{"id":523,"date":"2025-01-04T00:43:02","date_gmt":"2025-01-04T00:43:02","guid":{"rendered":"https:\/\/www.isi.edu\/proxy-sphere\/?page_id=523"},"modified":"2026-01-27T17:08:35","modified_gmt":"2026-01-27T17:08:35","slug":"copy","status":"publish","type":"page","link":"https:\/\/www.isi.edu\/proxy-sphere\/","title":{"rendered":"Homepage"},"content":{"rendered":"\n\n\t<div class=\"latest-widget\"><a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/sphere-and-trusted-ci-collaborate-to-strengthen-research-security\/\" id=\"lead-story\">\n                    <article class=\"row\"><figure class=\"col-lg-8 col-12\"><img loading=\"lazy\" decoding=\"async\" width=\"2000\" height=\"1000\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture.jpg 2000w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture-300x150.jpg 300w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture-1024x512.jpg 1024w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture-768x384.jpg 768w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2026\/02\/sphere-tci-residency-team-picture-1536x768.jpg 1536w\" sizes=\"auto, (max-width: 2000px) 100vw, 2000px\" \/><\/figure><section class=\"col-lg-4 col-12\">\n                                <div>\n                                    <h3 class=\"my-lg-0 my-4\">SPHERE and Trusted CI Collaborate to Strengthen Research Security<\/h3><\/div>\n                                <\/section>\n                            <\/article><!-- row --><\/a><!-- lead story -->\n\t\t\t\t            <div class=\"row mx-0\">\n\t\t\t                    <div class=\"col-lg-8 col-12 px-0\">\n\t\t\t\t\t                <div class=\"row\"><article class=\"news-item col-12 col-lg-6\">\n                <a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/sphere-at-acsac-2025-in-honolulu-community-outreach-and-engagement\/\" class=\"d-block news-photo\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"600\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/sphere-acsac-2025-picture-1.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/sphere-acsac-2025-picture-1.jpg 1200w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/sphere-acsac-2025-picture-1-300x150.jpg 300w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/sphere-acsac-2025-picture-1-1024x512.jpg 1024w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/sphere-acsac-2025-picture-1-768x384.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><h3 class=\"no-tail mt-3 mb-4\">SPHERE at ACSAC 2025 in Honolulu: Community Outreach, Engagement, and Impact<\/h3><\/a><\/article><article class=\"news-item col-12 col-lg-6\">\n                <a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/sphere-featured-in-the-usc-isi-2024-year-in-review\/\" class=\"d-block news-photo\"><h3 class=\"no-tail mt-3 mb-4\">SPHERE featured in the USC ISI 2024 Year in Review<\/h3><\/a><\/article><article class=\"news-item col-12 col-lg-6\">\n                <a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/call-for-representative-experimentation-environments-rees\/\" class=\"d-block news-photo\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"600\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/03\/REEs.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/03\/REEs.jpg 1200w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/03\/REEs-300x150.jpg 300w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/03\/REEs-1024x512.jpg 1024w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/03\/REEs-768x384.jpg 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><h3 class=\"no-tail mt-3 mb-4\">Call for Representative Experimentation Environments (REEs)<\/h3><\/a><\/article><article class=\"news-item col-12 col-lg-6\">\n                <a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/sphere-at-ndss-symposium-2025\/\" class=\"d-block news-photo\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"600\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/02\/0128-em-ndss-symposium.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/02\/0128-em-ndss-symposium.png 1200w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/02\/0128-em-ndss-symposium-300x150.png 300w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/02\/0128-em-ndss-symposium-1024x512.png 1024w, https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/02\/0128-em-ndss-symposium-768x384.png 768w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><h3 class=\"no-tail mt-3 mb-4\">Meet SPHERE at NDSS Symposium 2025<\/h3><\/a><\/article>\n\t\t    <\/div><!-- .row -->\n\t\t\t<div class=\"widget-footer\">\n\t\t\t\t<a href=\"https:\/\/www.isi.edu\/proxy-sphere\/about\/news\/\" class=\"btn\">View All News<\/a>\n\t\t\t<\/div>\n\t\t<\/div><!-- news col --><div class=\"col-lg-4 col-12 upcoming-events\">\n                    <div class=\"wrapper\">\n                        <h2>Upcoming Events<\/h2><em>There are no upcoming events. Please check back later.