<?xml version="1.0"?>
<News hasArchived="true" page="2" pageCount="17" pageSize="10" timestamp="Sat, 18 Apr 2026 20:09:02 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=2">
<NewsItem contentIssues="true" id="148417" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148417">
<Title>UMBC's CyberDawgs Capture the Flag Competition 4/18-20</Title>
<Tagline>Friday, April 18 -- Sunday, April 20, in-person &amp; online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div>UMBC's CyberDawgs group will hold their annual <a href="https://my3.my.umbc.edu/groups/umbccd/events/141715" rel="nofollow external" class="bo"><strong>DawgCTF</strong></a> event on Friday, April 18th through Sunday, April 20th. It is an in-house and beginner-friendly <a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo"><strong>Capture-the-Flag</strong></a> competition. You can sign up to participate <a href="https://app.metactf.com/join/dawgctf25" rel="nofollow external" class="bo"><strong>here</strong></a>.</div><div><br></div><div>The competition is geared toward college students but is open to everyone. The in-person component will take place on Friday, April 18th from 11:30am -7:30pm at UMBC in Commons 329 and Commons 331. Register to participate in-person <strong><a href="https://forms.gle/nFDKQUv8pssHkg3j7" rel="nofollow external" class="bo">here</a>.</strong> You can also participate online.</div><div><br></div><div>DawgCTF is a 'team' competition. The maximum team size is four, but you can also play by yourself. To find team members, you can use the <a href="https://discord.gg/NTJaCuaUTm" rel="nofollow external" class="bo"><strong>DawgCTF Discord</strong></a> channel or form teams in-person on Friday, April 18th.</div><div><br></div><div><br></div><div><br></div></div>
]]>
</Body>
<Summary>UMBC's CyberDawgs group will hold their annual DawgCTF event on Friday, April 18th through Sunday, April 20th. It is an in-house and beginner-friendly Capture-the-Flag competition. You can sign up...</Summary>
<Website>https://my3.my.umbc.edu/groups/umbccd/events/141715</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148417/guest@my.umbc.edu/4852be19d118e6ab63f6d968882e82a8/api/pixel</TrackingUrl>
<Tag>capture-the-flag</Tag>
<Tag>ctf</Tag>
<Tag>cyberdawgs</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC CyberDawgs</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/xxlarge.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/xlarge.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/large.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/medium.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/small.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/xsmall.jpg?1743172351</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/417/7d98838043d42cbbce7045950aa5cffa/xxsmall.jpg?1743172351</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 28 Mar 2025 10:58:19 -0400</PostedAt>
<EditAt>Fri, 28 Mar 2025 11:14:10 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="148342" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148342">
<Title>Talk: A Privacy and Security Analysis of myUMBC Answers, 3/28</Title>
<Tagline>12-1pm ET Friday, March 28, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025</h3><div><br></div><h4><a href="https://damslabumbc.github.io/author/christian-badolato/" rel="nofollow external" class="bo">Christian Badolato<br></a>12–1pm Friday, March 28, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></h4><div><br></div><div><a href="https://en.wikipedia.org/wiki/Generative_artificial_intelligence" rel="nofollow external" class="bo"><strong>Generative AI</strong></a> has the potential to improve user search experiences by supporting natural language querying and providing more detailed and domain-specific responses. UMBC is seeking to provide this convenience to myUMBC users through the <a href="https://my3.my.umbc.edu/groups/doit/posts/147188" rel="nofollow external" class="bo"><strong>myUMBC Answers</strong></a> system, which enables users to access both personal and UMBC services information from the myUMBC search bar. In this talk, we investigate the resiliency of Answers against several common generative AI attacks that were performed by the UMBC Scholarship for Service (SFS) scholars in collaboration with other students and the UMBC Division of Information Technology (DoIT). We first provide an overview of the study and the myUMBC Answers system before discussing the types of attacks which were launched against the system. We then explore the behavior of the Answers system in response to these attacks. Finally, we outline the recommendations provided to DoIT by the study participants to improve the security and user experience of myUMBC Answers.</div><div><br></div><div><a href="null" rel="nofollow external" class="bo"><strong>Christian Badolato</strong></a> is a PhD student working with Professor <a href="https://robertoyus.com/" rel="nofollow external" class="bo"><strong>Roberto Yus</strong></a> focusing on data privacy in the Internet of Things at UMBC after having received his master’s degree from the same university. He has several years of experience as a software architect and is a Certified Information Systems Security Professional.</div><div><br></div><div>Support for this <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cyber Defense Lab</strong></a> event was provided in part by NSF under SFS grant DGE-1753681.</div><div><br></div></div>
