forked from eric-keller/eric-keller.github.io
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
1274 lines (1032 loc) · 68.3 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
<!DOCTYPE html>
<html lang="en-US">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="description" content="Associate Professor at the University of Colorado, Boulder and co-founder and CTO of Stateless. Interested in networking and security, my research enables and capitalizes on a more dynamic and programmable computing and network infrastructure.">
<meta name=viewport content="width=device-width, initial-scale=1">
<title>Eric Keller</title>
<link rel="apple-touch-icon" sizes="180x180" href="/apple-touch-icon.png">
<link rel="icon" type="image/png" sizes="32x32" href="/favicon-32x32.png">
<link rel="icon" type="image/png" sizes="16x16" href="/favicon-16x16.png">
<link rel="manifest" href="/manifest.json">
<meta name="theme-color" content="#ffffff">
<link rel="stylesheet" href="css/font-awesome.min.css">
<link rel="stylesheet" href="css/academicons.min.css"/>
<link href="https://fonts.googleapis.com/css?family=Lato:400" rel="stylesheet">
<link href="https://fonts.googleapis.com/css?family=Raleway:300,400,500,600,700" rel="stylesheet">
<link rel="stylesheet" type="text/css" href="css/bootstrap.min.css">
<link rel="stylesheet" type="text/css" href="css/main.css">
</head>
<body data-spy="scroll" data-target="#global-nav">
<!-- NAVBAR START -->
<nav class="navbar navbar-expand-lg navbar-inverse fixed-top" id="global-nav">
<button class="navbar-toggler navbar-toggler-right" type="button" data-toggle="collapse" data-target="#navbarSupportedContent" aria-controls="navbarSupportedContent" aria-expanded="false" aria-label="Toggle navigation">
<i class="fa fa-bars" aria-hidden="true"></i>
</button>
<a class="navbar-brand" href="#hero" id="navbar-title"><img src="img/cu-logo.png" alt="logo of CU" class="cu-logo">Eric Keller</a>
<div class="collapse navbar-collapse" id="navbarSupportedContent">
<ul class="navbar-nav ml-auto">
<li class="nav-item">
<a class="nav-link" href="#about">About</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#interests">Interests</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#enterpre">Entrepreneurship</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#students">Students</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#funding">Funding</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#teaching">Teaching</a>
</li>
<li class="nav-item">
<a class="nav-link" href="publications.html">Publications</a>
</li>
<li class="nav-item">
<a class="nav-link" href="outreach.html">Outreach</a>
</li>
</ul>
</div>
</nav><!-- NAVBAR END -->
<!-- HEADER START -->
<header class="main-header" id="hero">
<div class="header-wrapper">
<div class="header-text">
<div>
<div>
<h1>Eric Keller</h1>
<h2>Associate Professor at the University of Colorado, Boulder</h2>
</div>
<a href="#about"><i class="fa fa-angle-down" aria-hidden="true"></i></a>
</div>
</div>
</div>
</header> <!-- HEADER END -->
<!-- MAIN START -->
<main>
<!-- ABOUT START -->
<section class="section-wrap section-wrap-about">
<div class="container">
<a class="anchor" id="about"></a>
<div class="row">
<div class="col">
<div class="section-heading">
<h2>About</h2>
<hr>
</div>
</div>
</div>
<!-- ABOUT ROW START -->
<div class="row">
<div class="col-md-6 about-content">
<p>I am an Associate Professor in the ECEE Department at the University of Colorado, and co-founder and CTO of <a href="http://www.stateless.net">Stateless</a>. At the beginning of the Fall 2021 semester, I returned from a 2 year leave from CU, but I still actively participate in the management of Stateless (as allowed under policy at CU). I am actively looking for PhD students to join my group. My research interests are elaborated below, but in general, my students are interested in systems programming. Entrepreneurial interest is a bonus -- I believe systems research and entrepreneurship go hand-in-hand, and find it a great avenue for students to pursue.</p>
<p>I received my Ph.D. in 2011 from the Electrical Engineering department at Princeton University advised by Jennifer Rexford in the Computer Science department. I was supported by an Intel Ph.D. Fellowship. After Princeton, I spent a year as a post-doc in the Computer and Information Science department at the University of Pennsylvania, working with Jonathan Smith. </p>
<p><a href="EricKeller_ResearchStatement2024.pdf">
<i class="fa fa-fw fa-file"></i>
</a> Research Statement (2024)</p>
<p><a href="EricKellerCV_06_2024-ann-by-year.pdf">
<i class="fa fa-fw fa-file"></i>
</a>CV (2024)</p>
<ul class="contact-info">
<li><i class="fa fa-fw fa-envelope" aria-hidden="true"></i> [email protected]</li>
<li><i class="fa fa-fw fa-map-marker" aria-hidden="true"></i> ECCR 1B15</li>
<li><i class="fa fa-fw fa-phone" aria-hidden="true"></i> 303-492-0125</li>
</ul>
<ul class="list-inline about-icons">
<li class="list-inline-item">
<a href="https://www.linkedin.com/in/eric-keller-53bb70/">
<i class="fa fa-fw fa-linkedin"></i>
</a>
</li>
<li class="list-inline-item">
<a href="https://scholar.google.com/citations?user=ngLX-kwAAAAJ&hl=en">
<i class="ai ai-fw ai-google-scholar"></i>
</a>
</li>
<li class="list-inline-item">
<a href="https://github.com/eric-keller">
<i class="fa fa-fw fa-github" aria-hidden="true"></i>
</a>
</li>
<!--
<li class="list-inline-item">
<a href="https://twitter.com/ekeller">
<i class="fa fa-fw fa-twitter" aria-hi*dden="true"></i>
</a>
</li>
-->
<li class="list-inline-item">
