{"id":640278,"date":"2021-04-30T16:50:04","date_gmt":"2021-04-30T23:50:04","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-academic-program&#038;p=640278"},"modified":"2024-03-20T09:15:29","modified_gmt":"2024-03-20T16:15:29","slug":"microsoft-security-ai-rfp","status":"publish","type":"msr-academic-program","link":"https:\/\/www.microsoft.com\/en-us\/research\/academic-program\/microsoft-security-ai-rfp\/","title":{"rendered":"Microsoft Security AI RFP"},"content":{"rendered":"\n\n<p><\/p>\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-it-is\">What it is<\/h2>\n\n\n\n<p>Funding for collaborative research between Microsoft and universities working together to make advances in artificial intelligence to solve computing security problems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"about\">About<\/h2>\n\n\n\n<p>Microsoft is committed to pushing the boundaries of technology to empower every person and every organization on the planet to achieve more. The cornerstone of how Microsoft does this is by building systems that are secure and by providing tools that enable customers to manage security, legal, and regulatory standards.<\/p>\n\n\n\n<p>The goal of this request for proposals (RFP) is to spark new AI research in different areas of phish protection that will expand our understanding of the communication graph, email and web content, economics of phishing and how to secure our customer\u2019s assets in the face of increasingly sophisticated attacks while providing fairness and privacy guarantees.<\/p>\n\n\n\n<p>As our cyber defense systems grow more complex in the face of ever evolving and sophisticated attackers, the human element remains the weakest link with few effective protections. Humans are targeted through various modern communication channels and tricked into disclosing sensitive information that may include credentials, financial details, PII data and certificates. According to the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">FBI\u2019s 2020 IC3 Report<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> social engineering attacks including phishing, vishing, smishing, etc. have gone up by 110% from 2019 alone.<\/p>\n\n\n\n<p>Microsoft Security AI Academic Program is launching an academic grants program. We will fund one or more projects (up to $150K in total funding for this RFP) in new collaborative research efforts with university partners so that we can invent the future of security together.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"timeline\">Timeline<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>April 30, 2021:<\/strong> RFP published.<\/li>\n\n\n\n<li><strong>June 6, 2021:<\/strong> Proposals due.<\/li>\n\n\n\n<li><strong>June 18, 2021:<\/strong> Winners announced.<\/li>\n\n\n\n<li><strong>Summer 2021:<\/strong> Awards made, and planning begins with regularly scheduled meetings, calls, and visit(s) by Microsoft to MSecAI winning university.<\/li>\n\n\n\n<li><strong>Spring 2022:<\/strong> Review of progress for potential second round of funding (pending progress and availability of funds).<\/li>\n\n\n\n<li><strong>Fall 2022:<\/strong> Report back.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"research-goals\">Research Goals<\/h2>\n\n\n\n<p>Research is an integral part of the innovation loop. Most of the exciting research is happening in universities around the world. The goal of the Microsoft Security AI (MSecAI) RFP is to develop new knowledge and capabilities that can provide a robust defense against future attacks. Through our grants program, we hope not only to support academic research, but also to develop long-term collaborations with researchers around the world who share the same goal of protecting private data from unauthorized access.<\/p>\n\n\n\n<p>Proposals are invited on all areas of computing related to phish protection and AI, particularly in the following areas of interest:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"understanding-the-communication-graph\">Understanding the communication graph<\/h3>\n\n\n\n<p>A communication graph is a collection of entities including user accounts, applications, websites, shared infrastructure and the relationships between those entities such as emails, P2P messages, login attempts, etc. How do we leverage this dynamic graph at scale to extract key insights while providing privacy guarantees? Can we understand user interaction profiles over time and identify deviations to detect compromised accounts, phish emails from spoofed domains, bulk emails, etc.?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"understanding-the-content\">Understanding the content<\/h3>\n\n\n\n<p>90% of large enterprise customer breaches start from email that tricks users into revealing sensitive information. Most of these emails leverage some part of psychological manipulation that displays a sense of authority or urgency to take immediate action, threat, opportunity for monetary gain or loss, etc. Assuming clear text email data is available, what are some approaches that help machines understand the high level intention of a given email while providing privacy guarantees? How can we effectively group known phish emails into high level campaigns based on the content topics and exploitation techniques?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"fairness-and-accountability-for-security\">Fairness and accountability for security<\/h3>\n\n\n\n<p>As ML is used for more security-sensitive applications, the ability for these systems to generalize globally, not be disruptive to end users, especially any specific segment of user population is quite important. How do we define fairness in security and identify related issues when developing AI systems? Can we develop offline and online experimentation tools to test that our ML models are not biased with respect to attributes such as geo locations, language, industry verticals, etc.&nbsp; How do these test cases help us validate the fairness of ML models?<\/p>\n\n\n\n<p>When it comes to accountability, how can we identify and assign responsibility for a decision made by an AI system? What steps can an incident responder take to respond to the business disruptions caused by misclassifications from AI system? How can we validate that the same misclassifications do not reoccur as ML systems are retrained? In addition, some of the ML systems may work with complex obfuscated data sources that might not generate human understandable explanations. How do we justify the decisions made by AI systems in such cases?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"verifying-the-authenticity-of-modern-communication-channels\">Verifying the authenticity of modern communication channels<\/h3>\n\n\n\n<p>While industry phishing attempts are predominantly carried out through email, many of these attacks have migrated to modern communication channels like professional networks, p2p messaging, search and ads. Phish attempts are becoming increasingly convincing to end users with the advancement of techniques like deep fakes for audio and video generation, content morphing, fake replies.&nbsp; How do we leverage AI systems to verify the authenticity of such content? Moreover, how do we differentiate legitimate user accounts from adversarial\/ tester accounts setup to test defense systems or pollute backend telemetry?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"protecting-patient-zero\">Protecting patient zero<\/h3>\n\n\n\n<p>Based on <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/www.usenix.org\/system\/files\/sec20fall_oest_prepub.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">this<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> paper, an average phishing attack spans 21 hours between the first and last victim and the detection of each attack occurs an average 9 hours after the first victim. This gives attackers a window of opportunity during which most of the damage is done. How do we leverage AI systems to adapt to the adversarial temporal drift and prevent the first victim\/ patient zero from being compromised? How can we use human-in-the-loop AI systems to enable experts to update defenses automatically? How can AI systems be leveraged to identify and learn from discovery of new attack campaigns? How can we augment supervised ML approaches with unlabeled, noisy data to ensure a good feature distribution coverage in training our ML models?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"economics-of-phishing\">Economics of phishing<\/h3>\n\n\n\n<p>Phishing can be seen as an economic problem. Attackers operate like businesses by making investments in campaign inputs to generate returns by selling stolen credentials, using stolen credentials to gain network access, or committing direct fraud. Firms and users invest hundreds of billions of dollars annually in security protection and expect returns on those investments through reduced cyber risk or increased productivity gains. These markets are rich in common economic complications like externalities, asymmetric information, and uncertainty. However, they remain poorly understood. Can we categorize the attacker ecosystem by business model? What are the returns to firms\u2019 security investments? How do security investments impact the attacker ecosystem and vice versa?<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"microsoft-funding\">Microsoft funding<\/h2>\n\n\n\n<p>Microsoft will fund one or more projects (up to $150K in total funding for this RFP). A second round of funding pending initial progress and outcomes (see Timeline above) may be considered at some point during this collaboration. All funding decisions will be at the sole discretion of Microsoft. Proposals for this RFP should provide an initial budget and workplan for the research based on the Timeline section below.<\/p>\n\n\n\n<p>Microsoft encourages potential university partners to consider using resources outlined in the RFP in the following manner:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PhD scholarship stipends.