EECS researchers develop, verify, and field high assurance information systems. Expertise includes theoretical modeling, synthesis and verification, security modeling and analysis, network and database security. Additionally, researchers explore user privacy and security issues in centralized, distributed, and Web environments. Expanding leading-edge cyber security and defense mechanisms earned EECS a federal National Center of Academic Excellence in Information Assurance Education designation.

Students at work

Program Objectives

  • Understand the cryptographic foundations of information security.
  • Understand and able to employ common encryption/decryption protocols.
  • Understand the fundamental principles, models and algorithms in information and systems security.
  • Understand the risks, vulnerabilities, threats, and attacks in computer and communications systems.
  • Understand the state-of-art protection and defense mechanisms, and the theoretical foundations behind the mechanisms.
  • Understand the theories, principles, and state-of-art practices on dependably and fault-tolerant systems.
  • Understand user privacy issues and protection mechanisms, in centralized, distributed, and Web environments.

Associated Faculty

Perry Alexander
AT&T Foundation Distinguished Professor of Electrical Engineering and Computer Science
Director of the Institute for Information Sciences
 Perry Alexander's Website
 2022 Eaton Hall

Primary Research Interests

  • Formal Methods, Verification, and Synthesis
  • Trusted Computing
  • System-Level Design Languages and Semantics
  • Specification Languages

Alexandru Bardas
Associate Professor
 Alexandru Bardas's Website
 2040 Eaton Hall

Primary Research Interests

  • Cybersecurity from a systems perspective
  • Moving target defenses
  • Enterprise network security
  • Bringing social sciences into cybersecurity

Drew Davidson

Primary Research Interests

  • Security
  • Privacy
  • Secure Design
  • Mobile and Embedded Software
  • Program Analysis

Joseph Evans
Distinguished Professor Emeritus
 Joseph Evan's Website

Primary Research Interests

  • High-Performance Networks
  • Mobile Networking and Wireless Systems
  • Pervasive Computing Systems
  • System Implementations

Jerzy Grzymala-Busse

Primary Research Interests

  • Data mining
  • Knowledge discovery
  • Machine learning
  • Expert systems
  • Reasoning under uncertainty
  • Rough set theory

Tamzidul Hoque

Primary Research Interests

  • Hardware Trust Verification
  • Hardware IP protection from piracy and reverse engineering
  • CAD tool development for hardware security and trust

Fengjun Li
 Fengjun Li's website
 2018 Eaton Hall

Primary Research Interests

  • IoT Security and privacy
  • Adversarial Machine Learning
  • Social network privacy
  • Network security
  • Secure data sharing and publishing

Bo Luo
 Bo Luo's Website
 2044 Eaton Hall

Primary Research Interests

  • Information security and privacy, database security
  • Information retrieval, Web and online social networks
  • Security and privacy issues in smart grid systems
  • XML and conventional database systems, data management

Gary Minden

Primary Research Interests

  • Digital systems
  • Microprocessors
  • Embedded Systems

Hossein Saiedian

Primary Research Interests

  • Software architecture
  • Formal methods in software engineering
  • Cybersecurity and information assurance
  • Secure software engineering
  • Software process and project management
  • Software engineering education

Associated Facilities

  • SELinux installation
  • Virtualization environment
  • SAL, PVS, and Isabelle verification tools and expertise
  • Rosetta specification and analysis capabilities
  • Computational cluster with over 1,000 processors connected to 37 TB of on-line storage

Core Coursework (MS)


Elective Coursework (MS)