C3.ai Digital Transformation Institute Announces Research Awards for AI to Transform Cybersecurity and Secure Critical Infrastructure
C3.ai Digital Transformation Institute (C3.ai DTI) today announced the third round of C3.ai DTI funded advanced research awards, focused on using artificial intelligence (AI) to harden information security and secure critical infrastructure.
The Institute awarded a total of $6.5 million in cash awards to leading research scientists at University of California, Berkeley, University of Illinois at Urbana-Champaign, Carnegie Mellon, Princeton, University of Chicago, KTH Royal Institute of Technology, and MIT.
“Cybersecurity is an immediate existential issue,” said Thomas M. Siebel, chairman and CEO of C3 AI, a leading enterprise AI software provider. “We are equipping top scientists with the means to advance technology to help secure critical infrastructure.”
Twenty-four projects were awarded $100,000 to $700,000 each, for an initial period of one year:
AI Resilience: Techniques and methods to enable the development of AI algorithms that are resilient to adversarial attacks
- “High Performance Provably Robust AI Methods for Cybersecurity Tasks on Critical Infrastructure,” (Zico Kolter, Carnegie Mellon University)
- “Scalable, Secure Machine Learning in the Presence of Adversaries,” (John Kubiatowicz, University of California, Berkeley)
- “REFL: Resilient Distributed Cybersecurity Learning System,” (Bo Li, University of Illinois at Urbana-Champaign)
- “Fundamental Limits on the Robustness of Supervised Machine Learning Algorithms,” (Ben Zhao, University of Chicago)
Anomaly Detection: AI techniques, including supervised and unsupervised learning, to provide early detection of system and/or network anomalies that might be indicative of unauthorized access, denial of service, or data exfiltration
- “Continuously and Automatically Discovering and Remediating Internet-Facing Security Vulnerabilities,” (Nick Feamster, University of Chicago)
- “AI Techniques for Power Systems Under Cyberattacks,” (Javad Lavaei, University of California, Berkeley)
- “Physics-aware AI-based Approach for Cyber Intrusion Detection in Substation Automation Systems,” (Alberto Sangiovanni-Vincentelli, University of California, Berkeley)
Advanced Persistent Threats: AI techniques to detect the presence of advanced persistent threats
- “Deep-Learning Detection Algorithms for Advanced Persistent Attacks in Mixed-Autonomy Traffic: Design and Experimental Validation,” (Alex Bayen, University of California, Berkeley)
- “AI Support for Cybersecurity,” (David Wagner, University of California, Berkeley)
Securing Critical Cyber-Physical Infrastructure: AI techniques to secure critical infrastructure against cyber threats
- “Cyber Safety Cage for Networks,” (Cyrille Valentin Artho, KTH Royal Institute of Technology)
- “Security for Large-Scale Infrastructure using Probabilistic Programming,” (Nikita Borisov, University of Illinois at Urbana-Champaign)
- “A Compositional Neural Certificate Framework for Securing Critical Networked Infrastructure,” (Chuchu Fan, Massachusetts Institute of Technology)
- “Democratizing AI-Driven Security Workflows for Critical Energy Infrastructure,” (Vyas Sekar, Carnegie Mellon University)
- “Semantic Adversarial Analysis for Secure Critical Infrastructure,” (Sanjit Seshia, University of California, Berkeley)
Forensics: AI forensics and attribution techniques to identify sources of attacks
- “Causal Reasoning for Real-Time Attack Identification in Cyber-Physical Systems,” (György Dán, KTH Royal Institute of Technology)
- “Statistical Learning Theory and Graph Neural Networks for Identifying Attack Sources,” (H. Vincent Poor, Princeton University)
- “Robust and Scalable Forensics for Deep Neural Networks,” (Ben Zhao, University of Chicago)
Securing Emerging Financial Infrastructure: AI techniques to identify attacks on emerging decentralized financial and business infrastructure
- “An Intelligence Platform for Better Security in Decentralized Finance,” (Dawn Song, University of California, Berkeley)
- “Blockchain Forensics,” (Pramod Viswanath, University of Illinois at Urbana-Champaign)
Vulnerability Identification: AI techniques to identify previously unknown malware, ransomware, and zero-day vulnerabilities, enabling isolation and neutralization
- “GAN-Aided Automatic Test Case Generation,” (Giulia Fanti, Carnegie Mellon University)
- “Machine Learning for JavaScript Vulnerability Detection,” (Corina Pasareanu, Carnegie Mellon University)
Insider Threats: Change management techniques to prevent the weaponization of innocent and malicious insiders
- “Protecting Critical Infrastructures Against Evolving Insider Threats,” (Carl Gunter, University of Illinois at Urbana-Champaign)
- “Multi-Facet Rare Event Modeling of Adaptive Insider Threats,” (Jingrui He, University of Illinois at Urbana-Champaign)
- “AI-Supported Nudging for Cyber-Hygiene,” (Cedric Langbort, University of Illinois at Urbana-Champaign)
Award Criteria
C3.ai DTI selects research proposals that inspire cooperative research and advance machine learning and other AI subdisciplines. Projects are peer-reviewed on scientific merit, prior accomplishments of the principal investigator and co-principal investigators, the use of AI, machine learning, data analytics, and cloud computing in the research project, and the suitability for testing the methods at scale. Visit C3DTI.ai to learn more about the Institute’s programs, award opportunities, and selected research proposals.
