Award Abstract # 2229876
AI Institute for Agent-based Cyber Threat Intelligence and Operation
| NSF Org: |
IIS
Division of Information & Intelligent Systems
|
| Recipient: |
UNIVERSITY OF CALIFORNIA, SANTA BARBARA
|
| Initial Amendment Date:
|
May 3, 2023 |
| Latest Amendment Date:
|
August 5, 2024 |
| Award Number: |
2229876 |
| Award Instrument: |
Cooperative Agreement |
| Program Manager: |
Dan Cosley
dcosley@nsf.gov
(703)292-8832
IIS
Division of Information & Intelligent Systems
CSE
Directorate for Computer and Information Science and Engineering
|
| Start Date: |
June 1, 2023 |
| End Date: |
May 31, 2028 (Estimated) |
| Total Intended Award
Amount: |
$19,994,210.00 |
| Total Awarded Amount to
Date: |
$8,278,210.00 |
| Funds Obligated to Date:
|
FY 2023 = $4,336,260.00
FY 2024 = $3,941,950.00
|
| History of Investigator:
|
-
Giovanni
Vigna
(Principal Investigator)
vigna@cs.ucsb.edu
-
Wenke
Lee
(Co-Principal Investigator)
-
Dongyan
Xu
(Co-Principal Investigator)
-
Dawn
Song
(Co-Principal Investigator)
-
Tonya
Fields
(Co-Principal Investigator)
|
| Recipient Sponsored Research
Office: |
University of California-Santa Barbara
3227 CHEADLE HALL
SANTA BARBARA
CA
US
93106-0001
(805)893-4188
|
| Sponsor Congressional
District: |
24
|
| Primary Place of
Performance: |
University of California, Santa Barbara
3227 Cheadle Hall, 3rd Floor
Santa Barbara
CA
US
93106-2050
|
Primary Place of
Performance Congressional District: |
24
|
| Unique Entity Identifier
(UEI): |
G9QBQDH39DF4
|
| Parent UEI: |
|
| NSF Program(s): |
AI Research Institutes, Reimbursable/Reserved Out-year, AI Institutes - IBM Donation
|
| Primary Program Source:
|
01002627DB NSF RESEARCH & RELATED ACTIVIT
01002627RB NSF RESEARCH & RELATED ACTIVIT
01002526DB NSF RESEARCH & RELATED ACTIVIT
4082CYXXDB NSF TRUST FUND
01002324RB NSF RESEARCH & RELATED ACTIVIT
01002324DB NSF RESEARCH & RELATED ACTIVIT
01002728RB NSF RESEARCH & RELATED ACTIVIT
01002223RB NSF RESEARCH & RELATED ACTIVIT
01002425DB NSF RESEARCH & RELATED ACTIVIT
01002526RB NSF RESEARCH & RELATED ACTIVIT
01002728DB NSF RESEARCH & RELATED ACTIVIT
|
| Program Reference
Code(s): |
8237,
075Z
|
| Program Element Code(s):
|
132Y00,
917900,
253Y00
|
| Award Agency Code: |
4900
|
| Fund Agency Code: |
4900
|
| Assistance Listing
Number(s): |
47.070
|
ABSTRACT

Computer systems are increasingly central to national infrastructure in the financial, medical, manufacturing, defense, and other domains. This infrastructure is at risk from sophisticated cyber-adversaries backed by powerful nation-states, whose capabilities rapidly evolve, demanding equally rapid responses. This calls for advances in artificial intelligence and autonomous reasoning that are tightly integrated with advanced security techniques to identify and correct vulnerabilities, detect threats and attribute them to adversaries, and mitigate and recover from attacks. The ACTION Institute will develop novel approaches that leverage artificial intelligence?informed by and working with experts in security operations?to perform security tasks rapidly and at scale, anticipating the moves of an adversary and taking corrective actions to protect the security of computer networks as well as people?s safety. The Institute will function as a nexus for the AI and cybersecurity communities, and its research efforts will be complemented by innovation in education from K-12 to postdoctoral students, the development of new tools for workforce development, and the creation of new opportunities for collaboration among the Institute?s organizations and with external industry partners.