<\/li>\n\n\n\n<li>Post-doctoral researcher funding.<\/li>\n\n\n\n<li>Software and hardware research engineer funding.<\/li>\n\n\n\n<li>Limited but essential hardware and software needed to conduct the research.<\/li>\n<\/ul>\n\n\n\n<p>Proposal plans should include any of these, or other items, that directly support the proposed research.<\/p>\n\n\n\n<p>Microsoft research collaborators, at no cost to the winning teams, may visit the university partners one or more times to foster collaborative planning and research. These visits will be agreed upon and scheduled after an award decision is made. Likewise, a cadence of meetings will be mutually agreed upon at the start of the collaboration. Proposals are welcome to include other suggestions about how to foster an effective collaborative research engagement.<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"eligibility\">Eligibility<\/h2>\n\n\n\n<p>This RFP is not restricted to any one discipline or tailored to any methodology. Universities are welcome to submit cross-disciplinary proposals if that contributes to answering the proposed research question(s).<\/p>\n\n\n\n<p>To be eligible for this RFP, your institution and proposal must meet the following requirements:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Institutions must have access to the knowledge, resources, and skills necessary to carry out the proposed research.<\/li>\n\n\n\n<li>Institutions must be either an accredited or otherwise degree-granting university with non-profit status, or a research organization with non-profit status.<\/li>\n\n\n\n<li>Proposals that are incomplete or request funds more than the maximum award will be excluded from the selection process.<\/li>\n\n\n\n<li>The proposal budget must reflect your university\u2019s policies toward receiving unrestricted gifts and should emphasize allocation of funds toward completing the research proposed.<\/li>\n<\/ul>\n\n\n\n<p>Additionally:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Proposals should include a timeline (approximately 12-18 months) or workplan that begins in summer 2021 and ends in fall of 2022.<\/li>\n\n\n\n<li>To optimize the chances of receiving an award, we encourage researchers from the same university to consider submitting a single, joint proposal (rather than multiple individual proposals) that leverages their various skills and interests to create the strongest possible proposal.<\/li>\n\n\n\n<li>Multiple universities can submit a joint\/single proposal together. Please clearly indicate in the budget section how the budget, not to exceed $150K USD, will be shared.<\/li>\n<\/ul>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"selection-process-and-criteria\">Selection process and criteria<\/h2>\n\n\n\n<p>All proposals received by the submission deadline and in compliance with the eligibility criteria will be evaluated by a panel of subject-matter experts chosen by Microsoft. Drawing from evaluations by the review panel, Microsoft will select which proposals will receive the awards. Microsoft reserves the right to fund the winning proposal at an amount greater or lower than the amount requested, up to the stated maximum amount. Note: Microsoft will not provide individual feedback on proposals that are not funded.<\/p>\n\n\n\n<p>All proposals will be evaluated based on the following criteria:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Addresses an important research area identified above<\/strong> that, if answered, has the potential to have a significant impact on that domain.<\/li>\n\n\n\n<li><strong>Expected value and potential impact<\/strong> of the research on relevant information security fields.<\/li>\n\n\n\n<li><strong>Potential for wide dissemination and use of knowledge<\/strong>, including specific plans for scholarly publications, public presentations, and white papers.<\/li>\n\n\n\n<li><strong>Ability to complete the project<\/strong> based upon adequate available resources, reasonable timelines, and the identified contributors\u2019 qualifications.<\/li>\n\n\n\n<li><strong>Qualifications of the research team<\/strong>, including previous history of work in the area, successful completion of previous projects, research or teaching awards, and scholarly publications.<\/li>\n\n\n\n<li><strong>Diversity<\/strong> is highly valued and research teams should strive to reflect a diversity of backgrounds, experiences, and talent reflected in the research teams.<\/li>\n\n\n\n<li><strong>Evidence of university support<\/strong> contributed in-kind to directly support and supplement the research efforts.<\/li>\n\n\n\n<li><strong>Budget<\/strong> is strategic to maximize impact of research.<\/li>\n\n\n\n<li><strong>Possible additional information<\/strong> as requested by the review panel, which might be requested via a conference call.<\/li>\n<\/ul>\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"conditions\">Conditions<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>As a condition of accepting an award, principal investigators agree that Microsoft may use their name and likeness to publicize their proposals (including all proposal content except detailed budget information) in connection with the promotion of the research awards in all media now known or later developed.<\/li>\n\n\n\n<li>Researchers will be willing to engage with Microsoft about their project and experience, and provide updates via monthly or quarterly calls.<\/li>\n\n\n\n<li>The review process is internal, and no review feedback will be given to submitters.<\/li>\n\n\n\n<li>Microsoft encourages researchers to publish their work in scholarly venues such as journals and conferences. Researchers must provide Microsoft a copy of any work prior to publication.&nbsp;So long as accurate, such publications are not subject to Microsoft\u2019s approval except that, at Microsoft\u2019s request, researcher will delete any Microsoft Confidential Information identified or delay publication to enable Microsoft to file for appropriate intellectual property (IP) protection for any project IP disclosed in such work.<\/li>\n\n\n\n<li>All data sets and any new IP resulting from this effort will be made public and publicly available for any researcher, developer, or interested party to access to help further the goals of this initiative in providing higher quality and better access to technology services that empowers people and organizations to be more productive.<\/li>\n\n\n\n<li>Funded researchers must seek approval of their institution\u2019s review board for any work that involves human subjects.<\/li>\n\n\n\n<li>At the completion of the project, the funded researchers will be required to submit to Microsoft a report describing project learnings.<\/li>\n\n\n\n<li>Any security issues in Microsoft products or services discovered during this research must be reported to the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/msrc.microsoft.com\/create-report\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security Response Center<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/li>\n<\/ul>\n\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"collaborative-research-proposal-requirements\">Collaborative Research Proposal Requirements<\/h2>\n\n\n\n<p><strong>The deadline for proposal submissions has now passed.<\/strong><\/p>\n\n\n\n<p>Microsoft shall have no obligation to maintain the confidentiality of any submitted proposals. Therefore, proposals should not contain information that is confidential, proprietary, restricted, or sensitive. Proposals will be evaluated by a panel of subject-matter experts chosen from Microsoft. Microsoft reserves the right to make the winning proposals publicly available, except those portions containing budgetary information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"length\">Length<\/h3>\n\n\n\n<p>The proposal should not be more than seven pages in length of Times New Roman 11-point font. Any documentation beyond that length will not be included as part of the proposal review.<\/p>\n\n\n\n<p>The seven-page limit includes the cover page but the proposal can start on the cover page if additional space is needed. Scholarly references\/bibliography can be submitted in addition to the seven pages and will not count toward the seven-page limit.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"cover-page\">Cover page<\/h3>\n\n\n\n<p>The proposal should have a cover page that provides the following information:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Biographical information and contact information: <\/strong>This should include a&nbsp;brief&nbsp;description of any relevant prior research, publications, or other professional experience.\n<ul class=\"wp-block-list\">\n<li>Faculty with deep technical experience related to the research&nbsp;areas&nbsp;described above are encouraged to apply. Indicate estimated&nbsp;level of effort\/amount of time each faculty member will spend on the project.<\/li>\n\n\n\n<li>Post-doctoral researchers&nbsp;and mid-&nbsp;to late-stage PhD students with deep technical experience related to the research should be included in proposals. Indicate the estimated&nbsp;level of effort\/amount of time each&nbsp;post-doctoral researcher&nbsp;and PhD student will spend on the project.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Project proposal abstract: <\/strong>The abstract should contain the following:\n<ul class=\"wp-block-list\">\n<li>A&nbsp;nontechnical&nbsp;description of the project that states the problem to be studied and explains the project\u2019s broader significance and importance.<\/li>\n\n\n\n<li>A technical description of the project that states the goals and scope of the research, and the methods and approaches to be used.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Proposal body:<\/strong>&nbsp; The proposal body should include the following information:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Project description: <\/strong>Include what&nbsp;set of questions&nbsp;based on the identified research scenarios&nbsp;above,&nbsp;will be addressed&nbsp;and how they&nbsp;will&nbsp;be addressed. Describe&nbsp;how answering these questions&nbsp;will&nbsp;help advance&nbsp;the state-of-the-art in&nbsp;security research.