Secure and Trustworthy Cyberspace (SaTC)
|Nina Amlafirstname.lastname@example.org||(703) 292-7991|
|Shannon I. Beckemail@example.com||(703) 292-2487|
|Dan Cosleyfirstname.lastname@example.org||(703) 292-8491|
|Sol Greenspanemail@example.com||(703) 292-8910|
|Chun-Hsi (Vincent) Huangfirstname.lastname@example.org||(703) 292-7877|
|Sara Kiesleremail@example.com||(703) 292-8643|
|Jenshan Linfirstname.lastname@example.org||(703) 292-7950|
|Victor P. Piotrowskiemail@example.com||(703) 292-5141|
|Andrew D. Pollingtonfirstname.lastname@example.org||(703) 292-4878|
|Phillip A. Regaliaemail@example.com||(703) 292-2981|
|Alexander Sprintsonfirstname.lastname@example.org||(703) 292-8950|
|Janet P. Striuliemail@example.com||(703) 292-2858|
|Kevin Thompsonfirstname.lastname@example.org||(703) 292-4220|
|SaTC Questions: email@example.com|
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 19-1), is effective for proposals submitted, or due, on or after February 25, 2019. Please be advised that, depending on the specified due date, the guidelines contained in NSF 19-1 may apply to proposals submitted in response to this funding opportunity.
Full Proposal Accepted Anytime
In today’s increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society’s overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defence measures: corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
The goals of the SaTC program are aligned with the Federal Cybersecurity Research and Development Strategic Plan (RDSP) and the National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. The RDSP identified six areas critical to successful cybersecurity research and development: (1) scientific foundations; (2) risk management; (3) human aspects; (4) transitioning successful research into practice; (5) workforce development; and (6) enhancing the research infrastructure. The NPRS, which complements the RDSP, identifies a framework for privacy research, anchored in characterizing privacy expectations, understanding privacy violations, engineering privacy-protecting systems, and recovering from privacy violations. In alignment with the objectives in both strategic plans, the SaTC program takes an interdisciplinary, comprehensive and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.
The SaTC program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged.
Proposals must be submitted pursuant to one of the following designations, each of which may have additional restrictions and administrative obligations as specified in this program solicitation.
- CORE: This designation is the main focus of the SaTC research program, spanning the interests of NSF's Directorates for Computer and Information Science and Engineering (CISE), Engineering (ENG), Mathematical and Physical Sciences (MPS), and Social, Behavioral and Economic Sciences (SBE).
- EDU: The Education (EDU) designation will be used to label proposals focusing entirely on cybersecurity education.
- TTP: The Transition to Practice (TTP) designation will be used to label proposals that are focused exclusively on transitioning existing research results to practice.
CORE and TTP proposals may be submitted in one of the following project size classes:
- Small projects: up to $500,000 in total budget, with durations of up to three years;
- Medium projects: $500,001 to $1,200,000 in total budget, with durations of up to four years;
EDU proposals are limited to $500,000 in total budget, with durations of up to three years.