented Security and Trust (HOST) is the premier event for students, researchers, and practitioners in the field of hardware security. Prof. Swarup Bhunia will serve as the program chair for the HOST 2016. See more about HOST at: http://www.hostsymposium.org/

Read more »

Cybersecurity

August 7, 2015

FICS researchers perform world class research and education on all aspects of computer security, network security, mobile security, big data security, applied cryptography, biometric-enabled authentication, and more.

Read more »