Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

NSA Seeks Best Cybersecurity Research Papers in New Competition

NSA Announces 2013 “Best Scientific Cybersecurity Paper” Competition

Despite being under fire for its highly controversial global surveillance programs, the National Security Agency (NSA) is calling upon the public to submit papers to help it make discoveries to support its intelligence initiatives.

NSA Announces 2013 “Best Scientific Cybersecurity Paper” Competition

Despite being under fire for its highly controversial global surveillance programs, the National Security Agency (NSA) is calling upon the public to submit papers to help it make discoveries to support its intelligence initiatives.

The NSA announced on Monday that it is seeking nominations for its 2013 Annual Best Scientific Cybersecurity Paper Competition, and is looking for scientific papers that were published between October 1, 2012, and December 31, 2013, that show an outstanding contribution to cybersecurity science.

“The competition was created to stimulate research toward the development of systems that are resilient to cyber attacks,” the NSA explained. “Entries are judged on scientific merit, the strength and significance of the work reported, and the degree to which the papers exemplify how to perform and report scientific research in cybersecurity.”

National Security AgencyWhile the nation’s iconic spy agency is looking for ways to develop systems “resilient to cyber attacks”, such research can also be used to help identify security gaps that both domestic and foreign intelligence targets may be vulnerable to.

As an agency tasked with identifying emerging threats to U.S. national security, the NSA is looking for discoveries that enable it to “achieve and sustain intelligence advances” against immediate and emerging threats to U.S. national security.

“This competition supports the greater NSA mission to strengthen and protect cyber space for our nation,” said Dr. Michael Wertheimer, NSA Director of Research. “It offers a great opportunity to share scientific methods and it was a remarkable success in its first year.”

Nominations will be reviewed by a panel of experts from institutions including In-Q-Tel, the Naval Research Laboratory, Goldman Sachs, Microsoft, and others.

More information, including eligibility criteria, nomination procedures, criteria for judging and nomination forms are available here.

The competition is open to the public and is not limited to U.S. citizens. If a paper includes a reviewer as a co-author it may not be considered for an award, the NSA said.

The deadline for nominations is March 31, 2014 and winners will be publicly announced on August 1, 2014.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Vulnerabilities

A high-severity format string vulnerability in F5 BIG-IP can be exploited to cause a DoS condition and potentially execute arbitrary code.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.