{"id":180,"date":"2019-03-24T17:58:56","date_gmt":"2019-03-24T21:58:56","guid":{"rendered":"https:\/\/carleton.ca\/cybersea\/?page_id=180"},"modified":"2026-01-26T10:41:48","modified_gmt":"2026-01-26T15:41:48","slug":"research","status":"publish","type":"page","link":"https:\/\/carleton.ca\/cybersea\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<section class=\"w-screen px-6 cu-section cu-section--white ml-offset-center md:px-8 lg:px-14\">\n    <div class=\"space-y-6 cu-max-w-child-5xl  md:space-y-10 cu-prose-first-last\">\n\n            <div class=\"cu-textmedia flex flex-col lg:flex-row mx-auto gap-6 md:gap-10 my-6 md:my-12 first:mt-0 max-w-5xl\">\n        <div class=\"justify-start cu-textmedia-content cu-prose-first-last\" style=\"flex: 0 0 100%;\">\n            <header class=\"font-light prose-xl cu-pageheader md:prose-2xl cu-component-updated cu-prose-first-last\">\n                                    <h1 class=\"cu-prose-first-last font-semibold !mt-2 mb-4 md:mb-6 relative after:absolute after:h-px after:bottom-0 after:bg-cu-red after:left-px text-3xl md:text-4xl lg:text-5xl lg:leading-[3.5rem] pb-5 after:w-10 text-cu-black-700 not-prose\">\n                        Research\n                    <\/h1>\n                \n                                \n                            <\/header>\n\n                    <\/div>\n\n            <\/div>\n\n    <\/div>\n<\/section>\n\n<p>The Cyber Security Evaluation and Assurance (CyberSEA) Research Lab conducts advanced academic research to develop&nbsp;systematic and rigorous approaches for evaluating and assuring the cyber security of software-dependent systems.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"900\" src=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1.png\" alt=\"CyberSEA Research Overview\" class=\"wp-image-1669\" srcset=\"https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1.png 1600w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-160x90.png 160w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-240x135.png 240w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-768x432.png 768w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-400x225.png 400w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-1536x864.png 1536w, https:\/\/carleton.ca\/cybersea\/wp-content\/uploads\/sites\/191\/Image-Research-1600x900-1-360x203.png 360w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 id=\"research-overview\" class=\"wp-block-heading\">Research Overview<\/h2>\n\n\n\n<p>There is an ever-growing need to assure the security of critical software-dependent systems, and the information that they use, store, and communicate, in the face of cyber-attacks and failures. As systems grow larger and more complex they invariably become more susceptible to an array of unforeseen security vulnerabilities. Security should therefore be considered at all stages of their development. The current approach of having security retrofitted or &#8220;bolted-on&#8221; to the systems that we build is not sufficient. Instead, we need to consider the increasingly critical security requirements for these systems and design them with security &#8220;baked-in&#8221; so that the evidentiary basis for security assurance can be generated and reasoned about alongside the system it supports. This presents a range of complex challenges.<\/p>\n\n\n\n<p>The CyberSEA Research Lab is motivated by the need for the advancement of rigorous and practical approaches to address increasingly critical issues in designing, implementing, evaluating, and assuring the safe, secure, and reliable operation of software-dependent systems. To this end, we conduct research that spans the areas of cyber security, software and security engineering, model-driven engineering, formal methods, and data-driven approaches. We explore new ideas, techniques, and tools that can support cybersecurity evaluation and assurance activities and advance security-by-design approaches leading to improved system security and higher system confidence.<\/p>\n\n\n\n<h3 id=\"areas-of-application\" class=\"wp-block-heading\">Areas of Application<\/h3>\n\n\n\n<p>We focus on applying these approaches in a variety of applications areas including, but not limited to, critical infrastructure (e.g., maritime port systems and operations, smart energy grids\/infrastructures), industrial control systems, cyber-physical systems, IoT-based systems, AI\/ML-based systems, and more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Security Evaluation and Assurance (CyberSEA) Research Lab conducts advanced academic research to develop&nbsp;systematic and rigorous approaches for evaluating and assuring the cyber security of software-dependent systems. Research Overview There is an ever-growing need to assure the security of critical software-dependent systems, and the information that they use, store, and communicate, in the face [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_cu_dining_location_slug":"","footnotes":"","_links_to":"","_links_to_target":""},"cu_page_type":[],"class_list":["post-180","page","type-page","status-publish","hentry"],"acf":{"cu_post_thumbnail":false},"_links":{"self":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/comments?post=180"}],"version-history":[{"count":2,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/180\/revisions"}],"predecessor-version":[{"id":1671,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/pages\/180\/revisions\/1671"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/media?parent=180"}],"wp:term":[{"taxonomy":"cu_page_type","embeddable":true,"href":"https:\/\/carleton.ca\/cybersea\/wp-json\/wp\/v2\/cu_page_type?post=180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}