<\/em><div class=\"widget-footer mb-4\">\n\t\t\t\t<a href=\"https:\/\/www.isi.edu\/proxy-sphere\/events\/\" class=\"btn\">View All Events<\/a>\n\t\t\t<\/div><\/div>\n                <\/div><!-- events col -->\n            <\/div><!-- group row -->\n        <\/div><!-- latest-widget -->\n<h3>\n\t\t\tSPHERE RESEARCH INFRASTRUCTURE\t<\/h3>\n<p>SPHERE (Security and Privacy Heterogeneous Environment for Reproducible Experimentation) is a public research testbed funded by the NSF and constructed by the <a href=\"https:\/\/www.isi.edu\">USC Information Sciences Institute<\/a>, <a href=\"https:\/\/www.khoury.northeastern.edu\/\">Northeastern University Khoury College of Computer Sciences<\/a>, and the <a href=\"https:\/\/www.cs.utah.edu\/\">University of Utah Kahlert School of Computing<\/a>. It supports integrated, reproducible cybersecurity and privacy research through access to diverse, user-configurable hardware, software, and networking resources via six specialized user portals. It aims to transform cybersecurity and privacy research, enabling representative, sophisticated, and reproducible experimentation that allows researchers to build on the work of their peers, thus supercharging scientific progress. In addition to scientific experimentation, SPHERE enables a broad range of activities including education, workforce training, cybersecurity exercises, and rigorous test and evaluation.<\/p>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png\" alt=\"SPHERE aims to transform cybersecurity and privacy research into a highly integrated, community-wide effort by providing a common, rich, and representative research infrastructure.\" height=\"1080\" width=\"1080\" title=\"OUR VISION\" loading=\"lazy\" \/>\n\t\t\t\t\t\tSPHERE aims to transform cybersecurity and privacy research into a highly integrated, community-wide effort by providing a common, rich, and representative research infrastructure.\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/8.png\" alt=\"SPHERE is in its third year out of four funded years. We have started development of general-purpose, ML, IoT, CPS, and embedded enclaves, and some general-purpose nodes and IoT devices are already available to beta users.\" height=\"1080\" width=\"1080\" title=\"CUURENT STATUS\" loading=\"lazy\" \/>\n\t\t\t\t\t\tSPHERE is in its third year out of four funded years. We have started development of general-purpose, ML, IoT, CPS, and embedded enclaves, and some general-purpose nodes and IoT devices are already available to beta users.\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2024\/12\/DIVERSE-HARDWARE-1.jpg\" alt=\"Diverse hardware to support diverse research needs (nearly 90% of today&#039;s publications): general and embedded compute nodes with trusted hardware, PLCs and IoT devices, programmable switches and NICs, and GPU-equipped nodes.\" height=\"1080\" width=\"1080\" title=\"DIVERSE HARDWARE\" loading=\"lazy\" \/>\n\t\t\t\t\t\tDiverse hardware to support diverse research needs (nearly 90% of today&#8217;s publications): general and embedded compute nodes with trusted hardware, PLCs and IoT devices, programmable switches and NICs, and GPU-equipped nodes.\n    Move your mouse to discover and learn about the components of the SPHERE architecture\n<!-- Main content -->\n    <img decoding=\"async\" title=\"new graph\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2024\/11\/new-graph-1536x740.jpg\" alt=\"new graph\" \/>\n    <!-- GUI portal -->\n            GUI portal\n            This Graphical User Interface portal enables users to draw and annotate network topologies and workflows through intuitive visual tools, designed for accessibility by novice users.\n    <!-- 1 GUI portal -->\n            GUI portal\n            This Graphical User Interface portal enables users to draw and annotate network topologies and workflows through intuitive visual tools, designed for accessibility by novice users.\n    <!-- MAN portal -->\n            MAN portal\n            The Manual portal provides advanced SSH-based access for expert users to directly control experimental nodes and conduct exploratory research with maximum flexibility in testbed resource manipulation.\n    <!-- 2 MAN portal -->\n            MAN portal\n            The Manual portal provides advanced SSH-based access for expert users to directly control experimental nodes and conduct exploratory research with maximum flexibility in testbed resource manipulation.\n    <!-- JUP portal -->\n            JUP portal\n            Through the Jupyter portal, mature experimental workflows are documented and automated using notebook interfaces, ensuring research reproducibility and systematic execution.\n    <!-- 3 JUP portal -->\n            JUP portal\n            Through the Jupyter portal, mature experimental workflows are documented and automated using notebook interfaces, ensuring research reproducibility and systematic execution.\n    <!-- HUM portal -->\n            HUM portal\n            Operating as a Human Study portal, this platform facilitates researcher deployment of innovations and systematic collection of participant feedback through structured interaction pathways on the SPHERE platform.