showSidebars ==
showTitleBreadcrumbs == 1
node.field_disable_title_breadcrumbs.value ==

Get Ready for Your Big Day!

Commencement is around the corner! Follow these steps to register yourself and your guests for the ceremony.

Important Note: Attendance registration and gown ordering are separate processes. Please ensure that you complete both.


Graduand

Graduands must register for the ceremony.
Check your SMU account for an email in late June/early July from the Registrar’s Office to confirm your eligibility for Commencement 2026. Only those who have officially graduated in the following terms are eligible:

For Undergraduates:AY2024-25: Term 3B
AY2025-26: Terms 1, 2 & 3A
For Postgraduates:August 2025 – June 2026

Guests

Each graduand may invite up to two guests to attend their respective school ceremony. Guest registration must be completed during the graduand's attendance registration.

Key Information:

  • All confirmation emails will be sent to the graduand's SMU email address.
  • The graduand and each registered guest will receive a separate confirmation email.
  • Each email contains a personalised, non-transferable QR code for the individual.
  • Entry to the venue is strictly by valid QR code; guests without one will be denied entry.

Additional Guests:

  • Graduands may apply for up to two more admission passes during registration.
  • Double-degree graduands attending both ceremonies may apply for up to two more additional passes per ceremony.
  • All requests are subject to availability and school discretion.
  • Successful applicants will be notified via the graduand's SMU email address.

Other Important Notes:

  • Confirmation emails for successful additional guest applications will be sent during the week of 20 July 2026.
  • Unsuccessful applications will not receive an email.
  • Children below 6 years old will not be allowed into the ceremonies. Proof of age may be required (e.g., birth certificate, passport, or other official ID).

You are viewing this because the primary source was not working well for you.

Professor Lily Kong,
President of SMU

Dear Class of 2025,

Warmest congratulations on reaching this significant milestone!

Today, we celebrate not just your achievements, but the resilience, growth, and spirit that have defined your SMU journey. You have persevered through unprecedented times, embraced challenges, and emerged stronger — and for that, you have every reason to be proud.

Your graduation holds particular significance this year. As SMU marks its 25th anniversary and celebrates our rich legacy of shaping future-ready leaders, you stand among a special cohort whose achievements are forever intertwined with this important chapter in our university’s history. You are, and always will be, part of this proud legacy.

You have also made history in your own right. As the first cohort to receive the SMU Co-Curricular Transcript (CCT), you exemplify the holistic education we champion — one that recognises not only academic excellence, but also leadership, service, global engagement, and real-world experience. These qualities will serve you well in a world that values not just knowledge, but character and adaptability.

In addition, you will benefit from SMU’s new Lifelong Career Support initiative, our commitment to your success beyond graduation. Whether you are embarking on your first role or navigating new opportunities in the years ahead, SMU will remain a steadfast partner in your professional journey.

As you look to the future, stay curious, bold, and be open to new possibilities. Seek out opportunities that challenge and inspire you. Lead with integrity and empathy. Strive not only for success, but also for impact — to make a meaningful difference in the lives of others.

I would also like to express my heartfelt appreciation for your Graduating Class Gift. Your generosity reflects your values and ensures future students can continue to benefit from the transformative education you have experienced at SMU.

Finally, as you step into new beginnings, remember to care for your well-being. You began your university journey during a pandemic, demonstrating extraordinary resilience. As you chart your paths forward, know that balance, fulfilment, and self-care are as important as professional achievements.

Congratulations once again. Wherever life takes you, know that you will always have a home at SMU.

With pride and warmest wishes,
Professor Lily Kong President
Singapore Management University

Overview

In April 2024, the center was awarded a project entitled “Trusted Decentralized Identities”. The project is funded by the Digital Trust Centre (DTC), a Singapore national Centre at the Nanyang Technological University for coordinating research in trust technology.

A trusted digital identity is an essential component for securely and conveniently accessing services and authorizing transactions in cyberspace. With the rapid development of decentralized technologies and applications, such as distributed ledgers, Web3, and decentralized finance, there is an urging demand for decentralized digital identities (DID), also known as self-sovereign identities, which empower end users to create, own and govern their digital identities and assets in an autonomous, reliable, and privacy-preserving manner.

The overarching goal of this project is to develop and implement a trusted, versatile, reliable and user centric DID framework covering a complete DID lifecycle. Specifically, the project aims to investigate novel techniques for enabling key components and features that are either missing or inadequately addressed in the existing DID proposals.

