Synchrony Fellowships

 Synchrony Fellowship Applications for Spring 2025 have been chosen

 

 

Meet Our Awarded Synchrony Fellowships For Spring 2025

What practical impact will your research eventually have?

The practical impact of my research on satellite-based Quantum Key Distribution (QKD) will be significant for enhancing secure communication networks, especially over long distances. By developing a robust satellite scheduling algorithm, my research aims to optimize the use of satellite resources for efficient and fair key distribution among ground stations. This will ensure that sensitive information can be transmitted securely between distant locations without favoring any single user or region.
In practical terms, this research will strengthen data security across critical sectors, including government, defense, finance, and healthcare, by enabling reliable, quantum-secured communication infrastructure. Additionally, the fairness-focused scheduling model I’m developing will support widespread adoption of QKD by reducing latency, minimizing resource conflicts, and ensuring equitable access to secure communication channels worldwide. Ultimately, the outcomes of this research could help lay the groundwork for an international quantum-secured network, providing a higher standard of privacy and resilience against cyber threats.

What do you think is the most pressing need for improving cybersecurity?

The most pressing need for improving cybersecurity, specifically addressed by my research, is developing an efficient and fair satellite scheduling algorithm for Quantum Key Distribution (QKD) systems. As quantum technology advances, secure, long-distance key distribution will be critical to protecting sensitive communications, especially over vast geographic distances where direct fiber connections are impractical.
My research tackles a core challenge: ensuring that satellite resources are used effectively and equitably, allowing ground stations to receive their cryptographic keys promptly without any one location monopolizing resources. By designing a scheduling system that maximizes resource utilization and minimizes wait times, we can create a more reliable and scalable QKD network. This will be foundational for establishing secure, quantum-safe communication channels on a global scale, which is essential for critical sectors such as finance, defense, and healthcare, ultimately raising the standard for cybersecurity in the quantum era.

Md. Zakir Hossain

My research (CTng) aims to create a practical and secure Public Key Infrastructure (PKI) that builds on the current Certificate Transparency (CT) ecosystem. By extending CT with a decentralized trust model and adding Byzantine fault tolerance, my work ensures that the system stays secure and reliable even if some parts fail or act maliciously. This approach addresses a key need in cybersecurity: reducing reliance on centralized trust, which can lead to single points of failure and increased vulnerability. By spreading trust across multiple entities, my research improves the security and resilience of PKI, helping create a safer digital environment.

Jie Kong

What practical impact will your research eventually have?

Our project aims to secure user’s location data in cellular network performance measurements by using Local Differential Privacy (LDP). LDP perturbs location data on the device before transmission, so real locations remain private, even if the server is compromised.  Additionally, machine learning techniques are employed to accurately estimate network performance from the perturbed data. By balancing privacy and measurement accuracy, network providers can gather the metrics they need to improve network quality without exposing user information, making cellular network measurements safer for users.

What do you think is the most pressing need for improving cybersecurity?

One pressing need in cybersecurity is to develop privacy-preserving data analysis frameworks. Many applications need high-quality data for accurate analytics but face constraints around user privacy, which makes LDP particularly promising. Integrating machine learning methods that work effectively within the LDP framework is essential to ensure that data remains useful while protecting user privacy.

Yawen Deng

Deng, Yawen Headshot

What practical impact will your research eventually have?

Our research on characterizing the security region of the GHOST protocol could have a significant impact on blockchain security, particularly in protocols like Ethereum that utilize GHOST. By establishing precise security boundaries under different tiebreaking rules, our work may guide protocol developers on whether and how GHOST can be safely deployed in environments with variable network conditions or adversarial presence. Insights from our study could contribute to making blockchains more resilient to attacks and encourage the adoption of tiebreaking mechanisms that enhance protocol security.

What do you think is the most pressing need for improving cybersecurity?

In blockchain, one pressing need is the development of consensus protocols that are both secure under a variety of adversarial conditions and adaptable to real-world network delays. As decentralized systems become more mainstream, the capability to maintain security without requiring perfect synchronization among nodes is critical. More generally, addressing security in distributed systems requires tools to handle adversarial behaviors, especially in network delays and block production, to ensure robust, secure operation even in the presence of potential protocol vulnerabilities.

Zahra Motaqy

What practical impact will your research eventually have?

Private Information Retrieval (PIR) enables users to access specific data from a server without disclosing what data they access. In healthcare, PIR lets doctors query sensitive medical records without revealing the precise information accessed. In advertising, companies can deliver targeted ads without knowing which user-specific data points drive the recommendations. My research aims to make PIR scalable for real-world applications, where large data volumes are common, while ensuring efficiency comparable to non-private systems.

What do you think is the most pressing need for improving cybersecurity?

In terms of Private Information Retrieval (PIR), there remains a significant gap between its potential and scalability. Most protocols are not yet efficient enough to compare with non-private real-world systems. I believe our primary goal should be to make secure systems as efficient as possible through ongoing research to ensure a seamless user experience. This would make secure systems—whether they provide secure computation or private information retrieval—the preferred choice for most daily tasks in the future.

Ali Arastehfard

Arastehfard, Ali Headshot

Meet Our Awarded Synchrony Fellowships From Fall 2024

What practical impact will your research eventually have?