The AI Institute will initiate a revolutionary approach to cybersecurity, in which AI-enabled intelligent security agents cooperate with humans across the cyber-defense life cycle to jointly improve the security posture of complex computer systems over time. Intelligent security agents will follow a new paradigm of continuous, lifelong learning both autonomously and in collaboration with human experts, supported by a shared knowledge bank and an integrated AI stack that provides novel fundamental primitives for (1) reasoning and learning that incorporates domain knowledge, (2) human-agent interaction, (3) multi-agent collaboration, and (4) strategic gaming and tactical planning. Over time, these intelligent security agents will improve their domain knowledge, becoming increasingly robust and effective in the face of changes in the adversaries? modes of operation, composing defense strategies and tactical plans in the presence of uncertainty, collaborating with each other and with humans for mutually complementary teaming, and adapting to unfamiliar and novel attacks.
The Department of Homeland Security and IBM are partnering with NSF to provide funding for this Institute.
This award reflects NSF's statutory mission and has been deemed worthy of support through evaluation using the Foundation's intellectual merit and broader impacts review criteria.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
(Showing: 1 - 10 of 54)
(Showing: 1 - 54 of 54)
Kang, Mintong and Gürel, Nezihe Merve and Yu, Ning and Song, Dawn and Li, Bo
"C-RAG: Certified Generation Risks for Retrieval-Augmented Language Models"
, 2024
Citation
Details
Sitawarin, Chawin and Chang, Jaewon and Huang, David and Altoyan, Wesson and Wagner, David
"PubDef: Defending Against Transfer Attacks From Public Models"
, 2024
Citation
Details
Shen, Yifan and Li, Zhengyuan and Wang, Gang
"Practical Region-level Attack against Segment Anything Models"
, 2024
Citation
Details
Aghakhani, Hojjat and Dai, Wei and Manoel, Andre and Fernandes, Xavier and Kharkar, Anant and Kruegel, Christopher and Vigna, Giovanni and Evans, David and Zorn, Ben and Sim, Robert
"Trojanpuzzle: Covertly poisoning code-suggestion models"
, 2024
Citation
Details
Bhowmick, Aritra and Kosan, Mert and Huang, Zexi and Singh, Ambuj and Medya, Sourav
"DGCLUSTER: A Neural Framework for Attributed Graph Clustering via Modularity Maximization"
, 2024
Citation
Details
Brown, Gavin and Hayase, Jonathan and Hopkins, Samuel and Kong, Weihao and Liu, Xiyang and Oh, Sewoong and Perdomo, Juan C and Smith, Adam
"Insufficient Statistics Perturbation: Stable Estimators for Private Least Squares"
, 2024
Citation
Details
Cheng, Zelei and Wu, Xian and Yu, Jiahao and Yang, Sabrina and Wang, Gang and Xing, Xinyu
"RICE: Breaking Through the Training Bottlenecks of Reinforcement Learning with Explanation"
, 2024
Citation
Details
De_Silva, Ravindu and Guo, Wenbo and Ruaro, Nicola and Grishchenko, Ilya and Kruegel, Christopher and Vigna, Giovanni
"GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning"
, 2024
Citation
Details
Ghazanfar_Abbas, Syed and Ozmen, Muslum Ozgur and Alsaheel, Abdulellah and Khan, Arslan and Celik, Z Berkay and Xu, Dongyan
"SAIN: Improving ICS Attack Detection Sensitivity via State-Aware Invariants"
, 2024
Citation
Details
Haddadan, Shahrzad and Xin, Cheng and Gao, Jie
"Optimally Improving Cooperative Learning in a Social Setting"
, 2024