\n    <!-- 4 HUM portal -->\n            HUM portal\n            Operating as a Human Study portal, this platform facilitates researcher deployment of innovations and systematic collection of participant feedback through structured interaction pathways on the SPHERE platform.\n    <!-- AEC portal -->\n            AEC portal\n            Functioning as the Artifact Evaluation Committee portal, this system connects paper authors with reviewers on shared infrastructure, supporting the submission, assessment, and archival of research artifacts for community reuse.\n    <!-- 5 AEC portal -->\n            AEC portal\n            Functioning as the Artifact Evaluation Committee portal, this system connects paper authors with reviewers on shared infrastructure, supporting the submission, assessment, and archival of research artifacts for community reuse.\n    <!-- EDU portal -->\n            EDU portal\n            Serving as an Education portal, this platform empowers teachers to create student accounts, upload materials, and design cybersecurity assignments featuring attack-defense scenarios in contained network environments.\n    <!-- 6 EDU portal -->\n            EDU portal\n            Serving as an Education portal, this platform empowers teachers to create student accounts, upload materials, and design cybersecurity assignments featuring attack-defense scenarios in contained network environments.\n    <!-- REE library -->\n            REE library\n            The Representative Experimentation Environment library serves as a crowdsourced collection of standardized evaluation environments for cybersecurity and privacy research, built through annual funding programs where artifact authors port mature research as virtual interns to create field-specific benchmarks.\n    <!-- 7 REE library -->\n            REE library\n            The Representative Experimentation Environment library serves as a crowdsourced collection of standardized evaluation environments for cybersecurity and privacy research, built through annual funding programs where artifact authors port mature research as virtual interns to create field-specific benchmarks.\n    <!-- 7 REE library -->\n            REE library\n            The Representative Experimentation Environment library serves as a crowdsourced collection of standardized evaluation environments for cybersecurity and privacy research, built through annual funding programs where artifact authors port mature research as virtual interns to create field-specific benchmarks.\n    <!-- Research artifact library -->\n            Research artifact library\n            A comprehensive archive system that enables users to package, store, and share their research artifacts, featuring built-in support for experimental workflows and automatic recording of exploratory research actions, while maintaining verified reproducibility badges from evaluation committees.\n    <!-- 8 Research artifact library -->\n            Research artifact library\n            A comprehensive archive system that enables users to package, store, and share their research artifacts, featuring built-in support for experimental workflows and automatic recording of exploratory research actions, while maintaining verified reproducibility badges from evaluation committees.\n    <!-- Merge Portal -->\n            Merge Portal\n            Kubernetes-based frontend implementation delivers core API services for experiment compilation and realization, alongside XDC (Experiment Development Container) pods that enable secure user access through SSH\/Jupyter interfaces and connect to backend facilities via VPN tunnels. This microservice architecture supports flexible integration and scalable testbed operations.\n    <!-- Merge Facilities -->\n            Merge Facilities\n            Distributed backend resources combine infrastructure services and podman-containerized core API components with Qemu\/KVM virtualization for user experiments, leveraging Cumulus Linux switches for VXLAN-based network segmentation. The system maintains strictly separated networks for infrastructure control and experiment traffic, while supporting multi-facility integration through the Merge Facility API.\n    <!-- Machine learning nodes -->\n            Machine learning nodes\n            Ten powerful GPU-equipped servers are crucial in developing cybersecurity systems incorporating real-time machine learning detection and response capabilities.\n    <!-- Embedded compute nodes -->\n            Embedded compute nodes\n            The embedded-compute infrastructure, featuring 400 diverse nodes with CPUs and GPUs, forms a robust backbone for exploring edge security paradigms and advancing federated learning protocols in secure environments.\n    <!