]]>
</Body>
<Summary>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025     Christian Badolato 12–1pm Friday, March 28, 2025 online     Generative AI has the potential to improve...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148342/guest@my.umbc.edu/4d1af12d45ef4b1f267e575d72a7ef4b/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Tag>umbc</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>The UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxlarge.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xlarge.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/large.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/medium.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/small.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xsmall.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxsmall.jpg?1743014997</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Mar 2025 13:47:00 -0400</PostedAt>
<EditAt>Wed, 26 Mar 2025 15:24:07 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="148281" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148281">
<Title>TowerCares donation supports UMBC Cyber Scholars program</Title>
<Tagline>Gift of $300,000 for a new cybersecurity scholarship fund</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>Cyber threats, ransomware, and data breaches have become daily realities in our increasingly digital world. Despite the surge in cyberattacks and cybercrime, Maryland faces over 24,000 unfilled cybersecurity positions, while nationwide, that number exceeds 457,000, according to CyberSeek.</span><br><br><span>To address the urgent cybersecurity workforce shortage, the <a href="https://www.towercaresfoundation.org/" rel="nofollow external" class="bo"><strong>TowerCares Foundation</strong></a>, the philanthropic arm of <a href="https://www.towerfcu.org/" rel="nofollow external" class="bo"><strong>Tower Federal Credit Union</strong></a>, has commited $300,000 to the UMBC Cybersecurity Institute. The groundbreaking partnership will create a new scholarship fund within the <strong><a href="https://cybersecurity.umbc.edu/cyberscholars/" rel="nofollow external" class="bo">UMBC Cyber Scholars Program</a>,</strong> which is dedicated to equipping students with the skills needed for careers in cybersecurity, artificial intelligence, and data science.</span><div><br></div><div>Read more about the TowerCares Foundation's generous gift in their <strong><a href="https://www.towerfcu.org/advice-planning/financial-wellness/march-2025/towercares-makes-%24300000-commitment-to-umbc-cybersecurity-institute" rel="nofollow external" class="bo">announcement</a>.</strong></div><div><strong><br></strong></div>
    
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Cyber threats, ransomware, and data breaches have become daily realities in our increasingly digital world. Despite the surge in cyberattacks and cybercrime, Maryland faces over 24,000 unfilled...</Summary>
<Website>https://www.towerfcu.org/advice-planning/financial-wellness/march-2025/towercares-makes-$300000-commitment-to-umbc-cybersecurity-institute</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148281/guest@my.umbc.edu/8baa3f9fb51135cf94b7624b5f11ca47/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>scholarship</Tag>
<Tag>towercares</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 25 Mar 2025 12:12:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="148074" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148074">
<Title>Three short talks on Security Challenges for Medical Devices</Title>