Citation
Details
Hespanha, João and Çamsar, Kerem
"Markov Chain Monte Carlo for Koopman-Based Optimal Control"
IEEE Control Systems Letters
, v.8
, 2024
https://doi.org/10.1109/LCSYS.2024.3411930
Citation
Details
Sahabandu, Dinuka and Xu, Xiaojun and Rajabi, Arezoo and Niu, Luyao and Ramasubramanian, Bhaskar and Li, Bo and Poovendran, Radha
"POSTER: Game of Trojans: Adaptive Adversaries Against Output-based Trojaned-Model Detectors"
, 2024
https://doi.org/10.1145/3634737.3659430
Citation
Details
Hong, Junyuan and Duan, Jinhao and Zhang, Chenhui and Li, Zhangheng and Xie, Chulin and Lieberman, Kelsey and Diffenderfer, James and Bartoldson, Brian and Jaiswal, Ajay and Xu, Kaidi and Kailkhura, Bhavya and Hendrycks, Dan and Song, Dawn and Wang, Zhang
"Decoding Compressed Trust: Scrutinizing the Trustworthiness of Efficient LLMs Under Compression"
, 2024
Citation
Details
Huang, Mengdie and Lee, Hyunwoo and Kundu, Ashish and Chen, Xiaofeng and Mudgerikar, Anand and Li, Ninghui and Bertino, Elisa
"ARIoTEDef: Adversarially Robust IoT Early Defense System Based on Self-Evolution against Multi-step Attacks"
ACM Transactions on Internet of Things
, v.5
, 2024
https://doi.org/10.1145/3660646
Citation
Details
Jia, Jinyuan and Yuan, Zhuowen and Sahabandu, Dinuka and Niu, Luyao and Rajabi, Arezoo and Ramasubramanian, Bhaskar and Li and Poovendran, Radha
"Fed-Game: A Game-Theoretic Defense Against Backdoor Attacks in Federated Learning"
, 2023
Citation
Details
Jiang, F and Xu, Z and Niu, L and Xiang, Z and Li, Bo and Poovendran, Radha
"ArtPrompt: ASCII art-based jailbreak attacks against aligned LLMs"
, 2024
Citation
Details
Kang, Mintong and Gürel, Nezihe Merve and Li, Linyi and Li, Bo
"COLEP: Certifiably Robust Learning-Reasoning Conformal Prediction via Probabilistic Circuits"
, 2024
Citation
Details
Kang, Mintong and Lin, Zhen and Sun, Jimeng and Xiao, Cao and Li, Bo
"Certifiably Byzantine-Robust Federated Conformal Prediction"
, 2024
Citation
Details
Ke, Z and Liu, B and Xiong, W and Celikyilmaz, A and Li, H
"Sub-network Discovery and Soft-masking for Continual Learning of Mixed Tasks"
, 2023
Citation
Details
Knott, Alistair and Pedreschi, Dino and Chatila, Raja and Chakraborti, Tapabrata and Leavy, Susan and Baeza-Yates, Ricardo and Eyers, David and Trotman, Andrew and Teal, Paul D and Biecek, Przemyslaw and Russell, Stuart and Bengio, Yoshua
"Generative AI models should include detection mechanisms as a condition for public release"
Ethics and Information Technology
, v.25
, 2023
https://doi.org/10.1007/s10676-023-09728-4
Citation
Details
Ko, Hyunouk and Huo, Xiaoming
"Universal consistency of wide and deep ReLU neural networks and minimax optimal convergence rates for Kolmogorov-Donoho optimal function classes"
, 2024
Citation
Details
Kosan, Mert and Verma, Samidha and Armgaan, Burouj and Pahwa, Khushbu and Singh, Ambuj K and Medya, Sourav and Ranu, Sayan
"GNNX-BENCH: Unravelling the Utility of Perturbation-based GNN Explainers through In-depth Benchmarking"
, 2024
Citation
Details
Li, J and Li, N and Ribeiro, B
"MIST: Defending Against Membership Inference Attacks Through Membership-Invariant Subspace Training"
, 2024
Citation
Details
Li, Qinbin and Xie, Chulin and Xu, Xiaojun and Liu, Xiaoyuan and Zhang, Ce and Li, Bo and He, Bingsheng and Song, Dawn
"Effective and Efficient Federated Tree Learning on Hybrid Data"
, 2024
Citation
Details