<a href="EricKellerCV_06_2024-ann-by-year.pdf">
<i class="fa fa-fw fa-file-text" aria-hidden="true"></i>
</a>
</li>
<!--
<li class="list-inline-item">
<a href="http://nsr.colorado.edu/">
NSR
</a>
</li>
-->
</ul>
</div>
<div class="col-md-5 content-image-container">
<img class="img-fluid content-image" src="img/portrait-eric.jpg" alt="">
</div>
</div><!-- ABOUT ROW END -->
</div>
</section><!-- ABOUT END -->
<!-- INTERESTS START -->
<section class="section-wrap section-wrap-interests">
<a class="anchor" id="interests"></a>
<div class="container">
<div class="row">
<div class="col">
<div class="section-heading">
<h2>Interests</h2>
<hr>
</div>
</div>
</div>
<!-- INTERESTS ROW START -->
<div class="row icons-stack">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="interest-item">
<div class="interest-item-icons">
<div>
<i class="fa fa-connectdevelop interests-icon" aria-hidden="true"></i>
<h3>Networking</h3>
</div>
<div>
<i class="fa fa-shield interests-icon" aria-hidden="true"></i>
<h3>Security</h3>
</div>
</div>
<p>I design and build secure and reliable networked systems using a cross-layer approach that draws from networking, operating systems, distributed systems, and computer architecture. My approach is to challenge existing assumptions – rather than solving a problem on top of the system, I look to change the system to make the problem go away fundamentally. With this, a cross-layer approach is central to my research as any given solution might straddle several of these areas.</p>
</div>
<div class="interest-item">
<div class="interest-item-icons">
<i class="fa fa-microchip interests-icon" aria-hidden="true"></i>
<i class="fa fa-terminal interests-icon" aria-hidden="true"></i>
<i class="fa fa-cloud-upload interests-icon" aria-hidden="true"></i>
</div>
<h3 class="interest-subheading-alt">Programmable Infrastructure</h3>
<p>My research introduces new systems, algorithms, and abstractions to enable a more manageable network and computing infrastructure. This is rooted in the fact that a significant portion of security and reliability issues are often a result of limitations in the management of networked systems. My research has been enabling and capitalizing on a more dynamic and programmable computing and network infrastructure, via such technologies as virtualization, software-defined networking, and the movement toward cloud based services. </p>
</div>
</div>
</div><!-- INTERESTS ROW END -->
<div class="row">
<div class="col-lg-12 mx-auto interests-quote-block">
<h2><i class="fa fa-quote-left" aria-hidden="true"></i> Change the assumptions <i class="fa fa-quote-right" aria-hidden="true"></i></h2>
</div>
</div>
</div>
</section><!-- INTERESTS END -->
<!-- ENTREPRENEURIAL ACTIVITY START -->
<section class="section-wrap section-wrap-enterpren">
<a class="anchor" id="enterpre"></a>
<div class="container">
<div class="row">
<div class="col-md-8 mx-auto section-heading section-heading-enterpren ">
<h2>Entrepreneurship</h2>
<hr>
</div>
</div>
<!-- ENTREPRENEURSHIP ROW START -->
<div class="row">
<div class="col-lg-6 col-md-10 mx-auto">
<div class="enterpren-container">
<a href="https://www.stateless.net"><img class="img-fluid" src="img/stateless-logo-blacktext.png" alt="logo of Stateless"></a>
<p><strong>Stateless -</strong> Stateless was founded in 2016 with the mission of making even the most sophisticated and dynamic networks dead simple to manage. After years working together, Murad Kablan and I formed the company as a spin-off of our research at CU (see our NSDI 2017 paper). Our technology addresses the root of the problem which prevents networks from achieving true agility -- state. Find an overview of the company on our <a href="https://www.stateless.net">website</a>.</a></p>
<p><strong>Status: <span class="enterpren-active">Active. Raised $20M+ in VC funding from Foundry Group, Drive Capital, and Speed Invest, and $1.7M in grants from the NSF (SBIR) and State of Colorado (OEDIT AIA) </span></strong></p>
</div>
</div>
<div class="col-lg-6 col-md-10 mx-auto">
<div class="enterpren-container">
<img class="img-fluid" src="img/clear-creek-logo-crop.png" alt="logo of Clear Creek Networks">
<p><strong>Clear Creek Networks -</strong> Along with two M.S. students, I co-founded CCN in 2013
to bring software-defined networking technology to the next generation electrical grid -- addressing the disconnect between the power engineers and the network engineers. Ultimately we were unable to breakthrough this industry. Key lessons: need to investigate product market fit more aggressively up front, trust between co-founders is critical. </p>
<p><strong>Status: <span class="enterpren-dissolved">Dissolved</span></strong></p>
</div>
</div>
</div><!-- ENTERPRENEURSHIP ROW END -->
<div class="row">
<div class="col section-heading-enterpren">
<h3>Programs participated in:</h3>
</div>
</div>
<!-- PARTICIPATED IN ROW START -->
<div class="row participated-in-section">
<div class="col-md-4 ">
<a href="#"><img class="img-fluid" src="img/techstars-logo.png" alt="logo of Techstars"></a>
</div>
<div class="col-md-4 ">
<a href="#"><img class="img-fluid" src="img/catalyze-logo-png.png" alt="logo of Catalyze CU-Boulder"></a>
</div>
<div class="col-md-4 ">
<a href="#"><img class="img-fluid" src="img/nvc-logo-crop.png" alt="logo of New Venture Challenge Boulder"></a>
</div>
<div class="col-md-4 ">
<a href="#"><img class="img-fluid" src="img/icorps-logo.jpg" alt="logo of I-Corps"></a>
</div>
<div class="col-md-4 ">
<a href="#"><img class="img-fluid" src="img/surge-logo-crop.png" alt="logo of Surge Accelelator"></a>
