Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.


The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

The opinions, findings, and conclusions or recommendations expressed are those of the Center author(s) and do not necessarily reflect the views of the National Science Foundation.

Center Overview

The Security and Software Engineering Research Center (S2ERC) conducts research on cybersecurity, software security, system security, and software engineering problems to enable technology gains.

Advances in software engineering are of critical importance not only to the technical capabilities and performance of the software product, but also for the development process of systems such as missile guidance, fire control, radar, satellites, navigation, GPS, sensors, communications, computer-aided medical diagnostics, and robotics. A part of these advances is the element of security, which has been a challenge, with billions of dollars lost every year to security attacks. Making secure and reliable software and systems with limited resources is difficult. Though software has been a problem-solving tool for six decades, there still is no "best" approach for the timely and cost-effective construction of software that is reliably secure.

Researchers in security and software engineering face many important issues as they engineer security-critical systems. To survive and prosper, U.S. companies must improve security, enhance the software engineering discipline, improve techniques for building software to drive their businesses, reduce infrastructure and vulnerabilities - including security and privacy breaches - and hire trained security analysts and software engineers. S2ERC has been designed to address these ongoing and increasingly complex needs.


  • Ball State University
  • Georgetown University
  • University of Texas, Dallas
  • Virginia Polytechnic Institute and State University
View Center Website

Center Personnel

Michelle Brown
Center Coordinator
+1 765 285 2795

Eric Burger
Center Staff
+1 202 625 0100

Eric Wong
Center Co-director
+1 972 883 6619

Shaoen Wu
Center Director
+1 765 285 8658

Tapio Frantti
Center Co-director
+358 40 5470819

T. Charles Clancy
Center Staff
+1 540 231 5281

Ophir Frieder
Center Co-director
+1 312 543 6508

Christine Callsen
Center Staff Virginia Tech)
+1 571 858 3342

Clare Sullivan
Managing Director Georgetown)
+1 443 534 8980

Ehren Hill
Center Staff Virginia Tech)
+1 202 679 5955

Research Focus

The two primary research directions of S2ERC are security and software engineering. Recent research projects have focused on these issues:

  • Ad hoc network security.
  • Attack-tolerant systems.
  • Big Data analytics.
  • Cyber-physical systems.
  • Cyberthreat intelligence sharing.
  • Data leak prevention.
  • Dynamic and static analyses.
  • Embedded systems security.
  • Functional encryption.
  • Global software development.
  • Hardware security.
  • High-assurance software.
  • Information protection.
  • Interactive collaborative environments.
  • Intrusion detection.
  • Malware detection.
  • Migrating software to multicore architecture.
  • Network forensics.
  • Physical unclonable function-based mobile authentication.
  • Requirements capturing.
  • Security and vulnerability analyses.
  • Security test beds.
  • Software analytics.
  • Software design.
  • Software feature analysis.
  • Software metrics.
  • Software reliability.
  • Software safety.
  • Systems security and integrity.
  • Software testing.
  • Testing and model checking for concurrent programs.
  • Trustworthiness in cloud and mobile applications.
  • Usability issues.
  • User authentication.
  • User-interface design.
  • Visualization and cyber-situational awareness.
  • Visualization environments.
  • Voice- and video-over IP.
  • Wireless security.