Category: College of Computing

Dr. Junqiao Qiu Awarded $174.8K NSF pre-CAREER Grant


Dr. Junqiao Qiu, Computer Science, has been awarded a two-year, $174,797 NSF pre-CAREER grant, which supports research independence among early-career academicians

The project is titled, “CRII: SHF: GPU-accelerated FSM computations with advanced speculation.”

Dr. Qiu’s research focuses on parallel computing, programming systems, and compiler optimization.

He is a member of the Scalable Architectures and Systems research group of the Institute of Computing and Cybersystems (ICC).

View the grant on the NSF website.


Abstract

Finite State Machine (FSM)-based computations have played critical roles in a variety of important applications, ranging from cyber security and data analytics to software engineering and hardware design. Due to the growing data volumes and limitations on computer processing power, nowadays FSM efficiency is greatly constrained, and a new dimension of efficiency optimization is desired. This project proposes a novel framework to enhance the computing efficiency of FSM-based computations on GPUs. The combination of GPU acceleration and speculative parallelization developed in the proposed framework shows promise for boosting performance of FSM computations and presents the potential to optimize even more general non-FSM computations.

This research investigates how to build up the synergy between highly-parallel GPU architectures and FSM computations. The key idea is exploring multiple dimensions of parallelism for increasing compute utilization as well as reducing data-movement overheads. Additionally, this research designs and integrates advanced speculative parallelization into FSM computations. The advanced speculative parallelization not only enables more effective predictors on different FSMs, it also provides efficient speculative-thread scheduling. All these optimizations will be built into a framework that further explores the trade-offs between different objectives and automatically optimizes application configurations based on the given objectives. Finally, this research seeks to enlarge the applicability of the envisioned results, and it brings the preliminary exploration about a new dimension of computing efficiency for irregular computations as well as applications associated with speculative parallelization.


Dr. Qiu’s lab has openings (RA/TA support) for self-motivated students who are interested in doing system research. For more information, please email Dr. Qiu at junqiaoq@mtu.edu.

Pursue a Cybersecurity Career with this Generous NSF CyberCorps Scholarship


Apply now for Michigan Tech’s 2021-22 cohort of Cybersecurity Scholars and jumpstart your cybersecurity career!

The deadline to apply is June 1, 2021.

This generous scholarship opportunity provides up to three years of tuition and annual stipend.

Then, following completion of your degree, you’ll work in a cybersecurity-related position for a federal, state, local, or tribal agency for up to three years– a period equal to the length of your scholarship.

See full guidelines, requirements, and application information on the SFS website: mtu.edu/sfs.


Eligible Degree Programs

  1. BS in Cybersecurity (CyS)
  2. BS in Computer Network and System Administration (CNSA)
  3. BS in Computer Science (CS)
  4. BS in Software Engineering (SE)
  5. BS in Computer Engineering (CpE)
  6. BS in Electrical Engineering (EE)
  7. BS in Management Information Systems (MIS)
  8. MS in Cybersecurity

Ready to apply? Visit mtu.edu/sfs

Questions? Email sfs@mtu.edu


The Michigan Tech SFS Program

The SFS program at Michigan Tech involves multiple programs and departments, including the College of Computing and its departments of Applied Computing and Computer Science; the College of Engineering’s Department of  Electrical and Computer Engineering; and the College of Business’s Management Information Systems B.S. program. 

“The U.S. is facing a significant shortage of well-trained and well-prepared cybersecurity professionals,” said Dr. Yu Cai, professor of applied computing and the principal investigator of the grant. “This new scholarship will continue to develop Michigan Tech’s national and international reputation as a leader and innovator in cybersecurity education, research and outreach activities.”

The five-year, $3.3 million NSF grant provides up to three years of full scholarship support for 20 Michigan Tech undergraduate and graduate students.


About the NSF Scholarship

Protecting worldwide digital infrastructure has become an urgent focus of industry and government. And employment in this sector is expected to grow exponentially in the coming years.

In response, the National Science Foundation CyberCorps: Scholarship for Service (SFS) program was introduced as a nationwide program to recruit and train the next generation of information technology professionals, industrial control system security professionals, and security managers.

