Good Morning Utah
Author: Kim Mellin
SoC Students Receive NSF Graduate Fellowships
Nina is a PhD student working on developing visualization tools for the humanities. Hannah is also a PhD student, her research focuses on computer-aided design of knitting patterns.
The NSF Graduate Research Fellowship Program (GRFP) helps ensure the vitality and diversity of the scientific and engineering workforce of the United States. The program recognizes and supports outstanding graduate students who are pursuing research-based masters and doctoral degrees in science and engineering. The GRFP provides three years of support for the graduate education of individuals who have demonstrated their potential for significant achievements in science and engineering.
U Computer Scientists Working with Department of Defense on Cybersecurity
Kuer
Fighting the Next Generation of Cyberattacks
The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems.
So the U.S. Department of Defense has given a $3 million grant to a team of computer scientists from the University of Utah and University of California, Irvine, to develop software that can hunt down a new kind of vulnerability that is nearly impossible to find with today’s technology.
The team is tasked with creating an analyzer that can thwart so-called algorithmic attacks that target the set of rules or calculations that a computer must follow to solve a problem. Algorithmic attacks are so new and sophisticated that only hackers hired by nation states are likely to have the resources necessary to mount them, but perhaps not for long.
“The military is looking ahead at what’s coming in terms of cybersecurity and it looks like they’re going to be algorithmic attacks,” says Matt Might, associate professor of computer science at the University of Utah and a co-leader on the team.
“Right now, the doors to the house are unlocked so there’s no point getting a ladder and scaling up to an unlocked window on the roof,” Might says of the current state of computer security. “But once all the doors get locked on the ground level, attackers are going to start buying ladders. That’s what this next generation of vulnerabilities is all about.”
Typically, software vulnerabilities today rely on programmers making mistakes while creating their programs and hackers will exploit those mistakes. For example, the software will receive a programming input crafted by a hacker and use it without automatically validating it first. That could result in a vulnerability giving the hacker access to the computer or causing it to leak information.
SoC Undergraduate Receives Best Talk Award
Charlie Jacobsen received a Best Talk Award for his paper A Parameterized Floating-Point Formalization in HOL Light. His talk was recently presented at the International Workshop on Numerical Software Verification in Seattle, Washington.
“It was an honor to present my formalization to the community, including Sylvie Boldo, one of the main contributors to the Coq floating point formalization,” said Jacobsen.
Charlie is an undergraduate student working with Ganesh Gopalakrishnan and the Flux Research Group.