National Science Foundation (NSF): Secure and Trustworthy Cyberspace (SaTC) - FY 2025
Agency: | U.S. National Science Foundation |
---|---|
CFDA: | 47.041, 47.049, 47.070, 47.075, 47.076 |
Federal FON: | 24-504 |
Office: | Directorate for Computer and Information Science and Engineering Division of Computer and Network Systems Division of Computing and Communication Foundations Division of Information and Intelligent Systems Office of Advanced Cyberinfrastructure Directorate for Social, Behavioral and Economic Sciences Division of Social and Economic Sciences Division of Behavioral and Cognitive Sciences Directorate for Mathematical and Physical Sciences Division of Mathematical Sciences Directorate for STEM Education Division of Graduate Education Directorate for Engineering Division of Electrical, Communications and Cyber Systems |
Multipart Grant: | No |
Next Due: | Rolling |
---|---|
Solicitation Date: | Rolling |
Match Required: | No |
Actual Funds: | $69,000,000 (Estimated) |
Number of Awards: | 90 (Estimated) |
Summary:
The purpose of this program is to support fundamentally new, principled approaches to protecting and defending cyberspace against harmful actions by determined adversaries, and to assess their effectiveness. This program also seeks to explore innovative approaches for growing a capable, next-generation cyber workforce, and for accelerating the transition of successful cybersecurity research into practice and useful products and services.
The goals of this program align with the National Science and Technology Council’s (NSTC's) Federal Cybersecurity Research and Development Strategic Plan (RDSP) and National Privacy Research Strategy (NPRS) to protect and preserve the growing social and economic benefits of cyber systems while ensuring security and privacy. In alignment with the objectives in both strategic plans, this program takes a multidisciplinary, comprehensive, and holistic approach to cybersecurity research, development, and education, and encourages the transition of promising research ideas into practice.
This program welcomes proposals that address cybersecurity and privacy, and draw on expertise in one or more of the following areas: computing, communication, and information sciences; engineering; education; mathematics; statistics; and social, behavioral, and economic sciences. Proposals may advance the field of cybersecurity and privacy within a single discipline or involve interdisciplinary efforts that span multiple disciplines.
Proposals must align with one of the following designations:
- Core research (CORE): this designation is the main focus of this program
- Education (EDU): proposals under this designation must be focused on cybersecurity and privacy education and training
- Transition to practice (TTP): proposals under this designation must be focused exclusively on transitioning existing research results to practice
For CORE-designated projects, this program focuses only on research directly supporting a safe, secure, resilient, and trustworthy cyberspace conducted ethically with the highest scientific standards. Of special interest are projects that are transformative, forward-looking, and offer innovative or clean-slate approaches that provide defenders a distinct advantage. Refer to pages 12-14 of the NOFA file for examples of specific research topics of interest for CORE projects.
In addition, CORE and TTP projects must fall under one of the following project classes:
- Small projects: projects that are well-suited to one or two investigators and at least one student and/or postdoctoral fellow
- Medium projects: projects that are well-suited to one or more investigators and several students or postdoctoral fellows
Medium projects with a lead or non-lead organization that primarily carries out research and education in computer science, computer engineering, information science, and/or other closely related fields must, by the time of award, have in place an approved Broadening Participation in Computing (BPC) plan, as detailed on page 16 of the NOFA file.
Program Office Notes:
The program officer confirmed the funding information is up to date for the current fiscal year.
The program officer confirmed proposals are currently accepted on a rolling basis.
The program officer confirmed the program materials are up to date for the current year.
Eligibility Notes:
Eligible applicants include:
- Institutions of higher education (IHEs), including two- and four-year IHEs and community colleges accredited in and having a campus located in the United States, acting on behalf of their faculty members
- Nonprofit, non-academic organizations, such as independent museums, observatories, research labs, professional societies, and similar organizations that are directly associated with educational or research activities
Minority-serving institutions (MSIs) are particularly encouraged to apply.
Collaborative proposals in which investigators from two or more organizations wish to collaborate on a unified project may be submitted.
There is no limit on the number of proposals each organization may submit.
Previously declined proposals may be resubmitted, but only after substantial revision.
An individual may participate as a PI, co-PI, or senior personnel on no more than four proposals, as follows:
- Two proposals designated as core research (CORE) projects
- One proposal designated as a transition to practice (TTP) project
- One proposal designated as an education (EDU) project
Federal agencies and federally funded research and development centers (FFRDCs) are generally not eligible to apply, except under exceptional circumstances and with prior funding agency approval.
Eligible Applicants:
Academic InstitutionsConsortia
Non Profits
Application Notes:
Proposals are accepted on a rolling basis and must be received by 5:00 p.m. applicant's local time.