Start Your Cybersecurity Career with this Generous CyberCorps Scholarship


Apply now for Michigan Tech’s 2021-22 cohort of Cybersecurity Scholars and jumpstart your cybersecurity career!

The deadline to apply is June 1, 2021.

This generous scholarship opportunity provides up to three years of tuition and annual stipend.

Then, following completion of your degree, you’ll work in a cybersecurity-related position for a federal, state, local, or tribal agency for up to three years– a period equal to the length of your scholarship.

See full guidelines, requirements, and application information on the SFS website: mtu.edu/sfs.


Eligible Degree Programs

  1. BS in Cybersecurity (CyS)
  2. BS in Computer Network and System Administration (CNSA)
  3. BS in Computer Science (CS)
  4. BS in Software Engineering (SE)
  5. BS in Computer Engineering (CpE)
  6. BS in Electrical Engineering (EE)
  7. BS in Management Information Systems (MIS)
  8. MS in Cybersecurity

Ready to apply? Visit mtu.edu/sfs

Questions? Email sfs@mtu.edu


The Michigan Tech SFS Program

The SFS program at Michigan Tech involves multiple programs and departments, including the College of Computing and its departments of Applied Computing and Computer Science; the College of Engineering’s Department of  Electrical and Computer Engineering; and the College of Business’s Management Information Systems B.S. program. 

“The U.S. is facing a significant shortage of well-trained and well-prepared cybersecurity professionals,” said Dr. Yu Cai, professor of applied computing and the principal investigator of the grant. “This new scholarship will continue to develop Michigan Tech’s national and international reputation as a leader and innovator in cybersecurity education, research and outreach activities.”

The five-year, $3.3 million NSF grant provides up to three years of full scholarship support for 20 Michigan Tech undergraduate and graduate students.


About the NSF Scholarship

Protecting worldwide digital infrastructure has become an urgent focus of industry and government. And employment in this sector is expected to grow exponentially in the coming years.

In response, the National Science Foundation CyberCorps: Scholarship for Service (SFS) program was introduced as a nationwide program to recruit and train the next generation of information technology professionals, industrial control system security professionals, and security managers.

Conference on Applied Cryptography: Call for Participation


The 2021 EAI International Conference on Applied Cryptography in Computer and Communications (AC3 2021) takes place May 15-16, 2021.

Register for the virtual conference here.

Dr. Bo Chen, Computer Science, founding general chair of the new EAI conference, says the conference has brought together researchers, developers and practitioners from around the world who will focus on, discuss, and explore the area of applied cryptography in computer and communication systems.

Conference Topics

Conference topics include all aspects of applied cryptography, including symmetric cryptography, public-key cryptography, cryptographic protocols, cryptographic implementations, cryptographic standards and practices, as well as using cryptography to solve real-world problems.

Technical Program

The AC3 2021 technical program includes four main conference tracks at which 11 papers will be presented virtually in oral presentations.

  • Track 1 – Blockchain
  • Track 2 – Authentication
  • Track 3 – Secure Computation
  • 4 – Practical Crypto Application. Aside from the high-quality technical paper presentations, the technical program also features two keynote speeches, and one technical workshop.

Keynotes

The two keynote speeches will be delivered by Prof. Kui Ren (ACM Fellow, IEEE Fellow), Zhejiang University, China; and IEEE Fellow Prof. Robert Deng, Singapore Management University.

Workshop

A workshop, the First International Workshop on Security for Internet of Things (IOTS 2021), includes four technical papers which aim to develop cryptographic techniques for ensuring the IoT security. The conference, originally planned to be held in Xiamen China, was moved it online for the health and safety of participants.


Register to participate in the virtual conference here. Use the “Sign up for free access to the livestream” option.


European Alliance for Innovation (EAI) is an international professional community and a nonprofit organization. The goal of EAI is to empower the global ICT research and innovation community, and to promote cooperation between European and International ICT communities.

EAI Conferences span the globe with opportunities to meet, explore, and contribute to the world of ICT research. With 100+ annual events (including MobiQuitous, SecureComm, etc.), EAI is one of the world’s most prolific scientific communities.