QKD allows two parties to establish a shared secret key without the need for computational assumptions (unlike all classical public key systems).  However, there are several challenges that remain.  In particular, finding way's to improve performance of QKD systems, and better understanding their performance in a variety of noise scenarios.  Our work will potentially allow for more rapid key generation rates in the near future over various QKD-enabled systems and networks.

What do you think is the most pressing need for improving cybersecurity?

A quantum computer can solve certain mathematical problems significantly faster than current classical algorithms could. Many of the most commonly used cryptographic techniques rely on such mathematical concepts, making them secure under the assumption an adversary doesn't have a quantum computer. But as we make advances in Quantum Computing, this hypothetical scenario comes closer to being a reality. Quantum Key Distribution is a method to improve security, by using fundamental principles of quantum physics.

Trevor Thomas

What practical impact will your research eventually have?

My research will significantly enhance the security and reliability of Multi-agent Systems (MAS) in critical applications, such as power systems and microgrids, by introducing a unified resilient defense control strategy to mitigate severe risks posed by advanced cyber threats, including those enabled by quantum computers. This strategy will fortify MAS against sophisticated unbounded False Data Injection (FDI) and Denial of Service (DoS) attacks on control inputs, communication links etc., ensuring continuous and stable operation of critical infrastructure. By increasing resilience and adaptability, the research will help maintain the integrity and functionality of systems under adversarial conditions, with broad applicability across various engineering fields like smart grids, autonomous vehicle networks, and industrial automation. Additionally, the strategy will future-proof MAS against the emerging capabilities of quantum-enabled cyber-attacks, contributing to more reliable and efficient operations, reducing downtime and associated costs in critical applications. Overall, the practical impact of this research lies in creating more secure, reliable, and efficient MAS that can withstand current and future cyber threats, ensuring their safe integration into vital sectors.

What do you think is the most pressing need for improving cybersecurity?

The most pressing need for improving cybersecurity is the development and implementation of advanced, adaptive defense mechanisms that can effectively counter increasingly sophisticated and evolving cyber threats. As cyber-attacks become more complex and persistent, traditional security measures are often insufficient. There is a critical need for strategies that incorporate resilient control defense strategy, leveraging artificial intelligence and machine learning to anticipate and mitigate attacks before they cause significant damage. Furthermore, enhancing the security of communication networks, particularly in distributed systems like Multi-agent Systems (MAS), is essential to prevent breaches that exploit vulnerabilities in sparse communication structures. Another key aspect is the preparation for quantum-era threats, necessitating the adoption of quantum-resistant algorithms to protect against the immense computational power of future quantum computers. Additionally, fostering a culture of cybersecurity awareness and training among all stakeholders, from individuals to organizations, is vital to ensure proactive and informed responses to potential threats.

Mohamadamin Rajabinezhad

Rajabinezhad, Mohamadamin

What practical impact will your research eventually have?

With a focus on adversarial machine learning, we aim to explore the security vulnerabilities of machine learning models, enhance the robustness of them, and research towards safer and trustworthy AI applications.

What do you think is the most pressing need for improving cybersecurity?

Generally speaking, I believe the most pressing need is data safety. With the amount of data generated and stored daily, we need to make sure both the users and the servers are protected properly and the data is stored safely.

Nicole Meng

Meng, Nicole

What practical impact will your research eventually have?

Our research will significantly improve the privacy and security of users'
location data while measuring and monitoring cellular network performance. By
implementing the new Local Differential Privacy (LDP) framework that uses the
Staircase Randomized Response (SRR) mechanism, we ensure that users' sensitive
location information is well-protected. This means network providers can still gather
essential performance metrics to enhance network efficiency without compromising
user privacy. The practical impact of this research is twofold: users will enjoy better
cellular network service quality without privacy concerns, and network providers,
regulators, and content providers can continue to rely on accurate, privacy-preserving
data for optimizing network performance and tailoring services. This research
ultimately bridges the gap between efficient network measurement and robust user
privacy.

What do you think is the most pressing need for improving cybersecurity?

The most pressing need for improving cybersecurity is the enhancement of
proactive threat detection and response capabilities. This involves leveraging advanced
technologies such as machine learning and artificial intelligence to detect threats in real
time, employing behavioral analytics to identify unusual activities, and implementing
automated response systems to mitigate damage swiftly. Additionally, it requires robust
education and training programs to reduce human error, fostering collaboration and
information sharing between organizations and sectors, and adopting stringent security
policies and standards. Securing emerging technologies like IoT and cloud services is
also crucial, along with ongoing investment in research and development to stay ahead
of evolving cyber threats. By addressing these areas, we can build a more resilient and
secure cyber environment.

Md Mahbub Hasan

Hasan, Mahbub

What practical impact will your research eventually have?

My research primarily focuses on the security aspects of large language models (LLMs). I seek to identify and mitigate potential vulnerabilities in these models to ensure they are robust against various types of threats and attacks. This contributes significantly to the trustworthiness and safety of AI systems in practical applications.

What do you think is the most pressing need for improving cybersecurity?

In terms of enhancing security for LLMs, it's essential to develop methods that secure these models from adversarial attacks, data poisoning, and other emerging threats. As these models become integral to more applications, ensuring their integrity and preventing misuse becomes increasingly important for the overall security landscape.

Shenao Yan

Fall 2024 Awards

Spring 2024 Awards