<\/li>\n\n\n\n<li><strong>Approach: <\/strong>Describe&nbsp;the methodological and theoretical approach that the researchers will&nbsp;use. Explain exactly how the researchers&nbsp;will&nbsp;go about answering the question.&nbsp;Describe how the researchers will handle the legal and ethical challenges of doing work in this area.&nbsp;This section should also describe how the university&nbsp;MSecAI&nbsp;team proposes to work with Microsoft counterparts (researchers and engineers) to ensure&nbsp;an&nbsp;effective and positive collaboration.<\/li>\n\n\n\n<li><strong>Resources: <\/strong>Proposals should specify if and how Microsoft technologies will be used, namely (1) APIs, (2) Data sets, etc. if applicable.<\/li>\n\n\n\n<li><strong>Expected results: <\/strong>Briefly describe what new knowledge is likely to be generated&nbsp;as a result&nbsp;of&nbsp;this research,&nbsp;why these results would be significant, and how this could benefit&nbsp;information workers of tomorrow.<\/li>\n\n\n\n<li><strong>Related research: <\/strong>Briefly summarize related research, including references where appropriate.<\/li>\n\n\n\n<li><strong>Researcher roles: <\/strong>Describe the role of each researcher involved in the project and explain how their skills and knowledge enable them to address the proposed research.<\/li>\n\n\n\n<li><strong>~12-18-month Timeline\/Workplan and Schedule: <\/strong>Describe what milestones will be used to measure progress of the project during the year and when they&nbsp;will&nbsp;be completed.&nbsp;If the project is part of a larger ongoing research program, estimate the time for completion of this project only.&nbsp;It is expected that&nbsp;the award&nbsp;will be made on or after June 18, 2021. Project timelines should reflect starting times on or&nbsp;shortly&nbsp;after this date.<\/li>\n\n\n\n<li><strong>Use of funds: <\/strong>Provide a budget (in U.S. dollars) describing how the award will be used. The budget should be presented as a table with the total budget request clearly indicated.&nbsp;Microsoft will consider requests for Azure credits necessary to conduct research. Value of Azure credits will not be considered a part of the budget request.&nbsp;Azure requests should be&nbsp;included in the budget table.<\/li>\n\n\n\n<li><strong>Other support: <\/strong>Include other contributions to this project (cash, goods, and services)&nbsp;by your university or other sources, if any, but do not include the use of university\/organization facilities that are otherwise provided on an ongoing basis.&nbsp;Describe other grants or funded research that may be leveraged to add value to this research effort.&nbsp;Note:&nbsp;authors of&nbsp;the selected&nbsp;proposal will be required to submit an original letter on their institution\u2019s letterhead, certifying the commitment of any additional or matching support described in the proposal.<\/li>\n<\/ul>\n\n\n\n\n\n\n\n<p>Yes, multiple universities can submit a joint\/single proposal together. Please clearly indicate in the budget section how the budget, not to exceed $150,000 USD, will be shared.<\/p>\n\n\n\n\n\n<p>Yes, Microsoft will pay each university directly provided the budget clearly illustrates the amount to be paid to each university with a total not to exceed $150,000 USD.<\/p>\n\n\n\n\n\n<p>Project timelines should be approximately 12-18 months. They should reflect the total time estimated to complete the research proposed.<\/p>\n\n\n\n\n\n<p>Yes, proposals must indicate which of the listed research areas will be investigated as part of the proposed research to be eligible for consideration.<\/p>\n\n\n\n\n\n<p>It would be considered a positive for the proposal to have a researcher at Microsoft who is supportive, but we don\u2019t require it or expect it. If a researcher at Microsoft is interested in expressing support for your proposal, there is an opportunity during the proposal submission process to request their letter of recommendation. When received, it will be associated with your proposal and considered during the review.<\/p>\n\n\n\n\n\n<p>Yes, proposal budget requests can be of any amount up to $150,000 USD.<\/p>\n\n\n\n\n\n<p>The budget is part of the seven-page limit. Scholarly references\/bibliography can be submitted in addition to the seven pages and will not count toward the seven-page limit but all of the other required components will count toward the seven-page limit.<\/p>\n\n\n\n\n\n<p>No, letters of support will not count toward the seven-page limit.<\/p>\n\n\n\n\n\n<p>As long as the full proposal doesn\u2019t exceed seven pages the rest of the section lengths are flexible.<\/p>\n\n\n\n\n\n<p>We would be looking for cost-share. This is not a mandatory requirement.<\/p>\n\n\n\n\n\n<p>We would be looking for contributions that directly support the research efforts here so indirect-costs that cover items such as facilities and infrastructure would not count toward university support\/cost-share\/in-kind contribution.<\/p>\n\n\n\n\n\n<p>Since this is not a requirement, there is no expected amount.<\/p>\n\n\n\n\n\n<p>The funds will be considered a gift that has no restrictions on how it is used. Budgets should reflect university\u2019s own policies for accepting unrestricted gifts<\/p>\n\n\n\n\n\n<p>There are no restrictions on how the funds are used. We do request that how the funds will be used is clearly illustrated in the required budget portion of the proposal.<\/p>\n\n\n\n\n\n<p>There are no restrictions on how the funds are used. We do request that how the funds will be used is clearly illustrated in the required budget portion of the proposal.<\/p>\n\n\n\n\n\n<p>The proposal budget should reflect your university\u2019s policies toward receiving unrestricted gifts and should emphasize allocation of funds toward completing the research proposed.<\/p>\n\n\n\n\n\n<p>As unrestricted gifts, it will be entirely up to the winners to decide how to spend the award to achieve the research goals in the proposal.<\/p>\n\n\n\n\n\n<p>We will not be able to provide access to any data that is not already publicly available.<\/p>\n\n\n\n\n\n<p>Yes, the results of this research are meant to be open and public for unrestricted use by future researchers and technologists.<\/p>\n\n\n\n\n\n<p>You are encouraged to assemble a team that is most likely to achieve the greatest results within the time and budget parameters required.<\/p>\n\n\n\n\n\n<p>Both of these scenarios are valuable. The results of this research will be open and public and so they are meant to drive future research and technology development. More insight on how people work together leading to implications for designs of future tools \u2013 though not designed just by Microsoft but others as well that are working in these topic areas would be of interest.<\/p>\n\n\n\n<p>However, if you feel you can develop breakthrough prototypes that also inform future research then that would also be interesting.<\/p>\n\n\n\n\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2021-microsoft-security-research-ai-rfp-winners\">2021 Microsoft Security Research AI RFP Winners<\/h2>\n\n\n\n<div style=\"padding-bottom:32px; padding-top:32px\" class=\"wp-block-msr-immersive-section alignfull row wp-block-msr-immersive-section\">\n\t\n\t<div class=\"container\">\n\t\t<div class=\"wp-block-msr-immersive-section__wrapper\">\n\t\t\t<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"200\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/Amin-Kharraz.jpeg\" alt=\"portrait of Amin Kharraz\" class=\"wp-image-755641\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/Amin-Kharraz.jpeg 150w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/Amin-Kharraz-9x12.jpeg 9w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"name\">Amin Kharraz<\/h4>\n\n\n\n<p>Florida International University<\/p>\n\n\n\n<p><strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research<\/p>\n\n\n\n<p><strong>WEBHASH: A Spatio-Temporal Deep Learning Approach for Detecting Social Engineering Attacks<\/strong><\/p>\n\n\n\n<p>Social engineering attacks continue to remain a top security threat. The impact of these attacks is often deep and consequential. Modern social engineering attacks have evolved to deliver different classes of malicious code while collecting extensive financial and personal information. Unfortunately, current mechanisms are woefully inadequate to identify and reason about such adversarial operations, leaving organizations and end-users open to a variety of consequential attacks. The goal of this project is to design principles that will guide the development of an unsupervised approach to automatically identify temporal drifts and detect emerging trends in the social engineering attack landscape. The core insight of our research is that most of social engineering campaigns rarely change the underlying software development techniques to build their attack pages and tend to reuse specific web development patterns to generate a diverse set of attack pages. In this proposal, we develop a novel similarity hashing mechanism, called WEBHASH, which takes into account the spatio-temporal characteristics of a target website and convert them into a vector that facilitates a low-overhead attribution and similarity testing at scale. We will take advantage of advances in machine learning and incorporate Siamese Neural Networks (SNNs) to conduct unsupervised similarity testing across the vectorized data. We posit that a number of useful activities can be performed with WEBHASH. By developing low latency detection and mitigation platforms for social engineering attacks, we can better protect organizations and institutions from data breaches and reduce users\u2019 exposure to modern social engineering attacks. WEBHASH also allows approximating the prevalence of an emerging social engineering threat or the adoption of new attack techniques across different campaigns with minimal human intervention.