The program officer confirmed proposals are currently accepted on a rolling basis.
Proposals must be submitted online at www.research.gov or www.ecivis.com/grants.gov. All collaborative proposals arranged as separate submissions from multiple organizations must be submitted via www.research.gov.
Proposals submitted via Research.gov must include:
- Single-copy documents
- Cover sheet
- Project summary (1 page max)
- Table of contents
- Project description (15 pages max)
- References cited
- Budget
- Budget justification (5 pages max)
- Subaward budget justification (if applicable; 5 pages max each)
- Facilities, equipment, and other resources
- Senior/key personnel documents
- Special information and supplementary documentation
Proposals submitted via Grants.gov must include:
- SF 424 (R&R)
- Project/performance site location(s)
- Research and related other project information
- Research and related budget
- R&R subaward budget attachment(s) (if applicable)
- NSF cover page
- NSF senior/key person profile (expanded)
- NSF deviation authorization (if applicable)
- NSF list of suggested reviewers or reviewers not to include (if applicable)
Refer to the NSF Proposal Guide or the NSF Grants.gov Guide for additional information on proposal formatting.
In addition to standard research proposals, applicants may submit other types of proposals to this program. Refer to pages 76-93 of the NSF Proposal Guide file for additional information regarding other types of proposals.
The following are required in order to submit an application:
- Unique Entity Identifier (UEI) number
- SAM (System for Award Management) registration
Applicants may obtain a UEI number and verify or renew SAM registration status at www.ecivis.com/sam.
All proposals will be evaluated according to the following merit review criteria:
- Intellectual merit
- Broader impacts
Proposals for multi-investigator medium projects will be evaluated according to the following additional criteria:
- Extent to which the project scope justifies the level of investment requested, and the degree to which the collaboration plan adequately demonstrates that the participating investigators will work synergistically to accomplish the project objectives
- Whether key personnel, and especially lead PIs, have allocated adequate time for both their individual technical contributions and the leadership of collaborative activities necessary to realize the synergistic effects of larger-scale research
Proposals for TTP projects will be evaluated according to the following additional criteria:
- Degree to which the project plan addresses system development milestones and an evaluation plan for the working system
- Degree to which a target user group or organization that will serve as an early adopter of the technology is identified
- Deployment plan for implementing the capability or prototype system into an operational environment
- Novelty of the intended system, software, or architecture
- Composition of the project team, which should demonstrate not only technical expertise but also skills in project management and systems development
- Appropriateness of the budget for the effort
- Extent of collaboration with the university technology transfer office (TTO) or similar organization from the PI's institution
Refer to the NOFA file, the NSF Proposal Guide, and the NSF Grants.gov Guide for additional application information.
Match Required: | No |
---|---|
Actual Funds: | $69,000,000 (Estimated) |
Number of Awards: | 90 (Estimated) |
---|
Match Notes:
Matching funds are not required for this program. Inclusion of voluntary committed cost sharing in the proposal budget is prohibited; however, applicants may contribute voluntary uncommitted cost sharing.
Funding Notes:
An estimated total of $69 million is expected to be available per year to support approximately 90 awards through this program, as follows:
- Education (EDU) projects: Approximately 15 awards will be distributed to EDU projects. In general, EDU projects are limited to $400,000 in total budget with a duration of up to three years. Applicants for projects that demonstrate a collaboration between a cybersecurity subject matter expert and an education researcher may request up to $500,000 for three years.
- Small projects: Approximately 35 awards will be distributed to small projects. Small projects are limited to $600,000 in total budget with a duration of up to three years.
- Medium projects: Approximately 25 awards will be distributed to medium projects. Medium projects may range from $600,001 to $1.2 million in total budget with a duration of up to four years.
The program officer confirmed the funding information is up to date for the current fiscal year.
Applicants are discouraged from seeking project start dates between July 2 and September 30 of a given year.
Award recipients may authorize a one-time extension of the award period of up to 12 months if additional time beyond the established end date is required to assure adequate completion of the original scope of work within the funds already made available. If additional time beyond the extension is required and exceptional circumstances warrant, award recipients must submit a formal extension request to the funding agency.
Project budgets must include funding for one or more project representatives to attend the first principal investigator (PI) meeting held after the beginning of the award.