<Tagline>8-9:30 am EDT, Wednesday March 26, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span><br></span></p><p><span>UMBC is a member of the </span><a href="https://incs-coe.org" rel="nofollow external" class="bo"><span><strong>International Cybersecurity Center of Excellence</strong></span></a><span>, which will hold an online seminar on the </span><span>Security Challenges for Medical Devices</span><span> from 8-9:30 am on Wednesday, March 26, 2025 via </span><a href="https://hal.zoom.us/j/93319719846?pwd=aevX5XbSfM9bVisDdTBS6sv00nIx3r.1" rel="nofollow external" class="bo"><span><strong>Zoom</strong></span></a><span>.</span></p><p><span>The seminar will consist of three short presentations:</span></p><ul><li><p><span><strong>A Security Review of Bluetooth Low Energy</strong>, Jorge Blasco Alís, Universidad Politécnica de Madrid</span></p></li><li><p><span><strong>Medical devices in 2050: An ideal use-case for medicine and cyber</strong>, Emil Lupu, Imperial College London </span></p></li><li><p><span><span><strong>Smart Security: Protecting Embedded Medical Devices for a Safer Tomorrow</strong>, </span>Phil Englert, Health-ISAC</span></p></li></ul><span>More information including the talk abstracts is available </span><a href="https://cybersecurity.umbc.edu/wp-content/uploads/sites/10/2025/03/INCS-CoE-Medical-DevicesSecurity-Seminar-26-03-2025.pdf" rel="nofollow external" class="bo"><span>here</span></a><span>.</span></span><div><span><br></span>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a> 
    </div></div>
]]>
</Body>
<Summary>UMBC is a member of the International Cybersecurity Center of Excellence, which will hold an online seminar on the Security Challenges for Medical Devices from 8-9:30 am on Wednesday, March 26,...</Summary>
<Website>https://cybersecurity.umbc.edu/wp-content/uploads/sites/10/2025/03/INCS-CoE-Medical-DevicesSecurity-Seminar-26-03-2025.pdf</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148074/guest@my.umbc.edu/8ea6558db44941e7fd3822afebb5ccc6/api/pixel</TrackingUrl>
<Tag>medical</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/xxlarge.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/xlarge.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/large.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/medium.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/small.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/xsmall.jpg?1741879203</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/074/5f11342d7827e3538adeee9921c57d08/xxsmall.jpg?1741879203</ThumbnailUrl>
<PawCount>2</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 13 Mar 2025 11:31:38 -0400</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:11:51 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="147949" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147949">
<Title>Talk: Assessing DOGE's Impact on Federal Cybersecurity and Data, 3/14</Title>
<Tagline>12&#8211;1pm EDT Friday, March 14, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h3><span>Assessing DOGE's Impact on Federal Cybersecurity and Data</span></h3><h4><span>Dr. Richard Forno</span></h4><h4><span>Assistant Director, UMBC Cybersecurity Institute</span></h4><h5><span>12–1pm Friday, March 14, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a> </span></h5><br><p><span>In just its first month of operation, that has disrupted large portions of the federal government, the activities of the so-called Department of Government Efficiency (DOGE) have worried cybersecurity, national security, and information technology experts both inside and outside the federal government. Armed with root-level access and presidential authorization---yet often lacking relevant operational expertise or any meaningful oversight---DOGE’s staff, activities, and the security culture of the current administration in which they operate often seem to violate many time-tested best practices and principles for effective cybersecurity and technology management. They may also violate longstanding federal guidelines and regulations. As such, it is likely that DOGE is creating conditions that can cause operational, cybersecurity, or privacy incidents across the federal IT landscape and subsequently placing government information systems and sensitive citizen data at risk. On the CIA (confidentiality-integrity-availability) triad, this talk will examine DOGE's activities in the context of cybersecurity and technology best practices. Is DOGE truly an “insider threat” to the federal government as some claim? And if so, what countermeasures, if any, are available to address the threat?</span></p><p><span><a href="https://rickf.org/" rel="nofollow external" class="bo"><strong>Dr. Richard Forno</strong></a> is a teaching professor in the UMBC Department of Computer Science and Electrical Engineering, where he directs the UMBC Graduate Cybersecurity Program, serves as the Assistant Director of UMBC's Cybersecurity Institute, and is an Affiliate Scholar at the Stanford Law School's Center for Internet and Society (CIS). Prior to academia, his twenty-year career includes helping build a formal cybersecurity program for the US House of Representatives, serving as the first Chief Security Officer for Network Solutions (then, the global center of Internet DNS), and other assorted roles with the government, military/defense entities, and private sector. In 2023, he was named a Distinguished Visiting Professor at the Universidad Autónoma del Estado de Hidalgo in Pachuca, Mexico. Along with regular public analysis and commentary, his most recent book is Cybersecurity for Local Governments (Wiley, 2022), coauthored with UMBC Public Policy colleagues Professor Emeritus Don Norris and Ph.D. candidate Laura Mateczun.