<\/p>\t\t<\/div>\n\t<\/div>\n\n\t<\/div>\n\n\n\n<div style=\"padding-bottom:32px; padding-top:32px\" class=\"wp-block-msr-immersive-section alignfull row wp-block-msr-immersive-section\">\n\t\n\t<div class=\"container\">\n\t\t<div class=\"wp-block-msr-immersive-section__wrapper\">\n\t\t\t<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"295\" height=\"200\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/zhou-yanning.jpg\" alt=\"portraits of Zhou Li and Yanning Shen\" class=\"wp-image-755635\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/zhou-yanning.jpg 295w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/zhou-yanning-16x12.jpg 16w\" sizes=\"auto, (max-width: 295px) 100vw, 295px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"name\">Zhou Li and Yanning Shen<\/h4>\n\n\n\n<p>University of California Irvine<\/p>\n\n\n\n<p><strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research<\/p>\n\n\n\n<p><strong>Scalable Graph Learning for Automatic Detection of Spearphishing<\/strong><\/p>\n\n\n\n<p>In this project, we will tackle the problem of automated spearphishing detection. Spearphishing has become a primary attack vector to perpetuate entities in public and private sectors, causing billions of dollars loss annually. Due to the advanced social-engineering tricks performed by the attackers, spearphishing emails are often evasive, difficult to capture by the existing approaches based on malware detection, sender\/domain blacklisting, etc. To address this urgent threat, we will explore how to adapt state-of-the-art graph learning algorithms. In particular, we will first investigate how to model the email data as a graph, such that the spearphishing impersonators can be distinguished. Then, we will build a detection system with multi-kernel learning to capture the complex relationship between email users and their sending behaviors. For timely detection, we will examine how the trained classifier can be updated online with Random Feature based function estimation. Finally, we will derive the relation between different function estimators and the privacy levels. We expect this project to have profound impact on email security and research in graph learning.<\/p>\t\t<\/div>\n\t<\/div>\n\n\t<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2020-microsoft-security-research-ai-rfp-winners\">2020 Microsoft Security Research AI RFP Winners<\/h2>\n\n\n\n<div style=\"padding-bottom:32px; padding-top:32px\" class=\"wp-block-msr-immersive-section alignfull row wp-block-msr-immersive-section\">\n\t\n\t<div class=\"container\">\n\t\t<div class=\"wp-block-msr-immersive-section__wrapper\">\n\t\t\t<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"295\" height=\"200\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/Song-Gao-Berkeley.jpg\" alt=\"Dawn Song and Peng Gao from UC Berkley\" class=\"wp-image-664620\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"name\">Dawn Song and Peng Gao<\/h4>\n\n\n\n<p>University of California, Berkeley<\/p>\n\n\n\n<p><strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research<\/p>\n\n\n\n<p><strong>A Security Knowledge Graph for Automated Threat Intelligence Gathering and Management<\/strong><\/p>\n\n\n\n<p>Sophisticated cyber-attacks have plagued many high-profile businesses. To gain visibility into the fast-evolving threat landscape, open-source Cyber Threat Intelligence (OSCTI) has received growing attention from the community. Commonly, knowledge about a threat is presented in a vast number of OSCTI reports, detailing how the threat unfolds into multiple steps. Despite the pressing need for high-quality OSCTI, existing approaches, however, have primarily operated on fragmented threat indicators (e.g., Indicators of Compromise). On the other hand, descriptive relationships between threat indicators have been overlooked, which contain essential information on the threat behaviors that is critical to uncovering the complete threat scenario. Recognizing the limitation, this proposal seeks to design and develop an intelligent and scalable system for automated threat intelligence gathering and management. The proposed system will use a combination of AI-based methods to collect heterogeneous OSCTI data from various sources, extract comprehensive knowledge about threat behaviors in the form of security-related entities and their relations, construct a security knowledge graph from the extracted information, and update the knowledge graph by continuously learning from its deployment. We will also pursue possible security defensive applications that can be further empowered by OSCTI. The proposed work has a broad impact for advancing the state-of-the-art in threat intelligence gathering, management, and applications.<\/p>\t\t<\/div>\n\t<\/div>\n\n\t<\/div>\n\n\n\n<div style=\"padding-bottom:32px; padding-top:32px\" class=\"wp-block-msr-immersive-section alignfull row wp-block-msr-immersive-section\">\n\t\n\t<div class=\"container\">\n\t\t<div class=\"wp-block-msr-immersive-section__wrapper\">\n\t\t\t<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"200\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/03\/Nick-Heard.jpg\" alt=\"Nick Heard, Department of Mathematics, Imperial College London\" class=\"wp-image-664623\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"name\">Nick Heard<\/h4>\n\n\n\n<p>Department of Mathematics, Imperial College London<\/p>\n\n\n\n<p><strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research<\/p>\n\n\n\n<p><strong>Understanding the enterprise: Host-based event prediction for automatic defence in cyber-security<\/strong><\/p>\n\n\n\n<p>The next generation of cyber-security challenges will demonstrate an increase in complexity and sophistication, aided by artificial intelligence. To counter this AI-driven threat, we propose to develop Bayesian statistical methodologies for adaptively designing robust, interpretable mathematical models of normal behaviour in new environments. These methodologies will provide new insights into enterprise systems, providing detailed under-standing of network assets and their relationships. These insights will inform enterprise risk-based assessments and enhance the detection and response to cyber threats. Challenges will include the fusion of diverse data sources, collected both within the network environment and externally, and securely sharing intelligence obtained from other platforms. To address these challenges, the proposed workflows will construct modelling frameworks for adaptively building probability distributions for predicting the future activity of a network host. Perspectives in both discrete time and continuous time, along with hybrids of the two, will be considered. Central to the model-building challenge will be developing principled methods for automatically identifying the quantity (either in terms of counts, or in time horizons) of historical data which should be conditioned upon in forming short-term and longer-term predictions. The principal modelling paradigm will be centered on a host-based approach, which has both the capacity to scale and be most sensitive to the protection of sensitive data. Additionally, there will be important scope for making inferences about large-scale network structure, to inform these host-based AI technologies about the position, importance and likely connectivity of the node within the network.<\/p>\t\t<\/div>\n\t<\/div>\n\n\t<\/div>\n\n\n\n<div style=\"padding-bottom:32px; padding-top:32px\" class=\"wp-block-msr-immersive-section alignfull row wp-block-msr-immersive-section\">\n\t\n\t<div class=\"container\">\n\t\t<div class=\"wp-block-msr-immersive-section__wrapper\">\n\t\t\t<figure class=\"wp-block-image alignleft size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"154\" height=\"200\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/03\/nicolas.jpg\" alt=\"Nicolas Papernot, University of Toronto, Department of Electrical and Computer Engineering\" class=\"wp-image-664626\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"name\">Nicolas Papernot<\/h4>\n\n\n\n<p>University of Toronto, Department of Electrical and Computer Engineering<\/p>\n\n\n\n<p><strong>Microsoft lead collaborator:<\/strong> Azure Trustworthy Machine Learning + Microsoft Security Response Center (MSRC)<\/p>\n\n\n\n<p><strong>Towards Machine Learning Governance<\/strong><\/p>\n\n\n\n<p>The predictions of machine learning (ML) systems often appear fragile, with no hint as to the reasoning behind them\u2014and may be dangerously wrong. This is unacceptable: society must be able to trust and hold to account ML. This proposal seeks to empower ML developers and engineers to develop and design ML systems that are secure and provide the tools that enable its users to manage security, legal, and regulatory standards. Our efforts achieve this through the development of machine learning governance. We focus our efforts around two attack vectors: (1) input manipulations at training and test time that target the ML system\u2019s integrity and (2) model inversion and extraction that target the privacy of training data and the confidentiality of model architectural details. We propose to tackle the first attack vector through the development of robust model uncertainty estimates, the identification of coresets in ML, and the creation of computationally efficient influence metrics. We approach the second attack vector by focusing on the life of ML systems after they have been trained: we will pursue model watermarking, machine unlearning, and the identifiability of ML outputs.<\/p>\t\t<\/div>\n\t<\/div>\n\n\t<\/div>\n\n\n","protected":false},"featured_media":498056,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":true,"_classifai_error":"","msr_hide_image_in_river":0,"footnotes":""},"msr-opportunity-type":[155533],"msr-region":[256048],"msr-locale":[268875],"msr-program-audience":[243727],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-640278","msr-academic-program","type-msr-academic-program","status-publish","has-post-thumbnail","hentry","msr-opportunity-type-grants-and-fellowships","msr-region-global","msr-locale-en_us","msr-program-audience-faculty"],"msr_description":"","msr_social_media":[],"related-researchers":[],"tab-content":[{"id":0,"name":"About","content":"<h2>What it is<\/h2>\r\nFunding for collaborative research between Microsoft and universities working together to make advances in artificial intelligence to solve computing security problems.