Liu, Xiyang and Jain, Prateek and Kong, Weihao and Oh, Sewoong and Suggala, Arun
"Label poisoning is all you need"
, 2024
Citation
Details
Liu, Xiyang and Jain, Prateek and Kong, Weihao and Oh, Sewoong and Suggala, Arun
"Label Robust and Differentially Private Linear Regression: Computational and Statistical Efficiency"
, 2023
Citation
Details
Li, Zhuoyan and Lu, Zhuoran and Yin, Ming
"Decoding AIs Nudge: A Unified Framework to Predict Human Behavior in AI-assisted Decision Making"
, 2024
Citation
Details
Lu, Q and Ramasubramanian, B and Poovendran, Radha
"EDC: Effective and Efficient Dialog Comprehension for Dialog State Tracking"
, 2024
Citation
Details
Lu, Zhuoran and Wang, Dakuo and Yin, Ming
"Does More Advice Help? The Effects of Second Opinions in AI-Assisted Decision Making"
Proceedings of the ACM on Human-Computer Interaction
, v.8
, 2024
https://doi.org/10.1145/3653708
Citation
Details
Mink, Jaron and Wei, Miranda and Munyendo, Collins W and Hugenberg, Kurt and Kohno, Tadayoshi and Redmiles, Elissa M and Wang, Gang
"It's Trying Too Hard To Look Real: Deepfake Moderation Mistakes and Identity-Based Bias"
, 2024
Citation
Details
Moothedath, Shana and Sahabandu, Dinuka and Allen, Joey and Bushnell, Linda and Lee, Wenke and Poovendran, Radha
"Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats"
Automatica
, v.159
, 2024
https://doi.org/10.1016/j.automatica.2023.111353
Citation
Details
Moothedath, Shana and Sahabandu, Dinuka and Allen, Joey and Clark, Andrew and Bushnell, Linda and Lee, Wenke and Poovendran, Radha
"Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach"
IEEE Transactions on Automatic Control
, 2024
https://doi.org/10.1109/TAC.2024.3403675
Citation
Details
Piet, Julien and Alrashed, Maha and Sitawarin, Chawin and Chen, Sizhe and Wei, Zeming and Sun, Elizabeth and Alomair, Basel and Wagner, David
"Jatmo: Prompt Injection Defense by Task-Specific Finetuning"
, 2024
Citation
Details
Rajabi, A and Pimple, R and Janardhanan, A and Asokraj, S and Ramasubramanian, B and Poovendran, Radha
"Poster: Double-Dip: Thwarting Label-Only Membership Inference Attacks with Transfer Learning and Randomization"
, 2024
Citation
Details
Ruffin, Margie and Seo, Haeseung and Xiong, Aiping and Wang, Gang
"Does It Matter Who Said It? Exploring the Impact of Deepfake-Enabled Profiles On User Perception Towards Disinformation"
, 2024
Citation
Details
Sahabandu, Dinuka and Moothedath, Shana and Allen, Joey and Bushnell, Linda and Lee, Wenke and Poovendran, Radha
"RL-ARNE: A Reinforcement Learning Algorithm for Computing Average Reward Nash Equilibrium of Nonzero-Sum Stochastic Games"
IEEE Transactions on Automatic Control
, 2024
https://doi.org/10.1109/TAC.2024.3403693
Citation
Details
Sharma, Saurabh and Xian, Yongqin and Yu, Ning and Singh, Ambuj
"Learning Prototype Classifiers for Long-Tailed Recognition"
, 2023
Citation
Details
Suh, Namjoon and Lin, Li-Hsiang and Huo, Xiaoming
"High-Dimensional Multivariate Linear Regression with Weighted Nuclear Norm Regularization"
Journal of Computational and Graphical Statistics
, 2024
https://doi.org/10.1080/10618600.2024.2331020
Citation
Details
Suya, Fnu and Suri, Anshuman and Zhang, Tingwei and Hong, Jingtao and Tian, Yuan and Evans, David
"SoK: Pitfalls in Evaluating Black-Box Attacks"
, 2024
Citation
Details
Suya, Fnu and Zhang, Xiao and Tian, Yuan and Evans, David
"What Distributions are Robust to Indiscriminate Poisoning Attacks for Linear Learners?"
