Directorate for Computer & Information Science & Engineering
This program has been archived.
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 15-1), is
effective for proposals submitted, or due, on or after December 26, 2014. The PAPPG is consistent
with, and, implements the new Uniform Administrative Requirements, Cost Principles, and Audit
Requirements for Federal Awards (Uniform Guidance) (2 CFR § 200). Please be advised that
the guidelines contained in NSF 15-1 apply to proposals submitted in response to this
Networked computers reside at the heart of systems on which people now rely, both in critical national infrastructures and in their homes, cars, and offices. Today, many of these systems are far too vulnerable to cyber attacks that can inhibit their function, corrupt important data, or expose private information.
Cyber Trust promotes a vision of a society in which these systems are:
more predictable, more accountable, and less vulnerable to attack and abuse;
developed, configured, operated and evaluated by a well-trained and diverse workforce; and
used by a public educated in their secure and ethical operation.
To improve national cyber security and achieve the Cyber Trust vision, NSF will support a collection of projects that together:
advance the relevant knowledge base;
creatively integrate research and education for the benefit of technical specialists and the general populace; and
integrate the study of technology with the policy, economic, institutional and usability factors that often determine its deployment and use.
Proposals funded will support single and multiple-investigator projects within the broad range of disciplines contributing to the Cyber Trust vision. Projects will be supported in three categories: Single Investigator projects, Team projects, and Center-Scale projects. The resulting Cyber Trust award portfolio will: advance the cyber security research frontier; build national education and workforce capacity (including undergraduate, graduate, and faculty development and training); and ensure that new knowledge can be put into practice.
All awards made are subject to the requirements of P.L. 107-305, the Cyber Security Research and Development Act.
What Has Been Funded (Recent Awards Made Through This Program, with Abstracts)
Map of Recent Awards Made Through This Program