\r\n<h2>About<\/h2>\r\nMicrosoft is committed to pushing the boundaries of technology to empower every person and every organization on the planet to achieve more. The cornerstone of how Microsoft does this is by building systems that are secure and by providing tools that enable customers to manage security, legal, and regulatory standards.\r\n\r\nThe goal of this request for proposals (RFP) is to spark new AI research in different areas of phish protection that will expand our understanding of the communication graph, email and web content, economics of phishing and how to secure our customer\u2019s assets in the face of increasingly sophisticated attacks while providing fairness and privacy guarantees.\r\n\r\nAs our cyber defense systems grow more complex in the face of ever evolving and sophisticated attackers, the human element remains the weakest link with few effective protections. Humans are targeted through various modern communication channels and tricked into disclosing sensitive information that may include credentials, financial details, PII data and certificates. According to the <a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">FBI\u2019s 2020 IC3 Report<\/a> social engineering attacks including phishing, vishing, smishing, etc. have gone up by 110% from 2019 alone.\r\n\r\nMicrosoft Security AI Academic Program is launching an academic grants program. We will fund one or more projects (up to $150K in total funding for this RFP) in new collaborative research efforts with university partners so that we can invent the future of security together.\r\n<h2>Timeline<\/h2>\r\n<ul>\r\n \t<li><strong>April 30, 2021:<\/strong> RFP published.<\/li>\r\n \t<li><strong>June 6, 2021:<\/strong> Proposals due.<\/li>\r\n \t<li><strong>June 18, 2021:<\/strong> Winners announced.<\/li>\r\n \t<li><strong>Summer 2021:<\/strong> Awards made, and planning begins with regularly scheduled meetings, calls, and visit(s) by Microsoft to MSecAI winning university.<\/li>\r\n \t<li><strong>Spring 2022:<\/strong> Review of progress for potential second round of funding (pending progress and availability of funds).<\/li>\r\n \t<li><strong>Fall 2022:<\/strong> Report back.<\/li>\r\n<\/ul>\r\n<h2>Research Goals<\/h2>\r\nResearch is an integral part of the innovation loop. Most of the exciting research is happening in universities around the world. The goal of the Microsoft Security AI (MSecAI) RFP is to develop new knowledge and capabilities that can provide a robust defense against future attacks. Through our grants program, we hope not only to support academic research, but also to develop long-term collaborations with researchers around the world who share the same goal of protecting private data from unauthorized access.\r\n\r\nProposals are invited on all areas of computing related to phish protection and AI, particularly in the following areas of interest:\r\n<h3>Understanding the communication graph<\/h3>\r\nA communication graph is a collection of entities including user accounts, applications, websites, shared infrastructure and the relationships between those entities such as emails, P2P messages, login attempts, etc. How do we leverage this dynamic graph at scale to extract key insights while providing privacy guarantees? Can we understand user interaction profiles over time and identify deviations to detect compromised accounts, phish emails from spoofed domains, bulk emails, etc.?\r\n<h3>Understanding the content<\/h3>\r\n90% of large enterprise customer breaches start from email that tricks users into revealing sensitive information. Most of these emails leverage some part of psychological manipulation that displays a sense of authority or urgency to take immediate action, threat, opportunity for monetary gain or loss, etc. Assuming clear text email data is available, what are some approaches that help machines understand the high level intention of a given email while providing privacy guarantees? How can we effectively group known phish emails into high level campaigns based on the content topics and exploitation techniques?\r\n<h3>Fairness and accountability for security<\/h3>\r\nAs ML is used for more security-sensitive applications, the ability for these systems to generalize globally, not be disruptive to end users, especially any specific segment of user population is quite important. How do we define fairness in security and identify related issues when developing AI systems? Can we develop offline and online experimentation tools to test that our ML models are not biased with respect to attributes such as geo locations, language, industry verticals, etc.\u00a0 How do these test cases help us validate the fairness of ML models?\r\n\r\nWhen it comes to accountability, how can we identify and assign responsibility for a decision made by an AI system? What steps can an incident responder take to respond to the business disruptions caused by misclassifications from AI system? How can we validate that the same misclassifications do not reoccur as ML systems are retrained? In addition, some of the ML systems may work with complex obfuscated data sources that might not generate human understandable explanations. How do we justify the decisions made by AI systems in such cases?\r\n<h3>Verifying the authenticity of modern communication channels<\/h3>\r\nWhile industry phishing attempts are predominantly carried out through email, many of these attacks have migrated to modern communication channels like professional networks, p2p messaging, search and ads. Phish attempts are becoming increasingly convincing to end users with the advancement of techniques like deep fakes for audio and video generation, content morphing, fake replies.\u00a0 How do we leverage AI systems to verify the authenticity of such content? Moreover, how do we differentiate legitimate user accounts from adversarial\/ tester accounts setup to test defense systems or pollute backend telemetry?\r\n<h3>Protecting patient zero<\/h3>\r\nBased on <a href=\"https:\/\/www.usenix.org\/system\/files\/sec20fall_oest_prepub.pdf\" target=\"_blank\" rel=\"noopener\">this<\/a> paper, an average phishing attack spans 21 hours between the first and last victim and the detection of each attack occurs an average 9 hours after the first victim. This gives attackers a window of opportunity during which most of the damage is done. How do we leverage AI systems to adapt to the adversarial temporal drift and prevent the first victim\/ patient zero from being compromised? How can we use human-in-the-loop AI systems to enable experts to update defenses automatically? How can AI systems be leveraged to identify and learn from discovery of new attack campaigns? How can we augment supervised ML approaches with unlabeled, noisy data to ensure a good feature distribution coverage in training our ML models?\r\n<h3>Economics of phishing<\/h3>\r\nPhishing can be seen as an economic problem. Attackers operate like businesses by making investments in campaign inputs to generate returns by selling stolen credentials, using stolen credentials to gain network access, or committing direct fraud. Firms and users invest hundreds of billions of dollars annually in security protection and expect returns on those investments through reduced cyber risk or increased productivity gains. These markets are rich in common economic complications like externalities, asymmetric information, and uncertainty. However, they remain poorly understood. Can we categorize the attacker ecosystem by business model? What are the returns to firms\u2019 security investments? How do security investments impact the attacker ecosystem and vice versa?\r\n\r\n[accordion] [panel header=\"Funding\"]\r\n<h2>Microsoft funding<\/h2>\r\nMicrosoft will fund one or more projects (up to $150K in total funding for this RFP). A second round of funding pending initial progress and outcomes (see Timeline above) may be considered at some point during this collaboration. All funding decisions will be at the sole discretion of Microsoft. Proposals for this RFP should provide an initial budget and workplan for the research based on the Timeline section below.\r\n\r\nMicrosoft encourages potential university partners to consider using resources outlined in the RFP in the following manner:\r\n<ul>\r\n \t<li>PhD scholarship stipends.<\/li>\r\n \t<li>Post-doctoral researcher funding.<\/li>\r\n \t<li>Software and hardware research engineer funding.<\/li>\r\n \t<li>Limited but essential hardware and software needed to conduct the research.<\/li>\r\n<\/ul>\r\nProposal plans should include any of these, or other items, that directly support the proposed research.\r\n\r\nMicrosoft research collaborators, at no cost to the winning teams, may visit the university partners one or more times to foster collaborative planning and research. These visits will be agreed upon and scheduled after an award decision is made. Likewise, a cadence of meetings will be mutually agreed upon at the start of the collaboration. Proposals are welcome to include other suggestions about how to foster an effective collaborative research engagement.\r\n\r\n[\/panel][panel header=\"Eligibility\"]\r\n<h2>Eligibility<\/h2>\r\nThis RFP is not restricted to any one discipline or tailored to any methodology. Universities are welcome to submit cross-disciplinary proposals if that contributes to answering the proposed research question(s).\r\n\r\nTo be eligible for this RFP, your institution and proposal must meet the following requirements:\r\n<ul>\r\n \t<li>Institutions must have access to the knowledge, resources, and skills necessary to carry out the proposed research.