Abstract
My research addresses two problems within the broader subject of computing infrastructure. Infrastructure is deeply embedded within a society, grows organically on top of existing systems and structures, and is largely invisible to users except when it is broken. As a result, we often do not think about how the infrastructure got to where it is, what is necessary to keep it operational, or what it means for someone to control it. However, these are critical questions with major implications for our day-to-day lives, which rely extensively on computing infrastructure for work, communication, and entertainment. My technical research involves improving the setup and maintenance of computing infrastructure for a programming contest at the University of Virginia, while my sociotechnical research analyzes the risks of foreign investment in physical Internet infrastructure.
My technical research involves setting up computing infrastructure for the annual University of Virginia High School Programming Contest (UVA HSPC), in which teams of students compete to solve programming challenges over several hours. While past research on this subject has discussed high-level design choices for the infrastructure, I focus on its implementation and maintenance, which become increasingly challenging as the contest’s participation grows. To fix this, I focus on three main objectives. First, I want the infrastructure to be sustainable, meaning it can be reused over time and by different people overseeing its upkeep. Second, I want it to be scalable, requiring little additional effort even as the number of participants increases. Finally, I want the infrastructure to be secure against unwanted actions and cybersecurity threats. My research includes building a secure central judging network and a platform for imaging competitor workstations with minimal human intervention, drastically reducing the time and effort required to complete one of the most labor-intensive aspects of UVA HSPC preparation.
My sociotechnical research focuses on a potential solution to the problem of unequal Internet access, which affects two billion people worldwide. Foreign investment in physical Internet infrastructure is a multi-billion-dollar enterprise, but it comes with risks to the receiving country’s sovereignty and the privacy of its citizens. I use Farrell and Newman’s weaponized interdependence framework to analyze how this investment grants the investor an opportunity to leverage the infrastructure as a tool for influence and coercion. Based on this, I identify three risks. First, physical Internet infrastructure can be used as a form of soft power, enabling the investor to promote their preferred companies and standards in the recipient nation through the investment. Second, the investor can embed themselves into physical Internet infrastructure, allowing them to monitor all traffic flowing through it without obstruction. Third, the investor can use their control over physical Internet infrastructure to disrupt Internet access in the recipient nation in alignment with the investor’s goals.
My technical research was successfully used to organize the 2025 and 2026 UVA HSPC events, both of which went smoothly with no major technical issues. It will hopefully be used for future years’ events as well. My sociotechnical research effectively examines the major risks associated with foreign investment in physical Internet infrastructure. I hope that it serves as a valuable resource for policymakers weighing their options on the subject. Potential extensions of my sociotechnical research include obtaining more data regarding foreign Internet surveillance and disruption initiatives, as well as addressing the ethical dilemma of balancing Internet access with risks to sovereignty.
I would like to acknowledge several people who have contributed to my research. For my technical research, I want to recognize the organizers of the University of Virginia High School Programming Contest, the Computer and Network Security Club at the University of Virginia, and the University of Virginia Department of Computer Science for providing the environment and resources for me to conduct my research, as well as my advisor, Rosanne Vrugtman. For my sociotechnical research, I wish to thank my advisor, Professor Caitlin D. Wylie.