</span></p></span><div><span><span>Support for this event was provided in part by NSF grant </span></span><span><span>DGE-1753681<span>.</span></span></span></div><div><span><span><span><br></span></span></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Assessing DOGE's Impact on Federal Cybersecurity and Data  Dr. Richard Forno  Assistant Director, UMBC Cybersecurity Institute  12–1pm Friday, March 14, 2025, online    In just its first month of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147949/guest@my.umbc.edu/e1a6d8a845d2924dc9ce387c3b74091d/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>doge</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xxlarge.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xlarge.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/large.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/medium.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/small.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xsmall.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xxsmall.jpg?1741466400</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>2</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 08 Mar 2025 15:46:37 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:12:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="147556" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147556">
<Title>talk: The New Manhattan Project = Militarized AI</Title>
<Tagline>12&#8211;1pm EST, Friday, February 28, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3>The New Manhattan Project = Militarized AI</h3><h4><a href="https://www.rit.edu/directory/jxpics-justin-pelletier" rel="nofollow external" class="bo">Justin M. Pelletier</a>, Rochester Institute of Technology</h4><h4>12–1pm EST, Friday, February 28, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a> </h4><div><br></div><div><br></div><div>The resurgence of great power competition, underpinned by rapid advancements in artificial intelligence, necessitates a reevaluation of strategic doctrines akin to the urgency and innovation of the original Manhattan Project. This talk delves into the transformative integration of AI with autonomous combat units, examining historical analogs such as the impact of gunpowder in the Napoleonic Wars and the introduction of tanks and close air support during World War I, and juxtaposing these with the contemporary role of AI in warfare.</div><div><br></div><div>We begin by exploring the dual-use nature of AI technologies, emphasizing their role in both enhancing combat effectiveness and posing significant ethical and security risks, as illustrated by recent developments in narrative warfare and the militarization of marketing strategies. Drawing parallels with the disruptive impacts of past technological advances, the presentation invites an evaluation of the strategic implications of autonomous warfare systems, discussing the potential consequences on global security dynamics.  Furthermore, the discussion extends to safeguarding democratic processes in the age of AI, where the integrity of elections is increasingly susceptible to AI-driven information warfare. The presentation outlines the development of virtual voting infrastructures and their vulnerabilities, highlighting the ongoing challenges in protecting electoral systems from manipulation.</div><div><br></div><div>This examination advocates for robust ethical frameworks and international cooperation to harness AI's potential while mitigating its risks. By reflecting on historical technology shifts and forecasting future developments, the talk aims to widen the dialogue on the strategic, ethical, and policy dimensions necessary to navigate this new era of warfare and surveillance.</div><div><br></div><div><a href="https://www.rit.edu/directory/jxpics-justin-pelletier" rel="nofollow external" class="bo"><strong>Justin M. Pelletier</strong></a> is a Professor of Practice and Director of the <a href="https://www.rit.edu/cybersecurity/cyber-range" rel="nofollow external" class="bo"><strong>Cyber Range</strong></a> at the Rochester Institute of Technology (RIT). Dr. Pelletier teaches at the undergraduate and graduate levels in the Department of Cyber Security within RIT’s Golisano College of Computing and Information Sciences. He also orchestrates security assessments for partner organizations and is the founding director for the NSA-funded National Consortium for Cyber Governance, Risk and Compliance, which is housed within RIT's <a href="https://www.rit.edu/cybersecurity/" rel="nofollow external" class="bo"><strong>ESL Global Cybersecurity Institute</strong></a>. He holds a PhD in Information Assurance and Security, an MBA in Entrepreneurship, and a BS in Computer Science. Prior to joining academia, Dr.  Pelletier was a civil servant in the intelligence community and a member of the modeling and simulations working group within the U.S. National Security Council. He is a combat veteran and currently serves as a Lieutenant Colonel in the U.S.  Army Reserve. Dr. Pelletier has authored more than three dozen scholarly articles, book chapters, and patents focused on security and information economics.</div><div><br></div>