-- General compute nodes -->\n            General compute nodes\n            Empowering privacy-centric experimentation, the 200 general-compute nodes integrate specialized processor architectures like Intel TDX and AMD SEV, enabling researchers to conduct large-scale security measurements and trustworthy computing investigations.\n    <!-- Embedded CPS -->\n            Embedded CPS\n            Critical infrastructure protection research finds its home in the cyber-physical systems setup, where complete architectures emulate industrial control systems, allowing security researchers to test and validate defensive measures for vital facilities.\n    <!-- Software-defined networking nodes -->\n            Software-defined networking nodes\n            A network of 40 nodes equipped with NetFPGAs provide a programmable foundation for investigating SDN security improvements and implementing flexible network defense mechanisms.\n    <!-- FABRIC -->\n            FABRIC\n            FABRIC, a distributed research infrastructure spanning 29 sites with high-speed optical connections, enables SPHERE to link its IoT enclave at Northeastern University with USC-ISI and USC facilities. This connectivity, combined with Merge software, allows SPHERE to create unified experimental topologies across geographically distributed enclaves.\n    <!-- IoT (smart) nodes -->\n            IoT (smart) nodes\n            The expansive collection of 500 IoT nodes, spanning various smart devices and appliances, serves as a comprehensive testbed for exploring IoT security vulnerabilities and developing privacy-preserving solutions for connected environments.\n    <!-- right Security policies -->\n            Security policies\n            The portal&#8217;s security policies define three tiers of experiment access: (1) standard policies allow basic Internet connectivity (HTTP, HTTPS, SSH) for common research needs, (2) expanded policies permit broader Internet access with automated monitoring for riskier research like Internet-wide measurements, and (3) containment policies enforce complete isolation for maximum-risk experiments requiring strict security controls.\n    <!-- left Security policies -->\n            Security policies\n            The portal&#8217;s security policies define three tiers of experiment access: (1) standard policies allow basic Internet connectivity (HTTP, HTTPS, SSH) for common research needs, (2) expanded policies permit broader Internet access with automated monitoring for riskier research like Internet-wide measurements, and (3) containment policies enforce complete isolation for maximum-risk experiments requiring strict security controls.\n\n\/* Essential hover styles *\/\n[style*=&#8221;position: absolute&#8221;][style*=&#8221;cursor: pointer&#8221;]:hover &gt; [style*=&#8221;display: none&#8221;] {\n    display: block !important;\n}\n\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2024\/12\/USER-PORTALS-1.jpg\" alt=\"Six user portals to meet the needs of different user groups, including advanced researchers (MAN), Jupyter notebooks (JUP), novice users (GUI), teachers and students (EDU), human user studies (HUM), and artifact evaluation committees (AEC).\" height=\"1080\" width=\"1080\" title=\"USER PORTALS\" loading=\"lazy\" \/>\n\t\t\t\t\t\tSix user portals to meet the needs of different user groups, including advanced researchers (MAN), Jupyter notebooks (JUP), novice users (GUI), teachers and students (EDU), human user studies (HUM), and artifact evaluation committees (AEC).\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2024\/12\/FLEXIBLE-POLICIES-1.jpg\" alt=\"Security policies aligned with research needs, enabling experiments with full isolation, measurement research, software download, and risky experiments with malware.\" height=\"1080\" width=\"1080\" title=\"FLEXIBLE POLICIES\" loading=\"lazy\" \/>\n\t\t\t\t\t\tSecurity policies aligned with research needs, enabling experiments with full isolation, measurement research, software download, and risky experiments with malware.\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/12.png\" alt=\"Support for reproducibility, via easy experiment packaging, sharing, and reuse; processes and incentives for community-wide efforts to develop representative experimentation environments and to continuously contribute high-quality research artifacts.\" height=\"1080\" width=\"1080\" title=\"SUPPORT FOR REPRODUCIBILITY\" loading=\"lazy\" \/>\n\t\t\t\t\t\tSupport for reproducibility, via easy experiment packaging, sharing, and reuse; processes and incentives for community-wide efforts to develop representative experimentation environments and to continuously contribute high-quality research artifacts.\n<h3>\n\t\t\tGETTING STARTED WITH SPHERE\t<\/h3>\n<p>While the SPHERE infrastructure is still undergoing construction, it is open to beta users using currently available resources. To begin using SPHERE, click the\u00a0<b>&#8220;Register&#8221;<\/b>\u00a0button in the top-right corner of the homepage to create an account; returning users can log in via the adjacent\u00a0<b>&#8220;Login&#8221;<\/b>\u00a0button. Once approved, you can begin designing and running experiments using SPHERE&#8217;s intuitive interfaces and configurable infrastructure. The platform also provides user guides, tutorials, and community support to help you make the most of its capabilities.