{"id":24,"date":"2022-01-12T20:36:20","date_gmt":"2022-01-12T20:36:20","guid":{"rendered":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?page_id=24"},"modified":"2025-03-11T18:18:53","modified_gmt":"2025-03-11T18:18:53","slug":"research","status":"publish","type":"page","link":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/","title":{"rendered":"Research"},"content":{"rendered":"\n<div id=\"unityblocks-hero\" class=\"wp-block-unityblocks-hero hide-content\" data-herotype=\"heading-hero\" data-image=\"{&quot;url&quot;:&quot;https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-content\/uploads\/sites\/7\/2023\/09\/bss-header-biodesign-asu.jpg&quot;,&quot;altText&quot;:&quot;&quot;,&quot;cssClass&quot;:[],&quot;size&quot;:&quot;medium&quot;}\" data-subtitle=\"{&quot;text&quot;:&quot;&quot;,&quot;highlightColor&quot;:&quot;white&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[]}\" data-title=\"{&quot;text&quot;:&quot;Center for Biocomputing, Security and Society&quot;,&quot;highlightColor&quot;:&quot;gold&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[]}\" data-contents=\"[{&quot;text&quot;:&quot;&quot;,&quot;maxWidth&quot;:&quot;&quot;,&quot;cssClass&quot;:[],&quot;highlightColor&quot;:&quot;white&quot;}]\" data-contentscolor=\"white\"><\/div>\n\n\n<div class=\"wp-bootstrap-blocks-container container mb-0\">\n\t\n<div class=\"wp-bootstrap-blocks-row row mt-4 mb-5\">\n\t\n\n<div class=\"col-12\">\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/biodesign.asu.edu\/our-centers\/\">Our Centers<\/a><\/span> \/ <span><a href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\">Biocomputing, Security and Society<\/a><\/span> \/ <span class=\"breadcrumb_last\" aria-current=\"page\">Research<\/span><\/span><\/div>\n\t<\/div>\n\n<\/div>\n\n\n<div class=\"wp-bootstrap-blocks-row row justify-content-between\">\n\t\n\n<div class=\"col-12 col-md-3 mb-6\">\n\t\t\t\n<div aria-controls=\"sidebar-biocomputing-security-society\" aria-expanded=\"false\" class=\"sidebar-toggler\" data-target=\"#sidebar-biocomputing-security-society\" data-toggle=\"collapse\"><p>Select Section <\/p><span class=\"fas fa-chevron-up\" \/><\/div><nav class=\"sidebar collapse\" id=\"sidebar-biocomputing-security-society\" aria-label=\"Secondary\"> <div class=\"nav-link-container\"><a id=\"menu-item-77\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-home nav-link\">Overview<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-38\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Research<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-37\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/team\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Team<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-36\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/software-and-datasets\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Software and Datasets<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-106\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/news\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">News<\/a><\/div><\/li>\n <div class=\"nav-link-container\"><a id=\"menu-item-34\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/opportunities\/\" class=\"menu-item menu-item-type-post_type menu-item-object-page nav-link\">Opportunities<\/a><\/div><\/li>\n<\/nav>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-md-8\">\n\t\t\t\n\n<h2 class=\"wp-block-heading mt-0\">Research<\/h2>\n\n\n\n<p>We use similar tools for managing cancer and repairing cybersecurity vulnerabilities. Our models of evolutionary biology and ecology are predicting which tumors are likely to become dangerous and how best to manage them. We use immunological concepts to invent new cybersecurity solutions, and we use evolutionary methods to solve software engineering problems. We also use computing and mathematical abstractions to inform biological research, focusing on new approaches to understanding and managing cancer.<\/p>\n\n\n\n<h3 class=\"wp-block-heading mt-6\"><strong>Our studies make a difference in<\/strong><\/h3>\n\n\n\n<ul class=\"uds-list mb-4\">\n<li>Using evolutionary computation tools to automatically improve software by fixing bugs, enhancing security and reducing energy costs.<\/li>\n\n\n\n<li>Applying graph algorithms from computer science to predict genomic diversity.<\/li>\n\n\n\n<li>Using techniques from agricultural pest management and computational genomics to understand cancer across the tree of life and to prevent human deaths from the evolution of therapeutic resistance in cancers.<\/li>\n\n\n\n<li>Applying our open source software to screen patients algorithmically for immunotherapy in lieu of expensive wet-lab analysis.<\/li>\n\n\n\n<li>Developing a life detection system using assembly theory to identify living entities on alien worlds and novel lifeforms in the lab through experimental and data-driven methods.<\/li>\n<\/ul>\n\n\n\n<p>Learn more about our work below: <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"7 Minutes of Science with Cole Mathis\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/AjlnhVEXwXY?start=2&#038;feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h3 class=\"wp-block-heading mt-6\"><strong>The impact of our research can also be seen in cancer through<\/strong><\/h3>\n\n\n\n<ul class=\"uds-list\">\n<li>Applying tools from evolutionary biology and ecology to predict which tumors are likely to become dangerous and how best to manage them.<\/li>\n\n\n\n<li>Developing and running computational simulations of tumors to identify the most promising approaches to cancer prevention and cancer therapy.<\/li>\n\n\n\n<li>Developing new approaches to cancer prevention based on our studies of how large, long-lived animals have evolved to prevent cancer.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading mt-6\"><strong>Using the complexities of biology as our guide we provide<\/strong><\/h3>\n\n\n\n<ul class=\"uds-list\">\n<li>Computational modeling, both agent-based and mathematical, with specialties in immunology and evolution.