, 2023
Citation
Details
Su, Zihao and Cai, Kunlin and Beeler, Reuben and Dresel, Lukas and Garcia, Allan and Grishchenko, Ilya and Tian, Yuan and Kruegel, Christopher and Vigna, Giovanni
"Remote Keylogging Attacks in Multi-user VR Applications"
, 2024
Citation
Details
Xiang, Zhen and Jiang, Fengqing and Xiong, Zidi and Ramasubramanian, Bhaskar and Poovendran, Radha and Li, Bo
"BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models"
, 2024
Citation
Details
Xie, Yiling and Huo, Xiaoming
"Adjusted Wasserstein distributionally robust estimator in statistical learning"
Journal of machine learning research
, 2024
Citation
Details
Xu, Z and Jiang, F and Niu, L and Jia, J and Li, Bo and Poovendran, Radha
"ACE: A model poisoning attack on contribution evaluation methods in federated learning"
, 2024
Citation
Details
Xu, Z and Jiang, F and Niu, L and Jia, J and Li, Bo and Poovendran, Radha
"SafeDecoding: Defending against jailbreak attacks via safety-aware decoding"
, 2024
Citation
Details
Yang, Cheng-Yun and Ramshankar, Gowri and Nambiar, Sudarshan and Miller, Evan and Zhang, Xun and Eliopoulos, Nicholas and Jajal, Purvish and Jing_Tian, Dave and Chen, Shuo-Han and Perng, Chiy-Ferng and Lu, Yung-Hsiang
"Securing Deep Neural Networks on Edge from Membership Inference Attacks Using Trusted Execution Environments"
, 2024
Citation
Details
Yang, Limin and Chen, Zhi and Wang, Chenkai and Zhang, Zhenning and Booma, Sushruth and Cao, Phuong and Adam, Constantin and Withers, Alex and Kalbarczyk, Zbigniew and Iyer, Ravishankar K and Wang, Gang
"True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center"
, 2024
Citation
Details
Yuan, Ying and Hao, Qingying and Apruzzese, Giovanni and Conti, Mauro and Wang, Gang
""Are Adversarial Phishing Webpages a Threat in Reality?" Understanding the Users' Perception of Adversarial Webpages"
, 2024
https://doi.org/10.1145/3589334.3645502
Citation
Details
Yuan, Zhuowen and Guo, Wenbo and Jia, Jinyuan and Li, Bo and Song, Dawn
"SHINE: Shielding Backdoors in Deep Reinforcement Learning"
, 2024
Citation
Details
Zhang, Jiawei and Xu, Chejian and Li, Bo
"ChatScene: Knowledge-Enabled Safety-Critical Scenario Generation for Autonomous Vehicles"
, 2024
Citation
Details
Zhang, Liang and Thekumparampil, Kiran Koshy and Oh, Sewoong and He, Niao
"DPzero: Dimension-independent and differentially private zeroth-order optimization"
, 2024
Citation
Details
Zhou, Tian-Yi and Huo, Xiaoming
"Learning ability of interpolating deep convolutional neural networks"
Applied and Computational Harmonic Analysis
, v.68
, 2024
https://doi.org/10.1016/j.acha.2023.101582
Citation
Details
(Showing: 1 - 10 of 54)
(Showing: 1 - 54 of 54)
Please report errors in award information by writing to: awardsearch@nsf.gov.