<\/li>\r\n \t<li>Institutions must be either an accredited or otherwise degree-granting university with non-profit status, or a research organization with non-profit status.<\/li>\r\n \t<li>Proposals that are incomplete or request funds more than the maximum award will be excluded from the selection process.<\/li>\r\n \t<li>The proposal budget must reflect your university\u2019s policies toward receiving unrestricted gifts and should emphasize allocation of funds toward completing the research proposed.<\/li>\r\n<\/ul>\r\nAdditionally:\r\n<ul>\r\n \t<li>Proposals should include a timeline (approximately 12-18 months) or workplan that begins in summer 2021 and ends in fall of 2022.<\/li>\r\n \t<li>To optimize the chances of receiving an award, we encourage researchers from the same university to consider submitting a single, joint proposal (rather than multiple individual proposals) that leverages their various skills and interests to create the strongest possible proposal.<\/li>\r\n \t<li>Multiple universities can submit a joint\/single proposal together. Please clearly indicate in the budget section how the budget, not to exceed $150K USD, will be shared.<\/li>\r\n<\/ul>\r\n[\/panel] [panel header=\"Selection process &amp; criteria\"]\r\n<h2>Selection process and criteria<\/h2>\r\nAll proposals received by the submission deadline and in compliance with the eligibility criteria will be evaluated by a panel of subject-matter experts chosen by Microsoft. Drawing from evaluations by the review panel, Microsoft will select which proposals will receive the awards. Microsoft reserves the right to fund the winning proposal at an amount greater or lower than the amount requested, up to the stated maximum amount. Note: Microsoft will not provide individual feedback on proposals that are not funded.\r\n\r\nAll proposals will be evaluated based on the following criteria:\r\n<ul>\r\n \t<li><strong>Addresses an important research area identified above<\/strong> that, if answered, has the potential to have a significant impact on that domain.<\/li>\r\n \t<li><strong>Expected value and potential impact<\/strong> of the research on relevant information security fields.<\/li>\r\n \t<li><strong>Potential for wide dissemination and use of knowledge<\/strong>, including specific plans for scholarly publications, public presentations, and white papers.<\/li>\r\n \t<li><strong>Ability to complete the project<\/strong> based upon adequate available resources, reasonable timelines, and the identified contributors\u2019 qualifications.<\/li>\r\n \t<li><strong>Qualifications of the research team<\/strong>, including previous history of work in the area, successful completion of previous projects, research or teaching awards, and scholarly publications.<\/li>\r\n \t<li><strong>Diversity<\/strong> is highly valued and research teams should strive to reflect a diversity of backgrounds, experiences, and talent reflected in the research teams.<\/li>\r\n \t<li><strong>Evidence of university support<\/strong> contributed in-kind to directly support and supplement the research efforts.<\/li>\r\n \t<li><strong>Budget<\/strong> is strategic to maximize impact of research.<\/li>\r\n \t<li><strong>Possible additional information<\/strong> as requested by the review panel, which might be requested via a conference call.<\/li>\r\n<\/ul>\r\n[\/panel][panel header=\"Conditions\"]\r\n<h2>Conditions<\/h2>\r\n<ul>\r\n \t<li>As a condition of accepting an award, principal investigators agree that Microsoft may use their name and likeness to publicize their proposals (including all proposal content except detailed budget information) in connection with the promotion of the research awards in all media now known or later developed.<\/li>\r\n \t<li>Researchers will be willing to engage with Microsoft about their project and experience, and provide updates via monthly or quarterly calls.<\/li>\r\n \t<li>The review process is internal, and no review feedback will be given to submitters.<\/li>\r\n \t<li>Microsoft encourages researchers to publish their work in scholarly venues such as journals and conferences. Researchers must provide Microsoft a copy of any work prior to publication.\u00a0So long as accurate, such publications are not subject to Microsoft\u2019s approval except that, at Microsoft\u2019s request, researcher will delete any Microsoft Confidential Information identified or delay publication to enable Microsoft to file for appropriate intellectual property (IP) protection for any project IP disclosed in such work.<\/li>\r\n \t<li>All data sets and any new IP resulting from this effort will be made public and publicly available for any researcher, developer, or interested party to access to help further the goals of this initiative in providing higher quality and better access to technology services that empowers people and organizations to be more productive.<\/li>\r\n \t<li>Funded researchers must seek approval of their institution\u2019s review board for any work that involves human subjects.<\/li>\r\n \t<li>At the completion of the project, the funded researchers will be required to submit to Microsoft a report describing project learnings.<\/li>\r\n \t<li>Any security issues in Microsoft products or services discovered during this research must be reported to the <a href=\"https:\/\/msrc.microsoft.com\/create-report\" target=\"_blank\" rel=\"noopener\">Microsoft Security Response Center<\/a>.<\/li>\r\n<\/ul>\r\n[\/panel][\/accordion]"},{"id":1,"name":"Proposal Requirements","content":"<h2>Collaborative Research Proposal Requirements<\/h2>\r\n<strong>The deadline for proposal submissions has now passed.<\/strong>\r\n\r\nMicrosoft shall have no obligation to maintain the confidentiality of any submitted proposals. Therefore, proposals should not contain information that is confidential, proprietary, restricted, or sensitive. Proposals will be evaluated by a panel of subject-matter experts chosen from Microsoft. Microsoft reserves the right to make the winning proposals publicly available, except those portions containing budgetary information.\r\n<h3>Length<\/h3>\r\nThe proposal should not be more than seven pages in length of Times New Roman 11-point font. Any documentation beyond that length will not be included as part of the proposal review.\r\n\r\nThe seven-page limit includes the cover page but the proposal can start on the cover page if additional space is needed. Scholarly references\/bibliography can be submitted in addition to the seven pages and will not count toward the seven-page limit.\r\n<h3>Cover page<\/h3>\r\nThe proposal should have a cover page that provides the following information:\r\n<ul>\r\n \t<li><strong>Biographical information and contact information: <\/strong>This should include a\u00a0brief\u00a0description of any relevant prior research, publications, or other professional experience.\r\n<ul>\r\n \t<li>Faculty with deep technical experience related to the research\u00a0areas\u00a0described above are encouraged to apply. Indicate estimated\u00a0level of effort\/amount of time each faculty member will spend on the project.<\/li>\r\n \t<li>Post-doctoral researchers\u00a0and mid-\u00a0to late-stage PhD students with deep technical experience related to the research should be included in proposals. Indicate the estimated\u00a0level of effort\/amount of time each\u00a0post-doctoral researcher\u00a0and PhD student will spend on the project.<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li><strong>Project proposal abstract: <\/strong>The abstract should contain the following:\r\n<ul>\r\n \t<li>A\u00a0nontechnical\u00a0description of the project that states the problem to be studied and explains the project\u2019s broader significance and importance.<\/li>\r\n \t<li>A technical description of the project that states the goals and scope of the research, and the methods and approaches to be used.<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<strong>Proposal body:<\/strong>\u00a0 The proposal body should include the following information:\r\n<ul>\r\n \t<li><strong>Project description: <\/strong>Include what\u00a0set of questions\u00a0based on the identified research scenarios\u00a0above,\u00a0will be addressed\u00a0and how they\u00a0will\u00a0be addressed. Describe\u00a0how answering these questions\u00a0will\u00a0help advance\u00a0the state-of-the-art in\u00a0security research.<\/li>\r\n \t<li><strong>Approach: <\/strong>Describe\u00a0the methodological and theoretical approach that the researchers will\u00a0use. Explain exactly how the researchers\u00a0will\u00a0go about answering the question.\u00a0Describe how the researchers will handle the legal and ethical challenges of doing work in this area.\u00a0This section should also describe how the university\u00a0MSecAI\u00a0team proposes to work with Microsoft counterparts (researchers and engineers) to ensure\u00a0an\u00a0effective and positive collaboration.<\/li>\r\n \t<li><strong>Resources: <\/strong>Proposals should specify if and how Microsoft technologies will be used, namely (1) APIs, (2) Data sets, etc. if applicable.<\/li>\r\n \t<li><strong>Expected results: <\/strong>Briefly describe what new knowledge is likely to be generated\u00a0as a result\u00a0of\u00a0this research,\u00a0why these results would be significant, and how this could benefit\u00a0information workers of tomorrow.<\/li>\r\n \t<li><strong>Related research: <\/strong>Briefly summarize related research, including references where appropriate.<\/li>\r\n \t<li><strong>Researcher roles: <\/strong>Describe the role of each researcher involved in the project and explain how their skills and knowledge enable them to address the proposed research.<\/li>\r\n \t<li><strong>~12-18-month Timeline\/Workplan and Schedule: <\/strong>Describe what milestones will be used to measure progress of the project during the year and when they\u00a0will\u00a0be completed.\u00a0If the project is part of a larger ongoing research program, estimate the time for completion of this project only.\u00a0It is expected that\u00a0the award\u00a0will be made on or after June 18, 2021. Project timelines should reflect starting times on or\u00a0shortly\u00a0after this date.