<\/li>\n\n\n\n<li>Complex adaptive systems: fundamental science, tools and applications.<\/li>\n\n\n\n<li>Emergent computation and collective behavior.<\/li>\n\n\n\n<li>Programmable matter.<\/li>\n\n\n\n<li>Cybersecurity, cyberpolicy and internet censorship.<\/li>\n\n\n\n<li>Evolution of cancer.<\/li>\n<\/ul>\n\n\n\n<p class=\"mt-3\"><strong>For more information about our specific studies, please see our faculty publications.<\/strong><\/p>\n\n\n\n<ul class=\"uds-list\">\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/3182641\">Stephanie Forrest<\/a>, director<\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/1757978\">Athena Aktipis<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/1669300\">Luis Cisneros<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/3584805\">Jedidiah Crandall<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/3505050\">Heewook Lee<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/1938294\">Carlo Maley<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/1995237\">Theodore Pavlic<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/isearch.asu.edu\/profile\/198256\">Andrea Richa<\/a><\/li>\n<\/ul>\n\n\t<\/div>\n\n<\/div>\n\n<\/div>\n\n\n<section class=\"uds-section media-file inner-bg-none text-white ov-gray-7 ov-lg-none gl-lg-gray-7\" style=\"background: url(https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-content\/uploads\/sites\/7\/2022\/02\/Biocomputing-Security-Society.jpg) center \/ cover no-repeat;\" >\n<div class=\"wp-bootstrap-blocks-container container mb-0 py-12\">\n\t\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\"><div class=\"wp-bootstrap-blocks-row row\">\n\t\n\n<div class=\"col-12 col-lg-8\">\n\t\t\t\n\n<h2 class=\"wp-block-heading\">Support the Biodesign Center for Biocomputing, Security and Society<\/h2>\n\n\n\n<p>\u00a0Developing defenses against malicious behavior across a wide variety of systems, focusing primarily on living systems and computation.<\/p>\n\n\t<\/div>\n\n\n\n<div class=\"col-12 col-lg-4 mt-6 mt-lg-0 d-flex justify-content-lg-end align-items-center\">\n\t\t\t\n\n\t<div class=\"uds-button \">\n\n\t\t\t\n\t\t\t<a href=\"https:\/\/www.asufoundation.org\/colleges-and-programs\/programs-and-centers\/biodesign-institute\/biodesign-center-for-biocomputation-security-and-society-CA110219.html\" class=\"btn  btn-gold \"   >Support<\/a>\n\t\n\t\t<\/div>\n\n\t<\/div>\n\n<\/div>\n<\/div>\n\n<\/div>\n\n<\/section>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"uds_featured_image":null,"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Research | Biocomputing, Security and Society | ASU Biodesign Institute<\/title>\n<meta name=\"description\" content=\"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Research | Biocomputing, Security and Society | ASU Biodesign Institute\" \/>\n<meta property=\"og:description\" content=\"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\" \/>\n<meta property=\"og:site_name\" content=\"Biocomputing, Security and Society\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-11T18:18:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\",\"name\":\"Research | Biocomputing, Security and Society | ASU Biodesign Institute\",\"isPartOf\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\"},\"datePublished\":\"2022-01-12T20:36:20+00:00\",\"dateModified\":\"2025-03-11T18:18:53+00:00\",\"description\":\"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.\",\"breadcrumb\":{\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Our Centers\",\"item\":\"https:\/\/biodesign.asu.edu\/our-centers\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Biocomputing, Security and Society\",\"item\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website\",\"url\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/\",\"name\":\"Biocomputing, Security and Society\",\"description\":\"Just another Biodesign Sites site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Research | Biocomputing, Security and Society | ASU Biodesign Institute","description":"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/","og_locale":"en_US","og_type":"article","og_title":"Research | Biocomputing, Security and Society | ASU Biodesign Institute","og_description":"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.","og_url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/","og_site_name":"Biocomputing, Security and Society","article_modified_time":"2025-03-11T18:18:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/","name":"Research | Biocomputing, Security and Society | ASU Biodesign Institute","isPartOf":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website"},"datePublished":"2022-01-12T20:36:20+00:00","dateModified":"2025-03-11T18:18:53+00:00","description":"The center uses similar tools for managing cancer and repairing cybersecurity vulnerabilities, working with evolutionary biology and ecology to analyze tumors.","breadcrumb":{"@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Our Centers","item":"https:\/\/biodesign.asu.edu\/our-centers\/"},{"@type":"ListItem","position":2,"name":"Biocomputing, Security and Society","item":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society"},{"@type":"ListItem","position":3,"name":"Research"}]},{"@type":"WebSite","@id":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/#website","url":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/","name":"Biocomputing, Security and Society","description":"Just another Biodesign Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/24"}],"collection":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/comments?post=24"}],"version-history":[{"count":0,"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/pages\/24\/revisions"}],"wp:attachment":[{"href":"https:\/\/biodesign.asu.edu\/biocomputing-security-and-society\/wp-json\/wp\/v2\/media?parent=24"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}