Research

At WPI, Cybersecurity is a top-level research pillar for the university. Drawing on engineering, computer science, social sciences, management, and other disciplines, the program’s researchers work together to address today’s most critical threats in computer and network security, exploring and developing preemptive measures, comprehensive solutions, and ongoing safeguards.

Current research areas include software security, analysis of security policies and protocols, network security, embedded system security, cyber-physical system security, cryptography, and online privacy.

Research Groups

Faculty and students are encouraged to join one of WPI’s Cybersecurity research groups:

  • The Cake Lab explores various problems related to security and applied logic, including research on privacy, network security, software engineering, software verification, security, and programming languages.
  • The Vernam Group researches hardware security and the consequences of hardware vulnerabilities to the future of computing, from the cloud to the Internet of Things. Topics cover secure system software, innovations in cryptography including post-quantum cryptography and lightweight cryptography, machine learning applications of security, hardware security of FPGA and SoCs, side-channel analysis and fault attacks, physical tamper resistance, solutions for Trojan detection and anti-counterfeiting, and much more.

Faculty Research

Take a look at several faculty videos. Click on the menu in the upper right hand corner of the video box to see all available experts.

WPI Designated as Center of Excellence in Cybersecurity Research

WPI has been recognized as an NSA/DHS Center of Excellence in Information Assurance Research. This recognition is a testament to the diverse and extensive research and other academic efforts by our security-related faculty.

How Websites Leak Your Personal Information

WPI Professor Craig Wills is an authority on online privacy, proving that social networking sites leak personal information to third-party advertising sites, giving these sites the ability to connect our browsing behavior with our real-world identities.