Università della Svizzera italiana
Meta protects the data and social interactions of billions of people, every single day. We know we can’t do this alone. That’s why we are launching a request for proposals focused on research relevant to Meta Security.
To protect the people we care about, we must secure code, systems, and processes that span the globe. Meta Security has made substantial investments in-house, including industry-leading work in program analysis, applied cryptography, and computer systems. We also invest in work to improve how people manage privacy settings and understand how their data is protected. We’re always looking to do more. Below, we briefly summarize these areas and give examples of research that will be impactful for Meta and for the world.
To foster further innovation in this area, and to deepen our collaboration with academia, Meta is pleased to invite faculty to respond to this call for research proposals pertaining to the aforementioned topics. We anticipate awarding a total of 4–6 awards, each in the $65,000–100,000 USD range. Payment will be made to the proposer's host university or non-profit organization as an unrestricted gift.
Università della Svizzera italiana
Università della Svizzera italiana
George Mason University
ETH Zurich
French Institute for Research in Computer Science and Automation
French Institute for Research in Computer Science and Automation
University of British Columbia
Carnegie Mellon University
University of North Carolina at Chapel Hill
ETH Zurich
Applications Are Currently CLosed
Areas of interest include, but are not limited to, the following:
1. Program analysis (for security): Reducing security risks in code by program analysis, including static analysis, dynamic analysis, type systems, deductive verification, and formal methods in general. Includes new analysis techniques as well as methods to make existing techniques usable, e.g., easier to customize or to scale up to large codebases. Examples of work solicited include, but are not limited to, the following:
2. System and hardware security: Better ways to build system software and hardware to prevent security issues. Examples of work solicited include, but are not limited to, the following:
3. Applied cryptography: Approaches to improve the safety of cryptography or to safeguard the correct configuration and use of cryptographic protocols. Examples of work solicited include, but are not limited to, the following:
4. Intrusion detection, forensics, and incident response: Techniques that improve the detection of threat actors, or techniques that aid in reliably analyzing or mitigating attacks after the fact. Examples of work solicited include, but are not limited to, the following:
5. Usable security and human-centered design: Making it easier for end users to do the secure thing and putting people at the center of security design. Examples of work solicited include, but are not limited to, the following:
6. App attestation: Preventing user harm from unofficial clients and other malicious Apps on Android play store. We observe cases where people use phones with unofficial/custom Android OS and unofficial clients for Meta services are pre-installed. Unfortunately, in some cases, these clients can steal auth cookies/keys/credentials and sell them to make money. This results in user account compromise, which breaks user experience and trust. Examples of work solicited include, but are not limited to, the following:
Most of the RFP awards are an unrestricted gift. Because of its nature, salary/headcount could be included as part of the budget presented for the RFP. Since the award/gift is paid to the university, they will be able to allocate the funds to that winning project and have the freedom to use as they need. All Meta teams are different and have different expectations concerning deliverables, timing, etc. Long story short – yes, money for salary/headcount can be included. It’s up to the reviewing team to determine if the percentage spend is reasonable and how that relates to the decision if the project is a winner or not.
We are flexible, but ideally proposals submitted are single-spaced, Times New Roman, 12 pt font.
Research awards are given year-round and funding years/duration can vary by proposal.
Yes, award funds can be used to cover a researcher’s salary.
Budgets can vary by institution and geography, but overall research funds ideally cover the following: graduate or post-graduate students’ employment/tuition; other research costs (e.g., equipment, laptops, incidental costs); travel associated with the research (conferences, workshops, summits, etc.); overhead for research gifts is limited to 5%.
Co-PIs are welcome! One person will need to be the primary PI (i.e., the submitter that will receive all email notifications); however, you’ll be given the opportunity to list collaborators/co-PIs in the submission form. Please note in your budget breakdown how the funds should be dispersed amongst PIs.
Absolutely. We welcome submissions from collaborators/co-PIs at the same or different institutions. (See FAQ above for co-PI submission form instructions.) Please note, payment will be made to the primary PI’s host institution. It can be further disbursed by that institution.
As mentioned above, we welcome submissions from multiple co-PIs from the same or different institutions on a single proposal. All names and institutions will be named as part of the award communication on the Meta Research website; however, the full amount of the award payment will be made to the primary PI’s host institution and can be further disbursed by that institution.
Meta’s decisions will be final in all matters relating to Meta RFP solicitations, including whether or not to grant an award and the interpretation of Meta RFP Terms and Conditions. By submitting a proposal, applicants affirm that they have read and agree to these Terms and Conditions.