Secure and Trustworthy Cyberspace Frontiers (SaTC Frontiers)
|Nina Amlafirstname.lastname@example.org||(703) 292-7991|
|Shannon I. Beckemail@example.com||(703) 292-2487|
|Dan R. Cosleyfirstname.lastname@example.org||(703) 292-8491|
|Sol Greenspanemail@example.com||(703) 292-8910|
|Sara Kieslerfirstname.lastname@example.org||703 292 8643|
|Wei-Shinn Kuemail@example.com||(703) 292-8318|
|Sandip Kundufirstname.lastname@example.org||(703) 292-8950|
|Victor P. Piotrowskiemail@example.com||(703) 292-8670|
|Andrew D. Pollingtonfirstname.lastname@example.org||(703) 292-4878|
|Phillip A. Regaliaemail@example.com||(703) 292-2981|
|Alexander Sprintsonfirstname.lastname@example.org||(703) 292-8950|
|Janet P. Striuliemail@example.com||(703) 292-2858|
|Kevin Thompsonfirstname.lastname@example.org||(703) 292-4220|
Important Information for Proposers
A revised version of the NSF Proposal & Award Policies & Procedures Guide (PAPPG) (NSF 20-1), is effective for proposals submitted, or due, on or after June 1, 2020. Please be advised that, depending on the specified due date, the guidelines contained in NSF 20-1 may apply to proposals submitted in response to this funding opportunity.
In today’s increasingly networked, distributed, and asynchronous world, cybersecurity involves hardware, software, networks, data, people, and integration with the physical world. Society’s overwhelming reliance on this complex cyberspace, however, has exposed its fragility and vulnerabilities that defy existing cyber-defense measures; corporations, agencies, national infrastructure and individuals continue to suffer cyber-attacks. Achieving a truly secure cyberspace requires addressing both challenging scientific and engineering problems involving many components of a system, and vulnerabilities that stem from human behaviors and choices. Examining the fundamentals of security and privacy as a multidisciplinary subject can lead to fundamentally new ways to design, build and operate cyber systems, protect existing infrastructure, and motivate and educate individuals about cybersecurity.
The Secure and Trustworthy Cyberspace (SaTC) program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of these areas: computing, communication and information sciences; engineering; economics; education; mathematics; statistics; and social and behavioral sciences. Proposals that advance the field of cybersecurity and privacy within a single discipline or interdisciplinary efforts that span multiple disciplines are both encouraged. Please see SaTC program solicitation for more details.
Through this solicitation—under the SaTC umbrella—NSF specifically seeks ambitious and potentially transformative center-scale projects in the area of security and privacy that (1) catalyze far-reaching research explorations motivated by deep scientific questions or hard problems and/or by compelling applications and novel technologies that promise significant scientific and/or societal benefits, and (2) stimulate significant research and education outcomes that, through effective knowledge transfer mechanisms, promise scientific, economic and/or other societal benefits. The goal of the SaTC Frontiers program is to advance the frontiers of cybersecurity and privacy, and the areas listed in the SaTC program solicitation are meant to be illustrative but not exhaustive.