</div>
</div><!-- PARTICIPATED IN ROW END -->
</div>
</section><!-- ENTERPRENEURIAL ACTIVITY END -->
<!-- STUDENTS START -->
<section class="section-wrap section-wrap-students">
<a class="anchor" id="students"></a>
<div class="container">
<div class="row">
<div class="col section-heading">
<h2>Students</h2>
<hr>
<h3>Current:</h3>
</div>
</div>
<!-- TEAM ROW START -->
<div class="row">
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-azzam.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Azzam Alsudais</h3>
<h4>PhD CS (expected 2020)</h4>
<p><a href="https://aalsudais.github.io/">Website</a></p>
</div>
-->
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-mohammad.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Mohammad Hashemi</h3>
<h4>PhD CS (expected 2021)</h4>
<p><a href="https://www.linkedin.com/in/smjhashemi/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-sepideh.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Sepideh Goodarzy</h3>
<h4>PhD CS (expected Aug 2022) (co-advised with Rick Han)</h4>
<p><a href="https://www.linkedin.com/in/sepidehgoodarzy/">Website</a></P>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-greg.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Greg Cusack</h3>
<h4>PhD ECEE (expected Dec 2022)</h4>
<p><a href="https://gregcusack.github.io/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-marcelo.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Marcelo Abranches</h3>
<h4>PhD ECEE (expected Dec 2022)</h4>
<p><a href="https://mcabranches.github.io">Website</a></P>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-karl.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Karl Olson</h3>
<h4>PhD CS (expected 2023)</h4>
<p><a href="https://www.linkedin.com/in/karl-olson-16720511/">Website</a></P>
</div>
-->
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-maziyar.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Maziyar Nazari</h3>
<h4>PhD CS (expected 2024)</h4>
<p><a href="https://maziyar-na.github.io/">Website</a></P>
</div>
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-dwight.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Dwight Browne</h3>
<h4>PhD CS (expected 2024)</h4>
<p><a href="https://www.dwightjbrowne.com/">Website</a></p>
</div>
-->
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-erika.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Erika Hunhoff</h3>
<h4>PhD CS (expected 2024) (co-advised with Eric Rozner)</h4>
<p><a href="https://hunhoffe.github.io/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-bashayer.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Bashayer Alharbi</h3>
<h4>PhD CS (expected 2026) </h4>
<p><a href="https://byalharbi.github.io/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/dustin-headshot.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Dustin Hooks</h3>
<h4>PhD CS (expected 2027)</h4>
<p><a href="https://www.linkedin.com/in/dustinjayhooks/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/shirin-headshot.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Shirin Ebadi</h3>
<h4>PhD ECEE (expected 2027)</h4>
<p><a href="https://shirinebadi.github.io/">Website</a></p>
</div>
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/giulio-headshot.png" class="img-fluid team-image" alt="placeholder">
<h3>Giulio Sidoretti</h3>
<h4>PhD (Visiting from Univ. of Rome Tor Vergata</h4>
<p><a href="https://scholar.google.com/citations?user=cP6ilOUAAAAJ&hl=it">Website</a></p>
</div>
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-bashayer.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Bashayer Alharbi </h3>
<h4>PhD CS (expected 2025) </h4>
<p><a href="https://www.linkedin.com/in/bashayer-alharbi/">Website</a></p>
</div>
-->
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/headshot-bharat.jpg" class="img-fluid team-image" alt="placeholder">
<h3>Bharat Nallan</h3>
<h4>MS ECEE (expected 2017)</h4>
</div>
-->
<!--
<div class="col-md-4 col-sm-6 team-section ">
<img src="img/portrait-placeholder.png" class="img-fluid team-image" alt="portrait of Jane Smith">
<h3>Jane Smith</h3>
<h4>Title</h4>
<p>(co-advised with Eric Wustrow)</p>
<p><a href="#">Website</a></p>
</div>
-->
</div> <!-- TEAM ROW END -->
<div class="row">
<div class="col section-heading alumni-heading">
<h3>Alumni:</h3>
</div>
</div>
<!-- ALUMNI ROW START -->
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="alumni-item">
<h4>Karl Olson, 2024</h4>
<p><strong>Ph.D.</strong> in CS - <a href="thesis/KarlOlson_Dissertation_Final_Feb2024.pdf"> Where is the Incentive? Rethinking Approaches to Security in Networks</a>.
<br /> First job -- US Military Academy/Army Cyber Institute</p>
</div>
<div class="alumni-item">
<h4>Greg Cusack, 2022</h4>
<p><strong>Ph.D.</strong> in ECEE - <a href="thesis/Greg-Cusack-Final-PhD_Dissertation_12_2022.pdf"> Enabling Application-Specific Programmable Compute Infrastructure</a>.
<br /> First job -- Solana</p>
</div>
<div class="alumni-item">
<h4>Marcelo Abranches, 2022</h4>
<p><strong>Ph.D.</strong> in ECEE - <a href="thesis/Marcelo_Abranches_PhD_Dissertation_10_2022.pdf"> Synergistic Server-Based Network Processing Stack</a>.
<br /> First job -- CGU (in Brazil)</p>
</div>
<div class="alumni-item">
<h4>Sepideh Goodarzy, 2022</h4>
<p><strong>Ph.D.</strong> in CS (co-advised with Rick Han) - <a href="thesis/SepidehGoodarzy_PhD_Dissertation_8_2022.pdf"> SmartOS: Automating Allocation of Operating System Resources to User Preferences via Reinforcement Learning</a>.