EAI Conferences are published via Springer’s LNICST and EAI’s EUDL, and they are indexed in all leading indexing services, including EI, ISI, Scopus, CrossRef, Google Scholar, dblp, MAS, EBSCO, Microsoft Academic Search, CiteSeerX, and more.

Husky Innovate Students Win Top Prizes in New Venture Online Competition

by Husky Innovate

For the 11th year running, Central Michigan University and Michigan Tech collaborated to offer Tech students a chance to compete at CMU’s New Venture Competition. 2021 marked the second year the pitch competition was held online as the New Venture Online Competition (NVOC).

Despite the challenges of a pandemic and a virtual platform, our students persevered, honed their pitches and won top prizes. This year’s NVOC winners were also winners at the 2021 Bob Mark Business Model Pitch Competition held at Tech in January. All of their hard work and effort paid off!

Congratulations to this year’s MTU winners:

  • In the 2020-track 10-minute pitch category, Team Focus with Ranit Karmakar won the Best Overall Venture Award for $25,000. Watch Karmakar’s pitch.
  • In the two-minute pitch category, Team The Fitting Room with Jordan Craven won third place for $1,000. Watch Craven’s pitch.
  • Team Recirculate with Hunter Malinowski won an honorable mention award for $750. Watch Malinowski’s pitch.

Read more in the NVOC 2021 Booklet.

Jidong Xiao, Boise State University, to Present Talk May 12


Jidong Xiao, an assistant professor in the computer science department at Boise State University, will present a talk on Wednesday, May 12, at 3:00 p.m.

Dr. Xiao’s research focuses on computer security, especially computer system security and cloud security.

In his talk, “Identifying New Threats in Cloud Environments,” Dr. Xiao will present two research projects focusing on a concept called virtual machine extrospection and a new type of rootkit, which allows attackers to perform active or passive attacks in a nested virtualization environment.

Join the virtual talk here.

Talk Title

Identifying New Threats in Cloud Environments

Talk Abstract

Cloud computing has become prevalent over the past decade. While individuals and organizations rely on cloud computing more and more, various security problems in cloud platforms are discovered. In this talk, I will present two research projects. In the first project, I will present a concept called virtual machine extrospection, in which attackers or cloud customers collect sensitive information about the physical machine from within a virtual machine. In the second project, I will present a new type of rootkit, which allows attackers to perform active or passive attacks in a nested virtualization environment, and then I will describe our detection approach. At the end of the talk, I will briefly discuss my future research projects and plans.

Biography

Dr. Jidong Xiao is an assistant professor in the computer science department at Boise State University. His research focuses on computer security, especially computer system security and cloud security. He received his PhD degree in computer science from the College of William and Mary. Prior to joining Boise State University, he spent approximately 5 years in industry working at Intel and Symantec.

Dr. Xiao’s research was recognized in different venues, including publications that won the best paper award at the USENIX Large Installation System Administration Conference (LISA) 2015, won the distinguished poster award at the Network and Distributed System Security Symposium (NDSS) 2016, and won the best paper award nomination at the International Conference on Dependable Systems and Networks (DSN) 2020. Dr. Xiao has been awarded several grants by the NSF, NSA, and the Army Research Office (ARO).

Congratulations Class of 2021!

It has been a challenging academic year, to say the least. As part of the Class of 2021, you are an exceptional group of graduates. Your final academic year presented you with unforeseen and unprecedented challenges, yet you persevered.

We are all proud to have mentored, instructed, and supported you on your educational journey. We know you’ll do well. You are a Husky, after all!

Please stay in touch!

Nathir Rawashdeh Publishes Paper at SPIE Conference

Nathir Rawashdeh (AC) led the publication of a paper at the recent online SPIE Defense + Commercial Sensing / Autonomous Systems 2021 Conference.

The paper, entitled “Drivable path detection using CNN sensor fusion for autonomous driving in the snow,” targets the problem of drivable path detection in poor weather conditions including on snow-covered roads. The authors used artificial intelligence to perform camera, radar and LiDAR sensor fusion to detect a drivable path for a passenger car on snow-covered streets. A companion video is available. 

Co-authors include Jeremy Bos (ECE).