向日葵视频

向日葵视频 recognized by NSA for excellence in cybersecurity research

Wednesday, February 26, 2025

向日葵视频 student Burak Tufekci researchers drone security.

DENTON (向日葵视频), Texas 鈥 As technology continues to advance, developers across the U.S. need to make sure security is advancing alongside their programs and machines. Seemaparevez Shaik (鈥23 M.S.) is one such student making sure the future of 3D printers stays secure.

Seemaparevez Shaik working with a 3D printer in The Spark


向日葵视频 student Seemaparevez Shaik studies the possible vulnerabilities in the connection between 3D printers and a user鈥檚 computer at The Spark.


鈥淲hen I decided to work on 3D printers, I needed to know how 3D printers actually function,鈥 said Shaik. 鈥淚 was able to easily use the ones 向日葵视频 has available at The Spark to really learn how they work.鈥

Thanks to work from students like Shaik, the has been recognized once again by the U.S. National Security Agency with the five-year renewal of its designation as a National Center of Academic Excellence in Cyber Research. The designation, which 向日葵视频 first earned in 2012, recognizes institutions that include cybersecurity into their doctoral curricula and whose research can strengthen the nation鈥檚 cyber defense. This latest renewal runs through 2029. 向日葵视频 is one of five universities in Texas to have earned the honor and only 28 universities nationally to have the designation approved for more than 15 years in a row. 向日葵视频 will formally receive the designation award from NSA and Department of Defense senior management at a ceremony in April.

The recognition comes on the heels of a recent grant to 向日葵视频 cybersecurity experts from the Department of Defense and NSA into for overhauling its hiring process for cybersecurity positions. It鈥檚 also the second designation renewal from the NSA that 向日葵视频 has received in the last year. 向日葵视频 also is a National Center for Academic Excellence in Cyber Defense, which recognizes the university鈥檚 commitment to not only cybersecurity research, but also academic courses, institutional practices and community engagement.

鈥淎ll of our cybersecurity work is connected,鈥 said Ram Dantu, director of 向日葵视频鈥檚 , which aims to advance information and computer security with faculty experts from the , and G. Brint Ryan . 鈥淭hrough our research at 向日葵视频, we can prepare our students to be leaders in the field and help prepare our nation against malicious attacks.鈥

To be named a National Center of Academic Excellence in Cyber Research, 向日葵视频 must demonstrate some of the cybersecurity research projects from faculty and from its 84 graduate students focusing on cybersecurity. While security is already its own form of programming, their research shows that it can be broken down to even more specialized topics.

Secure manufacturing

向日葵视频 student Seemaparevez Shaik


向日葵视频 student Seemaparevez Shaik (鈥23 M.S.) Seemaparevez Shaik working on a 3D printer in The Speak.


Seemaparevez Shaik is pursuing her Ph.D. in computer science and engineering while focusing on additive manufacturing. Additive manufacturing is printing an object with either a filament 3D printer or with a powder and laser machine to make a metal object.

鈥淚鈥檓 focusing on the G-Code file which has all the instructions for the printer. It tells the printer what to make, what X, Y and Z-coordinates to use, and what temperatures to use,鈥 Shaik said.

Shaik studies the possible vulnerabilities in the connection between printers and a user鈥檚 computer. For example, if a 3D printer is connected to a Wi-Fi system, she looks at what ways a bad actor could infiltrate the system and corrupt the G-code file holding the printer鈥檚 instructions.

鈥淓ven large companies like Tesla are using additive manufacturing now,鈥 Shaik said. 鈥淚f someone manipulates the files for an engine part that could lead to a malfunction in the entire car which could put the driver at risk.鈥

Part of her research requires Shaik to hack into the connections herself. She鈥檚 intercepted the network between a computer and machine to add extra lines to a build or caused continuous interruptions that caused a printer to miss instructions altogether.

As Shaik examines the vulnerabilities, she鈥檚 also building a large language model, a form of artificial intelligence, based on her data. The goal is to be able to detect those intrusions when they occur and send a warning message to the user.