<br /> First job -- Google</p>
</div>
<div class="alumni-item">
<h4>Albert Vilardell Barnosell, 2022</h4>
<p><strong>B.S.</strong> in CS from <a href="https://www.upc.edu/en">UPC</a> (thesis work done at CU as visiting student) (co-advised with Tamara Lehman) - <a href="thesis/TFG_Albert_Vilardell_June2022.pdf"> Virtualization of programmable switches on top of
an FPGA board</a>.
<!-- <br /> First job -- Google</p> 1-->
</div>
<div class="alumni-item">
<h4>Mohammad Hashemi, 2021</h4>
<p><strong>Ph.D.</strong> in CS - <a href="thesis/Mohammad_Hashemi-dissertation-7_2021.pdf"> Detecting Anomalies in Network Systems by Leveraging
Neural Networks</a>.
<br /> First job -- Data Scientist at Illumina</p>
</div>
<div class="alumni-item">
<h4>Azzam Alsudais, 2020</h4>
<!--https://aalsudais.github.io/-->
<p><strong>Ph.D.</strong> in CS - <a href="thesis/AzzamAlsudais-PhD-Dissertation_11_2020.pdf"> Efficient Approaches for Homing Complex Network Services</a>.
<br /> First job -- Assistant professor at King Saud University (Computer Science Department)</p>
</div>
<div class="alumni-item">
<h4>Oliver Michel, 2019</h4>
<p><strong>Ph.D.</strong> in CS - <a href="thesis/OliverMichel-dissertation_4_2019.pdf"> Packet-Level Network Telemetry and Analytics</a>.
<br /> First job -- Cloud Architect at TourRadar, then post-doc at Univ of Vienna</p>
</div>
<div class="alumni-item">
<h4>Aimee Coughlin, 2018</h4>
<p><strong>Ph.D.</strong> in ECEE - <a href="thesis/coughlin-phd-2018.pdf"> Enabling User Space Secure Hardware</a>.
<br /> First job -- Security Engineer at Facebook</p>
</div>
<!--
<div class="alumni-item">
<h4>Bharat Nallan, 2017</h4>
<p><strong>M.S.</strong> in ECEE (non-thesis)
<br /> First job -- CloudFlare</p>
</div>
-->
<div class="alumni-item">
<h4>Murad Kablan, 2017</h4>
<p><strong>Ph.D.</strong> in Computer Science - <a href="thesis/murad-kablan-phd-2017.pdf"> StatelessNF: A Disaggregated Architecture for Network Functions</a>.
<br /> First job -- CEO and co-founder Stateless</p>
</div>
<div class="alumni-item">
<h4>Edgar González Quevedo, 2017</h4>
<p><strong>M.S.</strong> from <a href="https://www.upc.edu/en">UPC</a> (thesis work done at CU as visiting student) - <a href="thesis/edgar-gonzalez-ms-2017.pdf"> Analysis, experimentation and improvement of a system of "Crowdsourced" home cyber security </a>. <br /> </p>
</div>
<div class="alumni-item">
<h4>Anurag Dubey, 2017</h4>
<p><strong>M.S.</strong> in ECEE - <a href="thesis/anurag-dubey-ms-2017.pdf"> Timing and Latency Characteristics in Disaggregated Systems</a>. <br /> First job -- Xilinx</p>
</div>
<div class="alumni-item">
<h4>Ali Ismail, 2015</h4>
<p><strong>M.S.</strong> in ECEE - <a href="thesis/ali-ismail-ms-2015.pdf">Cloud RTR: Cloud Infrastructure for Apps with Hardware</a>. <br /> First job -- Synchroness</p>
</div>
<div class="alumni-item">
<h4>Ryan Hand, 2014</h4>
<p><strong>M.S.</strong> in Computer Science - <a href="thesis/ryan-hand-ms-2014.pdf">Toward An Active Network Security Architecture</a>. <br /> First job -- Instructor USMA</p>
</div>
<div class="alumni-item">
<h4>Matt Monaco, 2013</h4>
<p><strong>M.S.</strong> in Computer Science - <a href="thesis/matt-monaco-ms-2013.pdf">A Filesystem Abstraction for Multiple Actors in a Distributed Software Defined Network</a>. <br /> First job -- Google</p>
</div>
<!--
<div class="alumni-item">
<h4>Kelly Kaoudis, 2015</h4>
<p><strong>M.S. (non-thesis)</strong> in Computer Science. <br /> First job -- Twitter</p>
</div>
-->
<!-- Sachin Sharma, Varsha, Sreeram, Guarov, Chethan, Akshay
Rajeev, VLNP
-->
<!-- Fall 2023: Varsha Natarajan – MS CS (2023), Gaurav Roy – MS CS (2023), Venky, Pawan, Rohan
-->
<div class="alumni-item">
<h4> MS (non-thesis):
Dwight Browne (2023), Chethan Kavaraganahalli Prasanna (2023), Akshay Abhyankar (2023), Sreeram Ganesan (2023), Sachin Sharma (2023), Rajeev Menon (2023),
Swaminathan Sriram (2022), Evan Braun (2022), George Nsude (2022), Prerit Oberai (2019), Bharat Nallan (2017), Kelly Kaoudis (2015). </h4>
<p><strong>M.S.</strong> -- each were contributing reserch members of my research group, whether through an official means such as an Independent Study, or unofficially contributing to a project on their own.</p>
<h4>Undergraduates (non-thesis): Alex Tsankov (AY 2014-15), Sean Lambert (AY 2015-16), Ji-hoon Kim (AY 2015-16), Yiming Wang (AY 2016-17), Jeffery Lim (AY 2016-17), Pranav Subramanian (AY 2021-22)</h4>
<p><strong>B.S.</strong> -- each performed undergraduate research as part of programs like the discovery learning apprenticeship (DLA).</p>
</div>
</div>
</div> <!-- ALUMNI ROW END -->
</div>
</section> <!-- STUDENTS END -->
<!-- FUNDING START -->
<section class="section-wrap section-wrap-funding">
<a class="anchor" id="funding"></a>
<div class="container">
<div class="row">
<div class="col section-heading">
<h2>Funding</h2>
<hr>
</div>
</div>
<!-- ACTIVE FUNDING ROWS START -->
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2241818"><h4>CNS Core: Small: Transparent Network Acceleration</h4></a>
<p><strong>Role:</strong> PI </p>
<p><strong>Dates:</strong> 2023-2026</p>
<p><strong>Award:</strong> $604,728 (total)</p>
<p><strong>Collaborators:</strong> Tamara Lehman</p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapse-tna" aria-expanded="false" aria-controls="collapse-tna">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapse-tna">
<div class="card card-body">
<p>