Limitations of existing DID solutions

  • Lack a fully user-centric approach to allow autonomous creation of DIDs with verifiable credentials by leveraging the existing digital credentials and evidences
  • Need new solutions to reconcile and balance the privacy and accountability requirements in digital transactions involving self-created DIDs

Technical approach

  • A DID-bridging mechanism to port identity attributes from valid sources
  • Secure and scalable DID storage, version control, revocation, and wallet management by utilizing blockchain and cryptographic technologies
  • Conditional auditing and tracing of anonymous but critical/suspicious transactions by authorized parties

Translation opportunities

  • Work closely with collaborators (iSprint, ST Engineering) to meet users/market requirements
  • Seek translational  funding to develop an operational prototype and conduct extensive user trials

Contact Us

smc@smu.edu.sg


General Contact

Singapore Management University
Administration Building, Level 9 
81 Victoria Street
Singapore 188065

Overview

In December 2023, the center was awarded a project entitled “Development of Secured Components & Systems in Emerging Technologies through Hardware & Software Evaluation” (DeSCEmT). The project is funded by the Cyber Security Agency of Singapore (CSA) and National Research Foundation, Singapore (NRF).

In the past decade, mobile devices and Internet of Things (IoT) have become prevalent in our daily lives, both in business and social settings. The applications of such devices have also been growing exponentially due to the development of technologies that support artificial intelligence (AI) and cloud computing. The advances of cloud and mobile computing in the past decade have fundamentally reshaped the computing infrastructure used by individual, business, and government users into a distributed, heterogenous and collaborative system. Modern applications are hence often built as a fusion of data, software, and services from a mixture of stakeholders. Growing with this evolution are the deep-rooted security concerns over a broad spectrum of issues such as leakage of private data, infringement of software copyrights, and corruption of computation results.

This research programme gathers a core team of experts from the Nanyang Technological University (NTU) and the Singapore Management University (SMU) to tackle these security concerns. The SMU team aims to holistically address security challenges in the mobile and cloud computing ecosystem pivoting on the new so-called "confidential computing" techniques featuring hardware-based Trusted Execution Environments (TEEs). The research outcomes are expected to build up the infrastructure and capabilities towards a zero-trust computing domain for industry and government users.

Technical approach

  • De-couples the analyzing mechanism from app execution environment
  • Runs the analyzing system on powerful emulators
  • Uses offloading techniques to mirror app-system interactions to a real handset

Benefits

  • Malicious apps can no longer detect the existence of analyzing platform
  • Lower performance overhead
  • Supports non-pixel phones

Translation opportunities

  • Security vetting of mobile apps for government agencies and industry
  • Collaborators: DSO, DSTA, GovTech

No remedy for misbehaving "sick" VMs due to errors or attacks. 

Technical approach

  • CSP provides an infrastructure for VMCare. (vm hospital) 
  • Tenant (or Authority) uses its own tool to introspect and/or rectify the live but misbehaving virtual machine.  (vm surgeon)

Impact

  • A new cloud service and business model benefit CSP, tenants and authorities.
  • Extensible to Android phones to harden user interfaces and analyze malicious apps.

Translation opportunities

  • Collaborate with ST Engineering and HTX to conduct pilot tests for feasibility evaluation.
  • Apply translation fund to develop an operational prototype and market exploration.  

Data breaches are a growing risk [IBM Cost of A Data Breach Report 2023]

  • average cost of a data breach in 2023 was USD4.45m, a 15% increase over 3 years
  • 82% of breaches involved data stored in the cloud 

Limitations of existing cloud data security solutions

  • access control is enforced by could service providers and can be by-passed due to backend misconfigurations and leakage of user credentials 
  • Extensible to Android phones to harden user interfaces and analyze malicious apps.

Technical approach

  • access control policies are managed by user organizations and enforced by TEE 
  • seamlessly integrate TEE and E2E encryption to eliminate top attack vectors
  • Support standard/prevalent access control mechanisms to maintain interoperability with popular could platforms

Translation opportunities

  • Work closely with collaborators (DSTA, GovTech, HTX, ST EE) to meet users/market requirements
  • Seek translational  funding to develop an operational prototype and conduct extensive user trials

Why TEE? 

Isolating sensitive code and data-in-use in TEE protects them from vulnerabilities in the rest of the app. The usage of TEE is recommended, e.g., in the Monetary Authority of Singapore’s advisory.

Problem

  • Many applications are not designed for or protected by TEE. Migrating and maintaining an evolving app to properly take advantage of TEEs is complex, time-consuming, and error-prone.
  • Bad migration leads to little benefit and even harm.

Technical approach

  • Realize a toolchain (Shield-It!, Forge-It!, and Fix-It!) for reengineering & maintenance of evolving applications to benefit from TEE while minimizing costs.
  • Investigate SGX and the newly-released Android Virtualization Framework (AVF)

Translation opportunities

  • App hardening service for government agencies and industry
  • Collaborators: HTX, ST Engineering (project on SGX-protected credit card processing started)

Dive into groundbreaking research at the intersection of security, mobile applications, and cryptography. Explore the latest insights from us, unlocking the secrets of digital protection. Join us on a journey through innovation and discovery, where every click unveils a new layer of technological advancement.

Subscribe to