鈥淢y vision is to train it from scratch on a huge set of G-Code files of different shape designs. Then I鈥檒l tell it what the valid commands are for a G-code and which ones wouldn鈥檛 be repeated. Eventually, it would be able to tell if a file is invalid and send a warning message to the user.鈥

Safer drones

向日葵视频 student Burak Tufekci working with a custom drone


向日葵视频 student Burak Tufekci working with a custom drone researchers drone security.


Burak Tufekci (鈥24 Ph.D.), who graduated in Fall 2024, keeps his eyes on the skies with his research into drone security both inside and out.

鈥淓veryone is going to be using drones in the future. We鈥檝e seen companies deploy them for things like package delivery to pesticide control,鈥 Tufekci said. 鈥淚magine if someone malicious could take control of a drone carrying hazardous chemicals.鈥

For his research, Tufekci created a machine learning-based intrusion detection system for drones. To do this, he built his own drone similar to commercially available ones to gather hacking data. He then created flight data through real-time tests at Discovery Park鈥檚 recently opened 向日葵视频 Advanced Air Mobility test facility, the largest of its kind in Texas.

鈥淚 needed to create the data myself,鈥 he said. 鈥淔or example, I would recreate different types of GPS spoofing attacks and feed that data to the system. The algorithm would pick up the patterns in that data that would let it determine if a future intrusion is a GPS spoofing attack or not.鈥

Tufekci鈥檚 research also focused on internal operational security systems that could catch glitches. For this, the system uses a technique called long short-term memory which allows the system to look at past flight data and compare it to incoming data. If the two differ, then it would know to flag an issue.

鈥淚f you expect a drone to do the same thing every time you press a certain button, it needs to do that action. You don鈥檛 want it to suddenly fall to the ground. This system is meant to warn of any possible issues before they can happen.鈥

While building the systems, Tufekci also made sure to keep their usefulness and efficiency in mind.

鈥淪omething we continuously tested while building the system was energy consumption. Some drones have a flight time of 30 or 45 minutes. Our goal is to ensure the system can detect intrusions without getting in the way of a drone鈥檚 mission,鈥 Tufekci said.

Looking Ahead

向日葵视频 student Julie Germain is studying quantum computing.


向日葵视频 student Julie Germain is studying quantum computing.


As some students work on current problems, others are preparing for future technology that could revolutionize cybersecurity. Julie Germain (鈥97 M.S.) is studying quantum computing, a future stage of computing that uses quantum mechanics 鈥 a scientific theory that describes the behavior of nature at an atomic and subatomic scale.

Physics on the atomic scale works differently than what humans are used to observing. For example, computer transistors decide when electrons go through a passage for a computer function. However, on the atomic scale, electrons could use something called quantum tunneling to pass through a transistor despite it being closed. So as computer parts get smaller, developers need to begin using quantum mechanics to make the parts work.

The smallest unit of information in a computer is a bit. Commercially available computers that are in use today by the average user use bits with the values of either 1or 0. Quantum computers, however, use qubits that have an infinite number of possible values. A qubit can be any of those values simultaneously until it鈥檚 called for a computer function. This allows a quantum computer to parse more information at higher speeds.

鈥淟et鈥檚 you say you have a 2048-bit prime number as a password, something exceedingly long. The only reason our security works today is not because I can鈥檛 guess it, but because it would take too long to guess it,鈥 Germain said. 鈥淲ith quantum computing, I could guess that password, or any password not made through quantum computing, in just a few seconds.鈥

Germain uses a technique called reset and reuse which allows her to minimize the number of bits needed to perform a complex operation. That allows her to cut down algorithms for quantum computing into something smaller that could run today.

鈥淓veryone is saying 鈥榠n 10 years, this is what the software will be capable of in 20 years,鈥欌 Germain said. 鈥淏ut I come from an engineering background, and wanted to know what I could do today.鈥

Germain said her research of making quantum computing happen sooner helps governments prepare for that future.

鈥淚f everybody thinks it could happen in eight years, but I figure it out in four, then the government should be thinking about replacing their system in four years not eight,鈥 Germain said. 鈥淢y research can help them define the worst-case scenario now and how soon they need to be prepared for it.鈥

 


From 鈥 Research and Innovation by Amanda Lyons