With the increase in connected devices comes an increase in network traffic. Applications that we use every day, such as video conferencing, each need to have traffic processed to secure and optimize the application. Current network infrastructure is showing signs that in the near future it won't be able to keep up with the growing demand or increased needs, such as having higher definition video calls with more participants and imperceptible delays in the communication. While some solutions have been proposed to help solve this problem, they do so at the cost of compatibility, which would require rewriting a large body of software that has been developed and tested over the course of over a decade. This proposal introduces a new way of thinking about the way network traffic is handled that will enable both forward and backwards compatibility with modern software while meeting the needs of applications.
</p>
<p>
In particular, this proposal introduces Transparent Network Acceleration (TNA), which is a novel architecture that decomposes Linux network functionality into fast-path and slow-path functions with explicitly optimized execution environments for each. TNA dynamically and automatically builds a minimal fast path that is instantiated and adjusted at run-time, leading to a transparently accelerated networking stack that fully retains the Linux networking interfaces. Two core mechanisms are introduced. First, to create a highly efficient fast path, TNA automatically and dynamically instantiates only the part of the network stack that is used. New techniques are introduced to introspect the Linux kernel, build a dependency graph of functions, and assemble and deploy an optimal fast path. Second, it targets two fast-path execution environments from a single source code description of modules: (i) the eXpress Data Path (XDP), for in-kernel processing, and (ii) a field programmable gate array (FPGA) based SmartNIC, for hardware accelerated processing. As part of these targets, the design of modules, the compilation to hardware or software, and synchronizing the state represent a novel and complete design flow. In order to demonstrate the effectiveness of these two core mechanisms, we complete the project with a case study of automatically accelerating a selective forwarding unit (SFU) video conferencing network function deployed with considerations such as firewalling and container networking.
</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2326835"><h4>NSF Converence Accelerator Track G: 5G Hidden Operations through Securing Traffic (GHOST) Phase 2</h4></a>
<p><strong>Role:</strong> co-PI </p>
<p><strong>Dates:</strong> 2023-2025</p>
<p><strong>Award:</strong> $4,983,234 (total)</p>
<p><strong>Collaborators:</strong> Keith Gremban (PI), Alexandra Siegel, Tamara Lehman, Salvador D'Itri</p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapse-ghost" aria-expanded="false" aria-controls="collapse-ghost">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapse-ghost">
<div class="card card-body">
<p>
The proliferation of 5G networks around the world presents an attractive opportunity for U.S. government organizations, nongovernmental humanitarian aid organizations, and private sector enterprises to eliminate the costs of installing and maintaining an alternate communications infrastructure by making use of indigenous 5G networks. However, in many areas of the world, 5G networks are deployed and operated by organizations that are untrusted and potentially hostile to the U.S. In these environments, new security technologies are needed to secure operations. While 5G encrypts data packets and subscriber IDs, analysis of network activity can reveal detailed information about individuals and groups. For example, pattern-of-life analysis can be used to identify and track users. Similarly, traffic analysis can reveal details of an organization?s structure and operations. The 5G Hidden Operations through Securing Traffic (GHOST) project provides four additional layers of security to protect against these threats. First, GHOST protects individuals by swapping subscriber and device IDs, along with usage patterns, or personas. Second, GHOST prevents traffic analysis by introducing ghost users and ghost traffic into the network to obscure real activity. Third, the GHOST project further frustrates traffic analysis by injecting ?false flag? traffic that models real events and operations. Finally, GHOST secures devices at the hardware level by locating GHOST software inside Trusted Execution Environments (TEEs). The GHOST technology will enable organizations to securely operate over foreign 5G networks, regardless of the politics of the network operators. </p>
<p>
GHOST addresses threats that cannot be countered by traditional cyber security solutions. The GHOST project will demonstrate an integrated solution on a real 5G network and evaluate GHOST effectiveness in multiple operational scenarios. The GHOST project will yield four major intellectual benefits to the research and operational communities.
(i) First, the GHOST project will deliver technology to anonymize or disguise end-user identities and their association with locations, and communications endpoints. End-user identities will be protected by dynamically allocating software defined credentials and associated software defined personas. Association with locations are protected by correlating movement history with compromising patterns of movement. Communications connections are protected by peer-to-peer anonymization.
(ii) Second, the GHOST project will deliver technology to overlay normal network activity with ghost activity to obfuscate traffic analysis and hide regular patterns of activity or changes in activity.