<\/li>\r\n \t<li><strong>Use of funds: <\/strong>Provide a budget (in U.S. dollars) describing how the award will be used. The budget should be presented as a table with the total budget request clearly indicated.\u00a0Microsoft will consider requests for Azure credits necessary to conduct research. Value of Azure credits will not be considered a part of the budget request.\u00a0Azure requests should be\u00a0included in the budget table.<\/li>\r\n \t<li><strong>Other support: <\/strong>Include other contributions to this project (cash, goods, and services)\u00a0by your university or other sources, if any, but do not include the use of university\/organization facilities that are otherwise provided on an ongoing basis.\u00a0Describe other grants or funded research that may be leveraged to add value to this research effort.\u00a0Note:\u00a0authors of\u00a0the selected\u00a0proposal will be required to submit an original letter on their institution\u2019s letterhead, certifying the commitment of any additional or matching support described in the proposal.<\/li>\r\n<\/ul>"},{"id":2,"name":"FAQ","content":"[accordion]\r\n[panel header=\"Can multiple universities submit a joint\/single proposal?\"]\r\n\r\nYes, multiple universities can submit a joint\/single proposal together. Please clearly indicate in the budget section how the budget, not to exceed $150,000 USD, will be shared.[\/panel]\r\n\r\n[panel header=\"If a proposal is submitted by more than one university, jointly, is it possible for Microsoft to pay each university directly or do we need to subcontract to each other?\"]\r\n\r\nYes, Microsoft will pay each university directly provided the budget clearly illustrates the amount to be paid to each university with a total not to exceed $150,000 USD.[\/panel]\r\n\r\n[panel header=\"How long can my proposed collaboration with Microsoft last?\"]\r\n\r\nProject timelines should be approximately 12-18 months. They should reflect the total time estimated to complete the research proposed.[\/panel]\r\n\r\n[panel header=\"Are proposals required to choose one of the research areas described in the RFP?\"]\r\n\r\nYes, proposals must indicate which of the listed research areas will be investigated as part of the proposed research to be eligible for consideration.[\/panel]\r\n\r\n[panel header=\"Is it a requirement or advisable to have a Microsoft champion who supports our proposal?\"]\r\nIt would be considered a positive for the proposal to have a researcher at Microsoft who is supportive, but we don\u2019t require it or expect it. If a researcher at Microsoft is interested in expressing support for your proposal, there is an opportunity during the proposal submission process to request their letter of recommendation. When received, it will be associated with your proposal and considered during the review.[\/panel]\r\n\r\n[panel header=\"Can proposal budget requests be less than $150,000 USD?\"]\r\nYes, proposal budget requests can be of any amount up to $150,000 USD.[\/panel]\r\n\r\n[panel header=\"Does the budget table specified in the Proposal Requirements section count toward the seven-page limit?\"]\r\nThe budget is part of the seven-page limit. Scholarly references\/bibliography can be submitted in addition to the seven pages and will not count toward the seven-page limit but all of the other required components will count toward the seven-page limit.[\/panel]\r\n\r\n[panel header=\"If we are to include a letter of support from our university, would this count towards the seven-page limit?\"]\r\nNo, letters of support will not count toward the seven-page limit.[\/panel]\r\n\r\n[panel header=\"Is it an issue if our cover page is more than one page if our proposal is still within the seven-page limit?\"]\r\nAs long as the full proposal doesn\u2019t exceed seven pages the rest of the section lengths are flexible.[\/panel]\r\n\r\n[panel header=\"The Selection Process and Criteria identifies \u201cEvidence of university support contributed in-kind to directly support and supplement the research efforts\u201d. Is Microsoft looking for cost-share commitments, and if so, is the cost-share considered mandatory or voluntary per the terms of the award?\"]\r\nWe would be looking for cost-share. This is not a mandatory requirement.[\/panel]\r\n\r\n[panel header=\"Will Microsoft consider indirect costs (since they are not allowed) evidence of university support?\"]\r\nWe would be looking for contributions that directly support the research efforts here so indirect-costs that cover items such as facilities and infrastructure would not count toward university support\/cost-share\/in-kind contribution.[\/panel]\r\n\r\n[panel header=\"Is there a percentage or dollar amount that is expected or required as evidence of university support?\"]\r\nSince this is not a requirement, there is no expected amount.[\/panel]\r\n\r\n[panel header=\"Is the money considered a 'gift'? Are there conditions put on the funds?\"]\r\nThe funds will be considered a gift that has no restrictions on how it is used. Budgets should reflect university\u2019s own policies for accepting unrestricted gifts[\/panel]\r\n\r\n[panel header=\"Can the grant money can be used by the receiving institutions freely, e.g. to pay an expert postdoc affiliated to one of the participating universities, however, residing in a different country during the project?\"]\r\nThere are no restrictions on how the funds are used. We do request that how the funds will be used is clearly illustrated in the required budget portion of the proposal.[\/panel]\r\n\r\n[panel header=\"Can funds be used to cover costs for Master\u2019s students?\"]\r\nThere are no restrictions on how the funds are used. We do request that how the funds will be used is clearly illustrated in the required budget portion of the proposal.[\/panel]\r\n\r\n[panel header=\"Are overhead and indirect costs allowable in the budget?\"]\r\nThe proposal budget should reflect your university\u2019s policies toward receiving unrestricted gifts and should emphasize allocation of funds toward completing the research proposed.[\/panel]\r\n\r\n[panel header=\"Is it possible to budget for some of the PI's time as part of the Microsoft Security AI Research Award?\"]\r\nAs unrestricted gifts, it will be entirely up to the winners to decide how to spend the award to achieve the research goals in the proposal.[\/panel]\r\n\r\n[panel header=\"To further improve and facilitate our research, would it be possible to access Microsoft's internal corpus of enterprise and\/or security relevant data ?\"]\r\nWe will not be able to provide access to any data that is not already publicly available.[\/panel]\r\n\r\n[panel header=\"Can the data and the results of the project be used for future research by the authors, as it is common in the context of commercial research grants?\"]\r\nYes, the results of this research are meant to be open and public for unrestricted use by future researchers and technologists.[\/panel]\r\n\r\n[panel header=\"We plan to have one mid-stage PhD student and three professors in the proposal. Is it advisable to have an additional professor, PhD student, or postdoc in our university MSecAI team?\"]\r\nYou are encouraged to assemble a team that is most likely to achieve the greatest results within the time and budget parameters required.[\/panel]\r\n\r\n[panel header=\"How implementation-centered should the planned research be? Is it also valuable for Microsoft to i) receive insights on how people work together using their current technology leading to implications for the design of their future tools or should be ii) more focus on creating tool prototypes, per se?\"]\r\n\r\nBoth of these scenarios are valuable. The results of this research will be open and public and so they are meant to drive future research and technology development. More insight on how people work together leading to implications for designs of future tools \u2013 though not designed just by Microsoft but others as well that are working in these topic areas would be of interest.\r\n\r\nHowever, if you feel you can develop breakthrough prototypes that also inform future research then that would also be interesting.[\/panel][\/accordion]"},{"id":3,"name":"Recipients","content":"<h2>2021 Microsoft Security Research AI RFP Winners<\/h2>\r\n<div style=\"height: 20px\"><\/div>\r\n<img class=\"size-full wp-image-755641 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/Amin-Kharraz.jpeg\" alt=\"Amin Kharraz, Florida International University\" width=\"150\" height=\"200\" \/>\r\n<h3>Amin Kharraz<\/h3>\r\nFlorida International University\r\n\r\n<strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research\r\n\r\n<strong>Title:<\/strong> WEBHASH: A Spatio-Temporal Deep Learning Approach for Detecting Social Engineering Attacks\r\n\r\n[accordion expandall=\"false\"][panel header=\"Abstract\"]Social engineering attacks continue to remain a top security threat. The impact of these attacks is often deep and consequential. Modern social engineering attacks have evolved to deliver different classes of malicious code while collecting extensive financial and personal information. Unfortunately, current mechanisms are woefully inadequate to identify and reason about such adversarial operations, leaving organizations and end-users open to a variety of consequential attacks. The goal of this project is to design principles that will guide the development of an unsupervised approach to automatically identify temporal drifts and detect emerging trends in the social engineering attack landscape. The core insight of our research is that most of social engineering campaigns rarely change the underlying software development techniques to build their attack pages and tend to reuse specific web development patterns to generate a diverse set of attack pages. In this proposal, we develop a novel similarity hashing mechanism, called WEBHASH, which takes into account the spatio-temporal characteristics of a target website and convert them into a vector that facilitates a low-overhead attribution and similarity testing at scale. We will take advantage of advances in machine learning and incorporate Siamese Neural Networks (SNNs) to conduct unsupervised similarity testing across the vectorized data. We posit that a number of useful activities can be performed with WEBHASH. By developing low latency detection and mitigation platforms for social engineering attacks, we can better protect organizations and institutions from data breaches and reduce users\u2019 exposure to modern social engineering attacks. WEBHASH also allows approximating the prevalence of an emerging social engineering threat or the adoption of new attack techniques across different campaigns with minimal human intervention.