Purdue University Logo

The Center for Education and Research in Information Assurance and Security (CERIAS)

CERIAS Logo

About CERIAS

Page content.

  • Travel Information
  • History Frequently Asked Questions --> Books Authored by CERIAS Faculty --> Public Relations Materials and Info -->

The Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, is the world’s foremost interdisciplinary academic center for cyber and cyber-physical systems; more than a hundred researchers addressing issues of security, privacy, resiliency, trusted electronics, autonomy and explainable artificial intelligence. CERIAS brings together world-class faculty, students and industry partners to design, build and maintain trusted cyber/cyber-physical systems. CERIAS serves as an unbiased resource to the worldwide community.

The Research conducted through CERIAS includes faculty from six different colleges and 20+ departments across campus. The six areas below summarize the research focus areas for the faculty involved with the center:

Assured Identity and Privacy

End system security, human centric security, network security, policy, law and management, prevention, detection and response.

This area includes tools and methods for understanding the context of security, and how to best allocate resources for protection of assets. This includes research into risk assessment and mitigation methodologies, policy development, the role of law and social pressure on security, economic aspects of security, cross-cultural issues governing security, cyberethics, simulation and modeling of security, and policy languages and proofs.

Departments: Communication, Computer Science, Education, ITaP, Management, Nuclear Engineering, Philosophy, Sociology, Computer & Information Technology

How does IT change our interactions, and how can more trustworthy IT change them further? This includes studies of on-line trust, ecommerce (business-to-business and business-to-consumer), digital government services, e-conferencing, on-line personae and anonymity, online news, on-line research and the ephemeral nature of information, on-line propaganda, and spam.

Departments: Communication, CERIAS Staff, Computer Science, Hospitality & Tourism Management, Management, Psychology, Computer & Information Technology, Linguistics

This area includes tools and methods for building software artifacts, servers, and networks that are resistant to attacks and failures. This includes research into vulnerability assessment and identification, programming languages and tools for secure programming, mobile code and “sandboxes,” proof-carrying systems, trusted embedded systems, resilient server architectures, protection against malicious software, dynamic reconfiguration of systems, hardware architecture design, fault-tolerance, code tamperproofing, and penetration testing. Research into more secure operating systems and database systems falls in this area, as does research into better human-computer interfaces for security (HCI).

Departments: CERIAS staff, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, Linguistics, Psychology

Security becomes more complex when participating entities are physically separated from the current location; knowing who and what is communicating from a remote location complicates security decisions. Research in this area includes wireless computing, communication protocol design and verification, agent computation, quality-of-service protection, firewall design and testing, SCADA security, dynamic and protective routing, security for grid computing, and sensor net security.

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Engineering, ITaP

Systems are attacked, and sometimes attacks succeed. This area of our expertise includes intrusion and misuse detection, integrity management issues, audit and logging analysis, sensor and alarm design, strike-back mechanisms, dynamic reconfiguration, honeypots and “jails”, cyberforensics, hacker profiling, deception and psychological operations, information warfare, cyberterrorism, criminal law and computer crime.

Departments: CERIAS staff, Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, ITaP

There is a tension between increased confidence and granularity of authorization provided by better identification of on-line entities, and with the need to protect the privacy rights of individuals and organizations. This area includes research in role-based access control (RBAC), biometrics, pervasive surveillance (“Panoptic Effects”), privacy-protecting transformations of data, privacy-protecting data mining methods, privacy regulation (e.g., HIPAA and COPPA), oblivious multiparty computation, and trusted proxy research.

Departments: Communication, Computer & Information Technology, Computer Science, Electrical & Computer Engineering, Industrial Technology, Sociology, Statistics

About our logo

Our logo was designed for CERIAS by Michael Tieman of Artists Gallerie . He donated his efforts to Purdue University, and we are grateful for his work.

You can get print-ready versions of the CERIAS logo on the Public Relations Materials page .

[topcap]

Mission Statement

CERIAS advances the knowledge and practice of information assurance, security, and privacy through discovery, education, and engagement.

Vision Statement

CERIAS will be recognized as the preeminent source of innovation, knowledge, and expertise in information assurance, security, and privacy for the state, the nation, and the world.

Organizational Goals

  • Empower faculty and research staff from diverse disciplines to address infosec problems, formulate research and education solutions, and secure funding and support.
  • Strengthen meaningful partnerships with Discovery Park and its affiliated centers.
  • Establish and advance the scientific rigor of the field.
  • Discover, develop, and transfer technologies, methods, and information that enhance practice in the field.
  • Engage industry, government, and other academic institutions as awareness, education, and research partners.

Center for Academic Excellence (CAE)

Center of Academic Excellence in Cybersecurity

Our annual security symposium will take place on April 7 & 8, 2020. Purdue University, West Lafayette, IN More Information

Get Your Degree with CERIAS

IMAGES

  1. Research Security Program at Penn State

    research in information security

  2. Research strategy / Research / Advanced Cyber Security Engineering

    research in information security

  3. The 12 Elements of an Information Security Policy

    research in information security

  4. How to build an effective information security risk management program

    research in information security

  5. Cyber Security Framework Mind Map Template

    research in information security

  6. Defining a Security Strategy

    research in information security

VIDEO

  1. What is Information Security ?

  2. Cyber Security Research for Masters & PhD

  3. Introduction to Information Security

  4. Principles of Information Security: Confidentiality, Integrity, & Availability

  5. Information Security What are threats vs vulnerabilities and attacks?

  6. Cyber Security In 7 Minutes

COMMENTS

  1. 134940 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on INFORMATION SECURITY. Find methods information, sources, references or conduct a literature review on ...

  2. About CERIAS

    Travel Information; History; The Center for Education and Research in Information Assurance and Security (CERIAS), a cross-cutting institute at Purdue University, is the world’s foremost interdisciplinary academic center for cyber and cyber-physical systems; more than a hundred researchers addressing issues of security, privacy, resiliency, trusted electronics, autonomy and explainable ...

  3. Information Security Journal: A Global Perspective

    Journal overview. Information Security Journal: A Global Perspective aims to cover a diverse range of subjects and concepts that are related to Information Security. We seek to provide insight into current professional information security related issues by expanding on research and development, new technologies, tools and practises, and future ...