About C3.ai Digital Transformation Institute
Established in March 2020 by C3 AI, Microsoft, and leading universities, the C3.ai Digital Transformation Institute is a research consortium dedicated to accelerating the benefits of artificial intelligence for business, government, and society. The Institute engages the world’s leading scientists to conduct research and train practitioners in the new Science of Digital Transformation — operating at the intersection of artificial intelligence, machine learning, cloud computing, internet of things, big data analytics, organizational behavior, public policy, and ethics.
The 10 C3.ai Digital Transformation Institute consortium member universities and laboratories are: University of California, Berkeley, University of Illinois at Urbana-Champaign, Carnegie Mellon University, KTH Royal Institute of Technology, Lawrence Berkeley National Laboratory, Massachusetts Institute of Technology, National Center for Supercomputing Applications at University of Illinois at Urbana-Champaign, Princeton University, Stanford University, and University of Chicago. Additional industry partners include AstraZeneca, Baker Hughes, and Shell.
To support the Institute, C3 AI is providing the Institute $57,250,000 in cash contributions over the initial five years of operation. In addition to cash awards, C3.ai DTI provides researchers with cloud computing, supercomputing, data, and software resources, including free, unlimited use of the C3 AI Application Platform, up to $2 million in Azure Cloud computing resources, and access to High Performance Computing (HPC) resources at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign and Lawrence Berkeley National Laboratory’s National Energy Research Scientific Computing Center (NERSC).
About C3.ai, Inc.
C3 AI is the Enterprise AI application software company. C3 AI delivers a family of fully integrated products including the C3 AI Application Platform, an end-to-end platform for developing, deploying, and operating enterprise AI applications and C3 AI Applications, a portfolio of industry-specific SaaS enterprise AI applications that enable the digital transformation of organizations globally. Learn more at: www.c3.ai.
To view this piece of content from cts.businesswire.com, please give your consent at the top of this page.
View source version on businesswire.com: https://www.businesswire.com/news/home/20220324005202/en/
Contact information
C3.ai DTI Contact:
Kap Stann
Communications Manager, C3.ai DTI @ Berkeley
510-295-9685
kstann@berkeley.edu
C3 AI Public Relations:
Edelman
Lisa Kennedy
415-914-8336
pr@c3.ai
C3 AI Investor Relations
ir@c3.ai
About Business Wire
For more than 50 years, Business Wire has been the global leader in press release distribution and regulatory disclosure.
Subscribe to releases from Business Wire
Subscribe to all the latest releases from Business Wire by registering your e-mail address below. You can unsubscribe at any time.
