Naval Postgraduate School
Calendar | Directory
banner
CS Department Research Labs

CS Department Labs

Robotics and autonomous coordination lab

The Robotics and Autonomous Coordination Lab provides the majority of academic computing needs of the Autonomous Systems track in CS. The lab is used for teaching and research in the development of autonomous systems which self-organize towards a mission goal.

Cross-disciplinary work with ME and EE robotics projects may also be supported by providing asset for studying autonomous behavior control where other ME/EE labs provide hardware and systems platforms.

For more information, please contact Professor Martell.

Introductory PC Network Lab

This lab provides facilities for instruction in introductory network topics. The required equipment allows students to implement campus- and enterprise-like networks. While the majority of students taking the course this lab primarily serves are from CS, there are usually a small number from other related disciplines each section.

For more information, please contact Professors Xie or Gibson.

Introductory Computer Security Lab

This lab is primarily used by the Center for Information Security Studies and Research (CISR). The lab consists of a virtual infrastructure of clients and servers serving the needs of multiple CS department classes such as:

  • The studies of information assurance, computer security, high assurance system architecture and authentication where it is used to introduce students to studies in high assurance systems, public key infrastructure, mandatory access control, viruses, covert channels and the reference monitor concept.
  • The security manager's view of diverse management concerns associated with administering and operating an automated information system facility with minimized risk. Also used in certifying that students have met the requirements for educational standards published by the Committee on National Security Systems (CNSS).
  • The fundamentals of computer forensics in the context of DoN/DoD information operations. Students examine how information is stored and how it may be deliberately hidden and/or subverted.
  • The basis for understanding the potential vulnerabilities in networked systems by applying a problem-solving approach to obtain information about a remote network and exploit or subvert those systems using various techniques and tools along with discussing vulnerability discovery and mitigation.

Students taking the course this lab primarily serves are from multiple departments across campus.For more information, please contact Professors Cote, or Clark.

Computer Information Security (CISR) Lab

This lab is primarily used by the Center for Information Security Studies and Research (CISR). The lab consists of a virtual infrastructure of clients and servers to allow the student to study network vulnerabilities, intrusion detection, secure system management and computer forensics; where tools used by administrators and hackers can be freely researched and studied. Students are given full administrator privileges on virtual machines so that multiple operating systems and tools can provide a basis for understanding the potential vulnerabilities and their mitigation in networked systems by studying methods to: (1) obtain information about a remote network, (2) to possibly exploit or subvert systems residing on that network and (3) techniques to mitigate risks to networked systems.

For more information, please contact Professors Cote or Clark.

Cyber Studies Lab

This TR computer lab is primarily used by the Center for Information Security Studies and Research (CISR). This reconfigurable lab is dedicated to studies of network security, secure computer systems, security policies, modeling, and formal methods.
Additionally through the use of a Virtual Private Network (VPN), it is utilized for the Inter-Service Academy Cyber Defense Exercise (CDX).  This annual exercise involving NPS, AFIT, and all four U.S. Service Academies; acting as network defenders (Blue Teams) against network attackers (Red Teams) from NSA, and DoD Information Warfare agencies. Each exercise involves approximately 32 students who spend over 640 man-hours to: install, configure, harden, and operate the defended Blue network against a week-long attack from the Red forces. Installation and configuration starts approximately four months prior to that attack. Students are given administrator/root privileges to install and configure: e-mail, Web, FTP, VTC, DNS, and SQL database servers. Students install and utilize DoD PKI certificates to digitally sign and encrypt sensitive exercise traffic.

For more information, please contact Professors Cote or Clark.

Software Engineering Laboratory

Research Laboratory dedicated to the support of reimbursable and direct-funded basic and applied research projects. CAPS, Computer Aided Programming Software. Development of tools and systems for the creation of software. The SwE lab also supports software engineering aspects of other joint research projects with Systems engineering, defense analysis and information systems departments.

For more information, please contact Professors Drusinsky or Luqi.

Wireless and Mobile Computing lab

The wireless and mobile computing lab provides the majority of academic computing needs to support the wireless and mobile computing track within the department of Computer Science. This lab provides students the opportunity to program and examine security aspects of mobile computing devices ranging from personal digital assistants (PDAs) through cellular phones.

For more information, please contact Professor Singh.

Laptop Lab

The Laptop lab is designed for courses that can be more effectively taught when students have "administrator" privileges. These courses include all CS core courses; however, the laptop program specifically targets Operating Systems, Compiler writing and all programming classes. Student users are primarily CS/MOVES, but all CS course students including those from other currics have access to lab assets when taking a CS course.

For more information, please contact Professors Peitso or Schiffman.

Forensics Exploitation Lab

Research laboratory dedicated to the support of reimbursable and direct funded basic and applied research projects. Primary work is done with new techniques for automatically processing data recovered from disk drives and other kinds of storage devices. Using forensic techniques the data on a hard drive can reveal who used or broke into a computer system, what it was used for or what was done during a break-in, and the identities of those in question. The lab is new and has potential application for cross disciplinary work with EE and IS at the tech creation level and DA at the consumption of recovered data level.

For more information, please contact Professors Garfinkel, Dinolt, or Eagle.

SCIF Security Lab

Research laboratory dedicated to the support of reimbursable and direct funded basic and applied research projects that are required to be conducted in high security compartmented classification on dedicated air-gapped hardware/networks.

For more information, please contact Professors Dinolt or Eagle.

Biometrics Research Lab

This lab is primarily used by the Center for Information Security Studies and Research (CISR). The lab consists of a virtual infrastructure of clients and servers with is used to support reimbursable and direct funded basic and applied research projects in Biometrics. The lab is used to demonstrate some of the major biometric approaches (fingerprints, facial recognition, etc) and supports the new NPS Identity Management certificate series jointly hosted between CS and IS.

For more information, please contact Professors Clark or Hopfner.

Learning Resource Center

This LRC is used primarily by the CS Department students but is open to all on campus. Instruction ranges from programming to computer architecture, database systems, computer graphics, artificial intelligence, computer networks and advanced programming.

For more information, please contact Professors Peitso or Schiffman.

This is an official U.S. Navy website.
All information contained herein has been approved for release by the NPS Public Affairs Officer.
Page Last Updated: Mar 5, 2013 12:01:47 PM | Contact the Webmaster