<\/p>\n<p>Researchers, educators, students, and industry partners can collaborate with SPHERE by contributing experiment artifacts, participating in community workshops, or integrating SPHERE into academic courses, training programs, or cybersecurity exercises.<\/p>\n\t\t<h3>HOW SHOULD I CITE SPHERE?<\/h3><p>If you use SPHERE in your research and publish results based on that work, we would appreciate a citation to SPHERE. At present, the best reference is:<\/p>\n<p>Jelena Mirkovic, David Balenson, Brian Kocoloski. <em>Enabling Reproducibility through the SPHERE Research Infrastructure.<\/em> USENIX ;login: Online, USENIX Association, December 16, 2024. <a href=\"https:\/\/www.usenix.org\/publications\/loginonline\/enabling-reproducibility-through-sphere-research-infrastructure\" target=\"_blank\" rel=\"noopener\">https:\/\/www.usenix.org\/publications\/loginonline\/enabling-reproducibility-through-sphere-research-infrastructure<\/a><\/p>\n@inproceedings{mirkovic2024enabling,<br \/>\n\u00a0 title={Enabling reproducibility through the {SPHERE} research infrastructure},<br \/>\n\u00a0 author={Mirkovic, J and Kocoloski, B and Balenson, D},<br \/>\n\u00a0 booktitle={Usenix ;login Magazine},<br \/>\n\u00a0 year={2024}<br \/>\n}\n<strong>REPORT YOUR PUBLICATION:<\/strong> To help us document SPHERE&#8217;s impact, support discovery of SPHERE-enabled research, and report outcomes to our sponsors, we also invite authors to let us know about publications that used the SPHERE research infrastructure. If you have published a conference paper, journal article, technical report, thesis, or similar scholarly output that relied on SPHERE, please submit one publication per entry using the following form: <a href=\"https:\/\/forms.gle\/1XHgsBGQViVJTyvE6\" target=\"_blank\" rel=\"noopener\">https:\/\/forms.gle\/1XHgsBGQViVJTyvE6<\/a>.\n\t\t<h3>CALL FOR REPRESENTATIVE EXPERIMENT ENVIRONMENTS (REEs)<\/h3>\n\t\tReproducibility is essential to scientific progress, yet it remains a persistent challenge in computer science, particularly in systems, networking, and cybersecurity and privacy research. SPHERE addresses this challenge by supporting reusable, transparent research artifacts that make it easier for others to build on prior work. To advance this goal, the SPHERE research infrastructure solicits Representative Experimentation Environments (REEs) for integration into SPHERE.\nSelected REE contributors receive paid virtual internships to port their environments to SPHERE, increasing accessibility and long-term impact. Submissions are accepted on a rolling basis throughout the year, and applicants may indicate their preferred start term (spring, summer, or fall). To be considered for a summer internship, submissions must be received by April 15.\n\t\t\t<a href=\"https:\/\/www.isi.edu\/proxy-sphere\/collaborate\/\" target=\"_self\">\n\t\t\t\t\t\t\tCALL FOR REES\n\t\t\t\t\t<\/a>\n\t\t<h3>SUMMER 2026 INTERNSHIP APPLICATIONS NOW ACCEPTED!<\/h3>\n\t\t<p>SPHERE in-person internships are available for undergraduate and graduate students seeking a blend of research and development experience. Internships are hosted at USC Information Sciences Institute in Los Angeles, the University of Utah in Salt Lake City, and Northeastern University in Boston. Applications are reviewed on a rolling basis and must be submitted by March 1.<\/p>\n\t\t\t<a href=\"https:\/\/www.isi.edu\/proxy-sphere\/collaborate\/\" target=\"_self\">\n\t\t\t\t\t\t\tStudent Internships\n\t\t\t\t\t<\/a>\n\t\t<h3>PLEASE TAKE OUR COMMUNITY NEEDS SURVEY<\/h3>\n\t\t<p>We are running a survey to learn about researcher needs around cybersecurity and privacy experimentation. Your input will inform our future endeavors in supporting cybersecurity experimentation through our recently funded SPHERE research infrastructure. We want to hear from a wide range of researchers, no experience is too small. The form has six open-ended questions, it is anonymous and you can skip any questions.<\/p>\n\t\t\t<a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLScdZJT2R_DDjPm2G5gVQVjXWZNKR-6GNM6kAzl8GOOGturENw\/viewform\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tSHARE RESEARCH NEEDS\n\t\t\t\t\t<\/a>\n\t\t<h3>SPHERE USER FEEDBACK SURVEY<\/h3>\n\t\t<p>We invite you to take the SPHERE User Feedback Survey. This short survey is intended for researchers, students, and collaborators who have used SPHERE resources and\/or interacted with the SPHERE team. Your feedback will help us improve SPHERE services, infrastructure, and user experience.