    <hr><a href="https://ai.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Center for AI</strong></a></div>
]]>
</Body>
<Summary>The New Manhattan Project = Militarized AI  Justin M. Pelletier, Rochester Institute of Technology  12–1pm EST, Friday, February 28, 2025, online         The resurgence of great power competition,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147556/guest@my.umbc.edu/1d465829f3bca5243c68d05a7547d1ac/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>military</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/xxlarge.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/xlarge.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/large.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/medium.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/small.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/xsmall.jpg?1740268345</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/556/89bb032e13438186c4b979793e9cd5d2/xxsmall.jpg?1740268345</ThumbnailUrl>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 22 Feb 2025 18:57:30 -0500</PostedAt>
<EditAt>Sat, 08 Mar 2025 15:51:17 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="147367" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147367">
<Title>Talk: Formal Methods or Usable Security: Why Not Both?</Title>
<Tagline>McKenna McCall, 11:45 ET, Monday, Feb 17, ITE325</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><span>Formal Methods or Usable Security: Why Not Both?</span></h3><h4><span><strong>McKenna McCall, CMU</strong></span></h4><h4><span><strong>11:45-12:45 Monday, Feb 17, UMBC ITE 325 and <a href="https://my3.my.umbc.edu/groups/csee/events/140127/join_meeting" rel="nofollow external" class="bo">online</a></strong></span></h4><p><span><br></span></p><p><span>Formal methods research involves using mathematical techniques to specify and verify properties of software and hardware systems. In security and privacy research, formal methods can lead to strong, provable security guarantees—and typically leave questions about how humans might interact with these systems unanswered. Indeed, formal methods and usable security are traditionally distinct areas of research. In this talk, I will demonstrate how techniques from both research areas can be applied—or even combined—to create solutions that are simultaneously mathematically rigorous and usable. In one project, we revisit static analysis tools for home IoT users from a usable security lens and investigate the usability and utility of the workflow involved in using the tools. Later in the talk, I will describe a project with a formal methods focus where we propose a new technique for preventing undesirable information flows on the web. We argue that this approach is usable in more realistic scenarios than what is proposed by prior work—without sacrificing security.</span></p><p><span><a href="https://www.andrew.cmu.edu/user/mckennak/" rel="nofollow external" class="bo"><strong>McKenna McCall</strong></a> is a postdoctoral researcher in the Software and Societal Systems Department at Carnegie Mellon University supervised by Lorrie Cranor and Lujo Bauer. She received her PhD from Carnegie Mellon University in 2023, advised by Limin Jia. McKenna’s research spans fields from information flow control and programming languages to security and privacy for home IoT and confidential computing. She is particularly interested in research where formal methods and usable security intersect, and combines techniques from both research areas to produce results that incorporate mathematical rigor as well as usability.</span></p><div><span><br></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Formal Methods or Usable Security: Why Not Both?  McKenna McCall, CMU  11:45-12:45 Monday, Feb 17, UMBC ITE 325 and online     Formal methods research involves using mathematical techniques to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147367/guest@my.umbc.edu/b9d28ddf5b42e211bedf3d7df3706e07/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>iot</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/large.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/medium.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/small.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xsmall.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxsmall.jpg?1739714164</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 16 Feb 2025 09:19:02 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:13:30 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="147334" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147334">
