Matthew Wright Headshot

Matthew Wright

Endowed Professor and Department Chair

Department of Cybersecurity
Golisano College of Computing and Information Sciences

585-475-5432
Office Location
Office Mailing Address
100 Lomb Memorial Drive Rochester, NY 14623 70-1781

Matthew Wright

Endowed Professor and Department Chair

Department of Cybersecurity
Golisano College of Computing and Information Sciences

Education

BS, Harvey Mudd College; MS, Ph.D., University of Massachusetts at Amherst

Bio

Matthew Wright, PhD, is a Kevin O’Sullivan Endowed Professor and the Chair of Cybersecurity at Rochester Institute of Technology (RIT). Dr. Wright has co-authored over 100 peer-reviewed papers, including works appearing in top venues like IEEE S&P (“Oakland”), CCS, USENIX Security, NDSS, ACM CHI, INFOCOM, and numerous IEEE & ACM transactions. He won an NSF CAREER award in 2010 and has been PI on $5.8 million in externally funded projects. Within the field of cybersecurity, he has worked primarily in four topic areas: privacy and anonymity online, human factors in security, distributed systems security, and the application of AI to cybersecurity and disinformation problems.

585-475-5432

Areas of Expertise

Currently Teaching

CSEC-140
3 Credits
This course will introduce many fundamental cybersecurity concepts. The course will teach students to think about information systems using an adversarial mindset, evaluate risk to information systems, and introduce controls that can be implemented to reduce risk. Topics will include authentication systems, data security and encryption, risk management and security regulatory frameworks, networking and system security, application security, organizational and human security considerations, and societal implications of cybersecurity issues. These topics will be discussed at an introductory level with a focus on applied learning through hands-on virtual lab exercises.
CSEC-472
3 Credits
Access control and authentication systems are some of the most critical components of cybersecurity ecosystems. This course covers the theory, design, and implementation of systems used in identification, authentication, authorization, and accountability processes with a focus on trust at each layer. Students will examine formal models of access control systems and approaches to system accreditation, the application of cryptography to authentication systems, and the implementation of IAAA principles in modern operating systems. A special focus will be placed on preparing students to research and write about future topics in this area.
CSEC-530
3 Credits
This course introduces methods and technologies for establishing trust in modern computing systems, including classic approaches (e.g., boot chain-of-trust, secure boot, exception/privilege levels, and Trusted Platform Modules - TPMs) and more recent trusted execution architectures that enable the creation of hardware-isolated secure sub-domains (e.g., ARM TrustZone) and enclaved sub-process execution (e.g., Intel Secure Guard eXtensions - SGX). The course also includes a list of special topics within trusted computing discussing new developments in the field.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.
CSEC-630
3 Credits
This course covers some of the foundational technologies for establishing trust in modern computing systems, including classic methods (e.g., boot chain-of-trust, secure boot, exception/privilege levels, and Trusted Platform Modules - TPMs) and more recent trusted computing architectures such as ARM TrustZone and Intel Secure Guard eXtensions (SGX), which are increasingly popular and widely adopted in both academic research and industry. The latter part of the course will touch upon more advanced and research-oriented aspects in the intersection of trusted computing and various realms of Computing Security & Privacy. A key component of the course will be an exploratory research project aiming to use trusted computing technologies to address a security/privacy problem. To be successful in this course students should be knowledgeable in applied cryptography and basic security technologies.
CSEC-799
1 - 3 Credits
The graduate independent study offers students the opportunity to investigate a topic not covered in an available course in the MS program in conjunction with a faculty sponsor. Working cooperatively, the faculty sponsor and the student draft a proposal of the work to be completed, the deliverables expected from the student, the number of credits assigned, and the means by which the student’s work will be evaluated. The proposal must be approved by the graduate program director before a student can be registered for independent study.

In the News

  • November 21, 2024

    an illustrated image of a pixelated face appears next to the words real or fake.

    Detecting digital deception

    Today, artificial intelligence is being used to manipulate media. At RIT, a team of student and faculty researchers is leading the charge to help journalists and intelligence analysts figure out what is real and what is fake. Their work has more than $2 million in funding from the National Science Foundation and Knight Foundation.

  • October 30, 2024

    three men sit in chairs on a news station set.

    WHY ROC: Election cybersecurity with RIT experts  

    Justin Pelletier, director of RIT’s ESL Global Cybersecurity Institute Cyber Range and Training Center, and Matthew Wright, endowed professor and chair of RIT’s Department of Cybersecurity, discuss cybersecurity and the election.