[\/panel][\/accordion]\r\n<div style=\"height: 20px\"><\/div>\r\n<img class=\"size-full wp-image-755635 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2021\/06\/zhou-yanning.jpg\" alt=\"Zhou Li and Yanning Shen\" width=\"295\" height=\"200\" \/>\r\n<h3>Zhou Li and Yanning Shen<\/h3>\r\nUniversity of California Irvine\r\n\r\n<strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research\r\n\r\n<strong>Title:<\/strong> Scalable Graph Learning for Automatic Detection of Spearphishing\r\n\r\n[accordion expandall=\"false\"][panel header=\"Abstract\"]In this project, we will tackle the problem of automated spearphishing detection. Spearphishing has become a primary attack vector to perpetuate entities in public and private sectors, causing billions of dollars loss annually. Due to the advanced social-engineering tricks performed by the attackers, spearphishing emails are often evasive, difficult to capture by the existing approaches based on malware detection, sender\/domain blacklisting, etc. To address this urgent threat, we will explore how to adapt state-of-the-art graph learning algorithms. In particular, we will first investigate how to model the email data as a graph, such that the spearphishing impersonators can be distinguished. Then, we will build a detection system with multi-kernel learning to capture the complex relationship between email users and their sending behaviors. For timely detection, we will examine how the trained classifier can be updated online with Random Feature based function estimation. Finally, we will derive the relation between different function estimators and the privacy levels. We expect this project to have profound impact on email security and research in graph learning.[\/panel][\/accordion]\r\n<div style=\"height: 40px\"><\/div>\r\n<h2>2020 Microsoft Security Research AI RFP Winners<\/h2>\r\n<div style=\"height: 20px\"><\/div>\r\n<img class=\"size-full wp-image-664620 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/06\/Song-Gao-Berkeley.jpg\" alt=\"Dawn Song and Peng Gao from UC Berkley\" width=\"295\" height=\"200\" \/>\r\n<h3>Dawn Song and Peng Gao<\/h3>\r\nUniversity of California, Berkeley\r\n\r\n<strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research\r\n\r\n<strong>Title:<\/strong> A Security Knowledge Graph for Automated Threat Intelligence Gathering and Management\r\n\r\n[accordion expandall=\"false\"][panel header=\"Abstract\"]Sophisticated cyber-attacks have plagued many high-profile businesses. To gain visibility into the fast-evolving threat landscape, open-source Cyber Threat Intelligence (OSCTI) has received growing attention from the community. Commonly, knowledge about a threat is presented in a vast number of OSCTI reports, detailing how the threat unfolds into multiple steps. Despite the pressing need for high-quality OSCTI, existing approaches, however, have primarily operated on fragmented threat indicators (e.g., Indicators of Compromise). On the other hand, descriptive relationships between threat indicators have been overlooked, which contain essential information on the threat behaviors that is critical to uncovering the complete threat scenario. Recognizing the limitation, this proposal seeks to design and develop an intelligent and scalable system for automated threat intelligence gathering and management. The proposed system will use a combination of AI-based methods to collect heterogeneous OSCTI data from various sources, extract comprehensive knowledge about threat behaviors in the form of security-related entities and their relations, construct a security knowledge graph from the extracted information, and update the knowledge graph by continuously learning from its deployment. We will also pursue possible security defensive applications that can be further empowered by OSCTI. The proposed work has a broad impact for advancing the state-of-the-art in threat intelligence gathering, management, and applications.[\/panel][\/accordion]\r\n<div style=\"height: 20px\"><\/div>\r\n<img class=\"size-full wp-image-664623 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/03\/Nick-Heard.jpg\" alt=\"Nick Heard, Department of Mathematics, Imperial College London\" width=\"150\" height=\"200\" \/>\r\n<h3>Nick Heard<\/h3>\r\nDepartment of Mathematics, Imperial College London\r\n\r\n<strong>Microsoft lead collaborator:<\/strong> M365 Security + Compliance Research\r\n\r\n<strong>Title:<\/strong> Understanding the enterprise: Host-based event prediction for automatic defence in cyber-security\r\n\r\n[accordion expandall=\"false\"][panel header=\"Abstract\"]The next generation of cyber-security challenges will demonstrate an increase in complexity and sophistication, aided by artificial intelligence. To counter this AI-driven threat, we propose to develop Bayesian statistical methodologies for adaptively designing robust, interpretable mathematical models of normal behaviour in new environments. These methodologies will provide new insights into enterprise systems, providing detailed under-standing of network assets and their relationships. These insights will inform enterprise risk-based assessments and enhance the detection and response to cyber threats. Challenges will include the fusion of diverse data sources, collected both within the network environment and externally, and securely sharing intelligence obtained from other platforms. To address these challenges, the proposed workflows will construct modelling frameworks for adaptively building probability distributions for predicting the future activity of a network host. Perspectives in both discrete time and continuous time, along with hybrids of the two, will be considered. Central to the model-building challenge will be developing principled methods for automatically identifying the quantity (either in terms of counts, or in time horizons) of historical data which should be conditioned upon in forming short-term and longer-term predictions. The principal modelling paradigm will be centered on a host-based approach, which has both the capacity to scale and be most sensitive to the protection of sensitive data. Additionally, there will be important scope for making inferences about large-scale network structure, to inform these host-based AI technologies about the position, importance and likely connectivity of the node within the network.[\/panel][\/accordion]\r\n<div style=\"height: 20px\"><\/div>\r\n<img class=\"size-full wp-image-664626 alignleft\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/03\/nicolas.jpg\" alt=\"Nicolas Papernot, University of Toronto, Department of Electrical and Computer Engineering\" width=\"154\" height=\"200\" \/>\r\n<h3>Nicolas Papernot<\/h3>\r\nUniversity of Toronto, Department of Electrical and Computer Engineering\r\n\r\n<strong>Microsoft lead collaborator:<\/strong> Azure Trustworthy Machine Learning + Microsoft Security Response Center (MSRC)\r\n\r\n<strong>Title:<\/strong> Towards Machine Learning Governance\r\n\r\n[accordion expandall=\"false\"][panel header=\"Abstract\"]The predictions of machine learning (ML) systems often appear fragile, with no hint as to the reasoning behind them\u2014and may be dangerously wrong. This is unacceptable: society must be able to trust and hold to account ML. This proposal seeks to empower ML developers and engineers to develop and design ML systems that are secure and provide the tools that enable its users to manage security, legal, and regulatory standards. Our efforts achieve this through the development of machine learning governance. We focus our efforts around two attack vectors: (1) input manipulations at training and test time that target the ML system\u2019s integrity and (2) model inversion and extraction that target the privacy of training data and the confidentiality of model architectural details. We propose to tackle the first attack vector through the development of robust model uncertainty estimates, the identification of coresets in ML, and the creation of computationally efficient influence metrics. We approach the second attack vector by focusing on the life of ML systems after they have been trained: we will pursue model watermarking, machine unlearning, and the identifiability of ML outputs.[\/panel][\/accordion]"}],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-academic-program\/640278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-academic-program"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-academic-program"}],"version-history":[{"count":21,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-academic-program\/640278\/revisions"}],"predecessor-version":[{"id":1016898,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-academic-program\/640278\/revisions\/1016898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/498056"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=640278"}],"wp:term":[{"taxonomy":"msr-opportunity-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-opportunity-type?post=640278"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=640278"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=640278"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=640278"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=640278"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=640278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}