Core research (CORE) projects that meet one or more of the following criteria are discouraged:
- Projects that address a sole vulnerability or device without advancing security science or considering the broader consequences of the proposed remedy
- Projects that simply address quick fixes or ad-hoc solutions without much scientific merit
- Projects that involve research focused primarily on the design and development of offensive techniques for exploiting vulnerabilities of systems that could be harmful to the operation of existing cyberinfrastructure and/or at odds with ethical, legal, and diplomatic concerns and U.S. rules and regulations
In general, funding will not support:
- Technical assistance
- Pilot plant efforts
- Research requiring security classification
- Product development for commercial marketing
- Market research for a particular project or invention
- Biological research on mechanisms of disease in humans, biological research to develop animal models of such conditions, or the development or testing of procedures for their treatment
- Payment of fees
Examples of ineligible costs include:
- Entertainment
- Meals and coffee breaks
- Alcoholic beverages
- Rental of property owned by individuals or entities affiliated with National Science Foundation (NSF) award recipients for use as home office workspace
- Procuring or obtaining the equipment, services, or systems identified in section 889 of the National Defense Authorization Act (NDAA)
Contacts:
(See Contact Notes)
Agency Address
National Science Foundation
2415 Eisenhower Avenue
Alexandria, VA 22314
Contact Notes:
Questions should be directed to the appropriate program contact listed on pages 2-4 of the NOFA file.
Proposals must be submitted online at www.research.gov or www.ecivis.com/grants.gov.
The agency address provided is for reference purposes only.
Files:
NOFA File: US11080_NOFA_FY2025.pdf (944.4 Kb)Federal Forms:
NSF Grants.gov Guide (742.4 Kb)NSF Proposal Guide (2.9 Mb)
File Notes:
The NOFA file contains the full solicitation for this program. The NSF Proposal Guide and the NSF Grants.gov Guide are attached. Previous awards issued through NSF programs may be accessed online at www.nsf.gov/awardsearch.
The program officer confirmed the program materials are up to date for the current year.
Project: | SaTC:EDU: Transdisciplinary Cybersecurity for Law and Engineering Students (9.8 Mb) |
---|---|
Applicant: | Cleveland State University |
Summary: |
The purpose of this program is to support fundamentally new, principled approaches to protecting and defending cyberspace against harmful actions by determined adversaries, and to assess their effectiveness. Cleveland State University requested and received $397,826 to address the need for cybersecurity professionals to gain expertise across several domains to effectively manage diverse risks. Project activities include developing a modular curriculum that integrates technical and legal components into an existing cybersecurity curriculum; creating a set of recent real-life cybersecurity scenario-based laboratory exercises and assignments that could be adapted for use in teaching similar interdisciplinary courses; piloting the curriculum with a class of senior or graduate engineering and law students; and disseminating the lessons learned through presentation of research results and program components at industry and academic conferences and the resources created through a program web portal. |
Grant Keywords
National Science Foundation, Secure and Trustworthy Cyberspace, NSF, IHE, SaTC, computer network, database, private, privacy, at-risk, high-risk, risk assessment, evaluate, evaluation, cyber attack, cyberterrorism, corrupt, infiltrate, accessible, accessibility, vulnerable, vulnerability, intelligence analysis, software, tool, application, plug-in, open source, platform, encrypt, cryptography, code, programming language, HTML, algorithm, firewall, protective layer, framework, universities, postsecondary education, university, bachelor of science, BS, computer, connectivity, cyberspace, information science, information technology, interactive, internet, network, virtual reality, world wide web, online safety, hack, hacking, identity theft, identity protection, cyber crime, cybercrime, cyber criminal, cyber protection, cyber security, web, server, online shopping, online transaction, communication, communication privacy, denial of service, denial of service attack, DoS, DDoS, distributed denial of service, distributed denial of service attack, fraud, credit card fraud, CC fraud, cyber terrorism, data mining, malware, virus, trojan, phishing, spam, password, crack, cracking, access control, authentication, biometrics, cyber-physical systems, CPS, data science, forensics, formal methods, hardware, security architecture, security design, information trustworthiness, intrusion detection, language based security, mathematics, statistics, social network, social science, behavioral science, economic science, usability, human interaction, wired networking, wireless networking, Directorate for Computer and Information Science and Engineering, Division of Computer and Network Systems, Division of Computing and Communication Foundations, Division of Information and Intelligent Systems, Office of Advanced Cyberinfrastructure, Directorate for Social Behavioral and Economic Sciences, Division of Social and Economic Sciences, Division of Behavioral and Cognitive Sciences, Directorate for Mathematical and Physical Sciences, Division of Mathematical Sciences, Directorate for Engineering, Division of Electrical Communications and Cyber Systems, Directorate for Education and Human Resources, Division of Graduate Education, National Science and Technology Council, NSTC, Federal Cybersecurity Research and Development Strategic Plan, RDSP, National Privacy Research Strategy, NPRS, research methodology, sociology, psychology, economic, culture, cultural, information manipulation, information ecosystem, information integrity, societal resistance, truth decay, fake news, misinformation, disinformationGrant Categories
EducationInformation Technology/Telecommunications