(iii) Third, the GHOST project will deliver technology to model, generate, and inject ?false flag? traffic into the network to make it appear to a network analyst that a real event is occurring at a particular location.
(iv) Fourth, the GHOST project will deliver technology that will protect end-user devices and non-indigenous networking equipment from penetration and compromise through the use of TEEs. The idea behind a TEE is that no software, privileged or not, should be able to access or modify protected data. TEEs enable the process of attestation of both the hardware and the software. The GHOST software will run inside the TEE to be able to attest to the security of the protocol and protect it in case of capture.
</p>
<p>
GHOST technology will benefit end-users of any untrusted network, not just untrusted 5G networks. The primary criteria for success of the GHOST project will be:
(i) Prevention of identification and tracking of individuals by a network operator.
(ii) Inability of a network analyst to determine regular activity patterns, or significant changes in activity.
(iii) Mis-leading a network analyst by injection of ?false flag? activity.
(iv) GHOST software deployment in TEEs with no observable degradation in device performance.
</p>
</div>
</div>
</div>
</div>
</div>
<!--
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2226426"><h4>NSF Convergence Accelerator Track G: 5G Hidden Operations through Securing Traffic (GHOST)</h4></a>
<p><strong>Role:</strong> co-PI </p>
<p><strong>Dates:</strong> 2022-2023</p>
<p><strong>Award:</strong> $749,186 (total)</p>
<p><strong>Collaborators:</strong> Keith Gremban (PI), Alexandra Siegel, Tamara Lehman, Salvador D'Itri</p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>
The proliferation of 5G networks around the world presents an attractive opportunity for U.S. government organizations, nongovernmental humanitarian aid organizations, and private sector enterprises to take advantage of indigenous 5G networks to eliminate the costs of installing and maintaining an alternate communications infrastructure. However, in many areas of the world, 5G networks are deployed and operated by organizations that are untrusted and potentially hostile to the U.S. In these environments, new security technologies are needed to secure operations. The 5G Hidden Operations through Securing Traffic (GHOST) project provides four layers of security. First, GHOST protects against end-user and networking devices from being compromised by a hostile network. Second, GHOST anonymizes individual identities and obscures user locations. Third, GHOST prevents traffic analysis that could reveal operational plans and activities by anonymizing communication connections and introducing “GHOST” traffic into the network to maintain a constant level of activity. Finally, the GHOST project will further obfuscate traffic analysis by injecting “false flag” traffic that models real operations to confuse and mislead analysis. The GHOST technology will enable organizations ranging from the U.S. military to private entities to securely operate over indigenous 5G networks, regardless of the politics of the network operators.
</p>
<p>
The GHOST project addresses the core intellectual challenge of providing secure communications resistant to penetration and traffic analysis over untrusted networks. The GHOST project considers the network as a black box that is assumed to be operated by a hostile agent. Addressing the challenge will yield four intellectual benefits to the research and operational communities.
(i) First, the GHOST project will deliver technology that will protect end-user devices and non-indigenous networking equipment from penetration and compromise. The technology secures devices at the hardware level through the use of Trusted Execution Environments (TEEs). The idea behind a TEE is that anything coming from outside the chip boundary is untrusted. TEEs enforce this trusted boundary by implementing integrity verification of data and code and encrypting them once they cross the trusted boundary.
(ii) Second, the GHOST project will deliver technology to anonymize or disguise end-user identities, locations, and communications endpoints. End-user identities will be protected using software defined credentials. Locations are protected using geo-spatial identity management. Communications connections are protected by peer-to-peer anonymization.
(iii) Third, the GHOST project will deliver technology to overlay normal traffic with “GHOST” traffic — essentially network white noise — to obfuscate traffic analysis.
(iv) Fourth, the GHOST project will deliver technology to model and generate “false flag” traffic. Through monitoring and simulation, models of traffic patterns associated with specific operations will be generated. "False flag" traffic injected into the network will reflect the traffic associated with a particular operation and be convincing to any observers.
</p>
<p>
GHOST technology will benefit end-users of any network, not just untrusted networks. The primary criteria for success of the GHOST project will be:
(i) Device protection from network operator attacks;
(ii) The obfuscation of user identities, locations, and communications connections;
(iii) The obfuscation of traffic patterns;
(iv) The injection of “false flag” traffic.