Latest releases from Business Wire
Tigo Energy and Weco Certify MLPE-Inverter Compatibility to Simplify PV System Design16.1.2026 07:00:00 EET | Press release
Tigo Energy, Inc. (NASDAQ: TYGO) (“Tigo” or “Company”), a leading provider of intelligent solar and energy software solutions, today announced the Company has signed a certificate of compatibility with Weco S.r.l., documenting the compatibility between Tigo Flex MLPE products and hybrid solar inverters from Weco. The certification covers certain single-phase and three-phase Weco products and members of the Tigo TS4-A and TS4-X product families, when properly designed and installed. Together, these products are designed to deliver high-quality, enhanced value through a system that generates and manages solar energy more efficiently and delivers the features residential energy customers demand. “The compatibility between our inverter solutions and Tigo optimizers represents a significant step forward for the entire industry, and confirms our commitment to simplifying the work of solar professionals,” said Federico Cusumano, R&D manager at Weco S.r.l. “Thanks to this certification, design
Binarly to Unveil “Broken Trust” Research: Firmware Bypass Chains, BMC Persistence, and EDR Evasion16.1.2026 00:04:00 EET | Press release
Binarly, the industry leader in software and firmware supply-chain security, today announced an upcoming DistrictCon presentation “Broken Trust: Firmware Bypass Chains, BMC Persistence, and EDR Evasion.” The session will detail how firmware-level attack chains observed in shipped enterprise devices can effectively undermine modern endpoint defenses, enabling stealthy compromise and long-lived persistence. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115834965/en/ Binarly Unveils Broken Trust Research: Firmware Bypass, BMC Persistence In this presentation, the Binarly REsearch team will dismantle the assumption of hardware trust by presenting multiple real-world firmware bypass chains. Alex Matrosov and Fabio Pagani will provide a deep dive into the specific vulnerability classes and exploitation primitives that make these attacks reliable in practice. The team will also deliver a live demonstration compromising a fully
World Economic Forum and Salesforce Empower Global Leaders With First-of-its-Kind Agentic Assistant for the 2026 Annual Meeting in Davos15.1.2026 20:06:00 EET | Press release
Salesforce (NYSE: CRM), the world’s #1 CRM, today announced the activation of the World Economic Forum’s institutional knowledge powered by Agentforce 360 to support over 3,000 of the world’s most influential leaders at the 2026 World Economic Forum Annual Meeting. The Forum has launched a new proactive, high-precision concierge app, “EVA,” built on the Agentforce 360 Platform, Salesforce’s agentic platform. EVA will empower attendees to move beyond traditional information access, with an AI agent that doesn’t just answer questions, but can reason, prioritize, and act on a leader’s behalf for the 2026 Annual Meeting. This press release features multimedia. View the full release here: https://www.businesswire.com/news/home/20260115571119/en/ Scheduled for January 19–23 in Davos, Switzerland, this year’s event is set to be the largest meeting in the organization's history. With over 450 high-impact sessions and thousands of specialized interactions, the gap between available insight and
Coolbrook Named on the 2026 Global Cleantech 10015.1.2026 19:14:00 EET | Press release
Coolbrook, a transformational technology and engineering company on a mission to decarbonise major industrial sectors like petrochemicals and chemicals, iron and steel, aluminium, and cement, has been named on Cleantech Group’s 2026 Global Cleantech 100. This annual list recognizes companies poised to deliver market-ready solutions that advance a cleaner, more resilient global future. The report highlights innovators addressing some of the world’s most urgent environmental and infrastructure challenges. The complimentary report introduces you to innovators advancing groundbreaking technologies and business models to enable us to act on the ever-increasing climate and environmental crisis. Following a 2025 marked by geopolitical volatility and shifting economic signals, the global cleantech ecosystem enters 2026 with slightly greater certainty - yet heightened competitive pressure. Growth is concentrating around two dominant themes: AI infrastructure and critical minerals. “The 2026 Glo
Frasca to Supply Four New Flight Training Devices to Global Medical Response15.1.2026 17:05:00 EET | Press release
Frasca International, Inc., a FlightSafety International company, today announced it has signed a contract with Global Medical Response (GMR) to supply four new Level 7 Flight Training Devices (FTDs). The new devices include an Airbus EC135, a Pilatus PC-12, a Beechcraft C90, and a Beechcraft B200. Each FTD will feature Frasca's unique motion system to provide enhanced realism in training. The devices will be installed at GMR’s new training facility currently under construction in Denton, Texas. Frasca has supported GMR’s pilot training efforts for nearly two decades, beginning with the delivery of their first device in 2005 for Air Evac Lifeteam, a GMR company. Since then, Frasca simulators have played a central role in preparing GMR’s flight crews for the complex and high-stakes environments they encounter in emergency medical operations. With the delivery of these new devices, GMR will operate a total of 15 Frasca simulators, including seven Level 7 FTDs and eight Helicopter Trainin
In our pressroom you can read all our latest releases, find our press contacts, images, documents and other relevant information about us.
Visit our pressroom