<\/p>\n\t\t\t<a href=\"https:\/\/docs.google.com\/forms\/d\/e\/1FAIpQLScqJ93eDYm62R4DDT-d7CBTiz6FozuhInzQI7_XLo12MSQOJA\/viewform?usp=header\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tSHARE FEEDBACK\n\t\t\t\t\t<\/a>\n\n","protected":false},"excerpt":{"rendered":"<p>SPHERE Research Infrastructure is heading to the Internet Society Network and Distributed System Security (NDSS) Symposium 2025 in San Diego, California on February 24-28, 2025. NDSS is a leading security forum that fosters information exchange among researchers and practitioners of network and distributed system security. Principal Investigator, Jelena Mirkovic, and Community Outreach Director, David Balenson,&hellip;<\/p>\n","protected":false},"author":893,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"news_source":"","news_author":"","external_news_link":"","footnotes":""},"class_list":["post-523","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Homepage - SPHERE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isi.edu\/proxy-sphere\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Homepage - SPHERE\" \/>\n<meta property=\"og:description\" content=\"SPHERE RESEARCH INFRASTRUCTURE SPHERE (Security and Privacy Heterogeneous Environment for Reproducible Experimentation) is a public research testbed funded by the NSF and constructed by the USC Information Sciences Institute, Northeastern University Khoury College of Computer Sciences, and the University of Utah Kahlert School of Computing. It supports integrated, reproducible cybersecurity and privacy research through access&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isi.edu\/proxy-sphere\/\" \/>\n<meta property=\"og:site_name\" content=\"SPHERE\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T17:08:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Homepage - SPHERE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isi.edu\/proxy-sphere\/","og_locale":"en_US","og_type":"article","og_title":"Homepage - SPHERE","og_description":"SPHERE RESEARCH INFRASTRUCTURE SPHERE (Security and Privacy Heterogeneous Environment for Reproducible Experimentation) is a public research testbed funded by the NSF and constructed by the USC Information Sciences Institute, Northeastern University Khoury College of Computer Sciences, and the University of Utah Kahlert School of Computing. It supports integrated, reproducible cybersecurity and privacy research through access&hellip;","og_url":"https:\/\/www.isi.edu\/proxy-sphere\/","og_site_name":"SPHERE","article_modified_time":"2026-01-27T17:08:35+00:00","og_image":[{"url":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isi.edu\/proxy-sphere\/","url":"https:\/\/www.isi.edu\/proxy-sphere\/","name":"Homepage - SPHERE","isPartOf":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#primaryimage"},"image":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#primaryimage"},"thumbnailUrl":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png","datePublished":"2025-01-04T00:43:02+00:00","dateModified":"2026-01-27T17:08:35+00:00","breadcrumb":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isi.edu\/proxy-sphere\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isi.edu\/proxy-sphere\/#primaryimage","url":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png","contentUrl":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/01\/7.png","width":1080,"height":1080,"caption":"SPHERE aims to transform cybersecurity and privacy research into a highly integrated, community-wide effort by providing a common, rich, and representative research infrastructure."},{"@type":"BreadcrumbList","@id":"https:\/\/www.isi.edu\/proxy-sphere\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isi.edu\/proxy-sphere\/"},{"@type":"ListItem","position":2,"name":"Homepage"}]},{"@type":"WebSite","@id":"https:\/\/www.isi.edu\/proxy-sphere\/#website","url":"https:\/\/www.isi.edu\/proxy-sphere\/","name":"SPHERE Project","description":"","publisher":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isi.edu\/proxy-sphere\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.isi.edu\/proxy-sphere\/#organization","name":"SPHERE Research Infrastructure","url":"https:\/\/www.isi.edu\/proxy-sphere\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.isi.edu\/proxy-sphere\/#\/schema\/logo\/image\/","url":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/URL-Blue-Horizontal-Transparent-cropped.png","contentUrl":"https:\/\/www.isi.edu\/proxy-sphere\/wp-content\/uploads\/sites\/57\/2025\/12\/URL-Blue-Horizontal-Transparent-cropped.png","width":1235,"height":478,"caption":"SPHERE Research Infrastructure"},"image":{"@id":"https:\/\/www.isi.edu\/proxy-sphere\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/sphere-research-infrastructure\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/pages\/523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/users\/893"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":0,"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/pages\/523\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.isi.edu\/proxy-sphere\/wp-json\/wp\/v2\/media?parent=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}