</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://nsf.gov/awardsearch/showAward?AWD_ID=1652698"><h4>CAREER: Stateless Network Functions: Building a Better Network Through Disaggregation</h4></a>
<p><strong>Role:</strong> PI (sole)</p>
<p><strong>Dates:</strong> 2017-2023</p>
<p><strong>Award:</strong> $627,999</p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>To improve performance, security, and reliability, network practitioners have moved away from the principle of a stateless network and added stateful processing to devices such as internet firewalls, load balancers, and intrusion detection systems. In doing so, networks have become increasingly complex and brittle. The research objective of this proposal is to provide the foundation for a transformative network architecture based on disaggregated virtual network functions. Developing this capability will improve the performance and operation of virtualized computing systems, including compute clouds, and ultimately make US information technology capabilities more competitive.</p>
<p>This project will introduce the new systems and algorithms to make a disaggregated network function architecture possible, leveraging recent advances in distributed systems in low-latency data stores, and the unique properties of network processing that can be used to optimize the interface between the processing and state. Specifically, this proposal will: 1) develop the algorithmic and system underpinnings that overcome the challenges in achieving the needed performance in the face of added latency, overhead in accessing state, and concurrent execution; and 2) create novel network management capabilities that leverage disaggregated network functions to realize a network function infrastructure that is efficient and robust to load changes, component failures, and software or configuration updates.</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://nsf.gov"><img src="img/nsf-vmware-logo2.png" class="img-fluid" alt=""></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1700527"><h4> SDI-CSCS: S2OS - Enabling Infrastructure-Wide Programmable Security with SDI</h4></a>
<p><strong>Role:</strong> co-PI</p>
<p><strong>Collaborators:</strong> Guofei Gu (PI), Hongxin Hu, Zhiqiang Lin, Don Porter</p>
<p><strong>Dates:</strong> 2017-2021</p>
<p><strong>Award:</strong> $3M (total) $599,489 (Colorado)</p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>Traditionally, many of our critical systems have been developed with security as a reactive add-on, rather than a by default design. As a result, existing security mechanisms are often fragmented, hard to configure or verify, which makes it difficult to defend against various cyber attacks. This project will build the "holy grail" for enterprise/cloud/data-center security management with software-defined infrastructure (SDI): a unified framework for security and management of disparate resources, ranging from processes to storage to networking. Cloud computing is now an essential part of our national cyberinfrastructure; the proposed work will lower the total cost of ownership for clouds - further unlocking economic and environmental benefits - as well as improving the security of today's clouds.</p>
<p>This project proposes S2OS (SDI-defined Security Operating System), which abstracts security capabilities and primitives at both the host Operating System (OS) and network levels and offers an easy-to-use and programmable security model for monitoring and dynamically securing applications. This project will explore new techniques to transparently compose software into a unified enterprise, even if the individual pieces were never explicitly designed to inter-operate, similar in a way a traditional operating system managing various hardware resources for upper-layer user applications. Further, this project will contribute new ways to leverage global information for making effective local security management decisions. Finally, this project enables new innovations in programming dynamic, host-network coordinated, and intelligent security applications to protect the entire infrastructure.</p>
<p>This project will make significant contributions to how enterprise, data centers and cloud computing are securely built and managed. The project's PIs will engage in educational and outreach activities to train the next generation talent. In particular, the PIs plan to integrate the interdisciplinary research ideas into courses spanning networking, systems and security. The project will also actively encourage participation from underrepresented groups and transfer technology to industry partners.</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://www.nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1660680"><h4> I-Corps: Elastic Network Infrastructure</h4></a>
<p><strong>Role:</strong> PI</p>
<p><strong>2016-2018</strong></p>
<p><strong>$50,000 (total)</strong></p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>The broader impact/commercial potential of this I-Corps project rests in the creation of a new category of how networking is offered. Rather than offered as a static collection of physical appliances to be managed by a company's IT staff, this project aims to provide network processing as a service, and in turn reduce capital costs (through more efficient use of resources), as well as operational costs (by simplifying management). In effect, it seeks to do for networking what cloud computing did for computing. Target markets include traditional enterprise networks, which can replace their physical network devices with this service to save money and simplify management, and Cloud and telecom service providers which could offer the service as an add-on feature to their customers in order to increase revenue. As more devices come online, as more traffic traverses a network, and as networks further become more integral to business operations, the needs for more reliable and efficient networks will likewise increase.</p>
<p>This I-Corps project explores the market for a new approach to network functions virtualization, where network functions are disaggregated into separate processing and state storage components. Experiments have shown seamless scalability, disruptionless failure management, and processing rates in line with other software solutions. The aim of this I-Corps project is to interview a large number of potential customers to understand their current and future needs, challenges, and operations. With this, the commercial viability and value proposition of the 'stateless' network functions technology will be better understood.</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://www.nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1406192"><h4>TWC: Medium: Active Security</h4></a>
<p><strong>Role:</strong> PI</p>
<p><strong>Collaborators:</strong> Adam Aviv, Jonathan M. Smith</p>
<p><strong>2014-2018</strong></p>
<p><strong>$1.2M (total), $746,537 (Colorado)</strong></p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>Computer and network security is currently challenged by the need to secure diverse network environments including clouds and data-centers, PCs and enterprise infrastructures. This diversity of environments is coupled to increased attack sophistication. Today's tools for securing network and computing infrastructures can be painstakingly composed and configured using available components, but fail to automatically learn from their environment and actively protect it. This research introduces Active Security, which is an architectural approach with fundamental advantages for network defenders; Active Security continuously senses threats and adapts defenses to those threats, including those previously unseen.</p>
<p>Active Security prototyping and applications incorporate a novel high-rate decision procedure that avoids manual intervention. The project addresses: (1) the characteristics of network 'sensors' most useful to an observe-orient-decide-act (OODA) loop; (2) decision and control algorithms for determining appropriate actions based on sensed events; (3) the infrastructure required for robust and trustworthy systems requiring minimal human-in-the-loop interaction; (4) automated defense approaches viable in diverse network settings that do no harm and are recoverable; and (5) metrics for performance assessment of an Active Security system such as responsiveness and accuracy.</p>
<p>Active Security's central themes of network security, network sensing, and automated defenses integrate naturally into both graduate and undergraduate education at participating institutions, including both midshipmen at the United States Naval Academy and cadets at the United States Military Academy. Network security is an increasing concern for society at large, and an Active Security implementation is straightforward to deploy on networks equipped with programmable software defined networking (SDN) controllers, a technology increasingly present in data center, carrier and enterprise networks.</p>
</div>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto">
<div class="funding-item">
<div class="funding-image-container">
<a href="https://www.nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1337399"><h4>XPS: SDA: Elasticizing the Linux Operating System for the Cloud</h4></a>
<p><strong>Role:</strong> co-PI</p>
<p><strong>Collaborators:</strong> Richard Han (Colorado)</p>
<p><strong>2013-2018</strong></p>
<p><strong>$749,992</strong></p>
<p class="funding-expand-button-container">
<button type="button" data-toggle="collapse" data-target="#collapseExample" aria-expanded="false" aria-controls="collapseExample">
Read more <i class="fa fa-angle-down" aria-hidden="true"></i>
</button>
</p>
<div class="collapse" id="collapseExample">
<div class="card card-body">
<p>One of the major recent advances in computing is the development of large scale data centers, wherein hundreds of thousands of computers may be housed in each data center. In cloud computing, individual applications can each lease computing space to execute on one or more of a data center?s computers. Cloud applications often need to dynamically adjust the amount of resources that they lease, elastically scaling up or down the amount of processing, memory, storage and/or network bandwidth that they need. Today's cloud-based systems burden application developers by requiring elasticity to be explicitly encoded into their software. This project seeks instead to investigate an approach that eases the task of elasticizing cloud-based applications by automatically incorporating elasticity at the operating system (OS) level to support dynamic scaling of applications. This project plans to develop an open source software tool called ElasticOS that incorporates elasticity into the Linux OS, with the hope that such a practical tool could lead to significant broader impacts for society, namely transforming the way that major cloud providers deploy applications within their cloud infrastructure, and benefiting application developers by easing the complexity of elastic programming in the cloud.</p>
<p>The intellectual merit and research advances expected from this project concern the development of novel techniques and tools for supporting elasticity of memory, networking, storage, and processing in cloud-based modern operating systems. In particular, the project will explore the feasibility and performance of a new concept to achieve elastic memory by stretching of processes/threads across cloud machines using the idea of elastic page tables. Further research challenges expected to be addressed by the proposal include the following: identifying and building the major components of an elastic OS architecture; devising a way to unify the network address space across multiple nodes so that network I/O can be treated as elastic; discovering a practical adaptive online algorithm for page clustering and placement that exploits application locality and parallelism; extending network elasticity to on-chip networking; discovering methods to accommodate multi-threading in elasticity; and developing a timely and accurate protocol for discovering available elastic cloud resources. The project intends to test four different types of standard applications on top of ElasticOS in order to better understand how to tune the elasticity: a large in-memory database application; a compute-intensive application; a network-intensive Web server application; and a ubiquitous computing application. The PIs are highly qualified to pursue the proposed research, and have well-known expertise in operating systems, networking, mobile cloud computing, computer architecture, wireless sensor networks, and distributed systems. Additional important broader impacts for society resulting from this project are expected to include enhancing the curriculum of advanced graduate systems courses and enabling undergraduate students, underrepresented minorities and women to participate in the project through programs such as REU and the Colorado Diversity Initiative.</p>
</div>
</div>
</div>
</div>
</div>
-->
<!-- ACTIVE FUNDING ROWS END -->
<div class="row">
<div class="col section-heading">
<h3>Past:</h3>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2226426"><h4>NSF Convergence Accelerator Track G: 5G Hidden Operations through Securing Traffic (GHOST)</a></h3>
<p><strong>Role:</strong> co-PI </p>
<p><strong>Dates:</strong> 2022-2024</p>
<p><strong>Award:</strong> $749,186 (total)</p>
<p><strong>Collaborators:</strong> Keith Gremban (PI), Alexandra Siegel, Tamara Lehman, Salvador D'Itri</p>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<a href="https://nsf.gov"><img src="img/nsf-logo.png" class="img-fluid" alt="logo of NSF"></a>
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://nsf.gov/awardsearch/showAward?AWD_ID=1652698"><h4>CAREER: Stateless Network Functions: Building a Better Network Through Disaggregation</a></h3>
<p><strong>Role:</strong> PI (sole)</p>
<p><strong>Dates:</strong> 2017-2023</p>
<p><strong>Award:</strong> $627,999</p>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<div class="col-xs-3">
<img src="img/nsf-vmware-logo2.png" class="img-fluid">
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1700527">SDI-CSCS: S2OS - Enabling Infrastructure-Wide Programmable Security with SDI</a></h3>
<p><strong>Role:</strong> co-PI</p>
<p><strong>Collaborators:</strong> Guofei Gu (PI), Hongxin Hu, Zhiqiang Lin, Don Porter</p>
<p><strong>Dates:</strong> 2017-2021</p>
<p><strong>Award:</strong> $3M (total) $599,489 (Colorado)</p>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<div class="col-xs-3">
<img src="img/nsf-logo.png" alt="" class="img-fluid">
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1660680">I-Corps: Elastic Network Infrastructure</a></h3>
<p><strong>Role:</strong> PI</p>
<p><strong>2016-2018</strong></p>
<p><strong>$50,000 (total)</strong></p>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<div class="col-xs-3">
<img src="img/nsf-logo.png" alt="" class="img-fluid">
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1406192">TWC: Medium: Active Security</a></h3>
<p><strong>Role:</strong> PI</p>
<p><strong>Collaborators:</strong> Adam Aviv, Jonathan M. Smith</p>
<p><strong>2014-2018</strong></p>
<p><strong>$1.2M (total), $746,537 (Colorado)</strong></p>
</div>
</div>
</div>
</div>
<div class="row">
<div class="col-lg-7 col-md-10 mx-auto funding-past-item">
<div class="row">
<div class="col-xs-3">
<img src="img/nsf-logo.png" alt="" class="img-fluid">
</div>
<div class="col-xs-9 funding-past-item-description">
<h3><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1337399">XPS: SDA: Elasticizing the Linux Operating System for the Cloud</a></h3>
<p><strong>Role:</strong> co-PI</p>
<p><strong>Collaborators:</strong> Richard Han (Colorado)</p>
<p><strong>2013-2018</strong></p>
<p><strong>$749,992</strong></p>
</div>
</div>
</div>