<Title>Talk: Unveiling Privacy Risks in AI: Data, Models, and Systems</Title>
<Tagline>11:30-12:30 &#8203;Friday, February 14 in ITE325b and online&#8203;</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span><strong><a href="https://www.cs.purdue.edu/homes/an93/" rel="nofollow external" class="bo">​Shengwei An</a> </strong>will give a talk on </span><strong>Unveiling Privacy Risks in AI: Data, Models, &amp; Systems</strong>, 11:30-12:30 <span>​Friday, February 14 in </span>ITE325b and <a href="https://my3.my.umbc.edu/groups/csee/events/140124/join_meeting" rel="nofollow external" class="bo">online</a><span>​.</span></div><div><br></div>Artificial Intelligence has become deeply integrated into diverse systems, transforming industries and reshaping our daily lives. However, this widespread adoption also introduces critical privacy risks across the training data, AI models, and AI-powered systems. This talk will explore privacy challenges through these three aspects. First, I will introduce the first high-fidelity attack that exposes the privacy vulnerabilities of training data in pre-trained models and commercial AI services. Next, I will present a novel physical impersonating attack that highlights the privacy risks inherent in AI-based authentication systems. Additionally, I will discuss the first data-free framework designed to eliminate trigger-based model watermarks in diffusion models that aim to protect their intellectual property. Finally, I will conclude with a forward-looking perspective on addressing privacy risks in emerging generative AI techniques, such as Large Language Models and Stable Diffusion Models.<div><br><div><div><span><p><a href="https://www.cs.purdue.edu/homes/an93/" rel="nofollow external" class="bo"> Shengwei An</a> is a Ph.D. candidate in the Department of Computer Science at Purdue University, advised by Prof. Xiangyu Zhang. His research focuses on AI security and privacy, with an emphasis on designing state-of-the-art tools to investigate and mitigate privacy vulnerabilities in real-world AI systems. His work has been published in top-tier conferences, including S&amp;P, USENIX Security, NDSS, and AAAI. He is the recipient of the Ross Fellowship from Purdue University and the Best Paper Award in the ECCV 2022 AROW Workshop.<br></p><p><br></p></span></div></div></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>​Shengwei An will give a talk on Unveiling Privacy Risks in AI: Data, Models, &amp; Systems, 11:30-12:30 ​Friday, February 14 in ITE325b and online​.    Artificial Intelligence has become deeply...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147334/guest@my.umbc.edu/843715b46ccd321b4da77b4ef49ddaa4/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>privacy</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 14 Feb 2025 09:36:43 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:14:24 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="146826" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146826">
<Title>Talk: Do LLMs Exhibit Cybersecurity Misconceptions? 1/31 online</Title>
<Tagline>Evaluation of LLMs on CCI and CCA examinations</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4>Do LLMs Show Cybersecurity Misconceptions?<br></h4><h5>Evaluation of LLMs Performance on Cybersecurity Concept Inventories</h5><h5>Shan Huang, UIUC</h5><div><strong>Joint work with Jeffrey Herman and Alan Sherman, et al.</strong></div><div><strong>12:00–1pm ET Friday, Jan. 31, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></strong> </div><div><br></div><div>We evaluated the performance of five LLMs (Llama a, GPT-3.5-turbo, GPT-4, GPT-4O, and GPT-O1) on two cybersecurity concept inventories: <a href="https://dl.acm.org/doi/fullHtml/10.1145/3451346" rel="nofollow external" class="bo"><strong>Cybersecurity Concept Inventory</strong></a> (CCI) and <strong><a href="https://dl.acm.org/doi/10.1145/3545945.3569762" rel="nofollow external" class="bo">Cybersecurity Curriculum Assessment</a> </strong>(CCA). Using a zero-shot setting to minimize external influencing factors, we compared the performance of these LLMs with that of students previously studied, and we conducted a qualitative analysis of GPT-O1's output to examine if it exhibits misconceptions. Quantitative analysis reveals that, for the CCI and CCA, GPT-O1 significantly outperformed other models and students, correctly answering 92% of CCI and 72% of CCA test items. These results indicate GPT-O1’s strong proficiency in foundational topics (CCI) but reveal its limitations in addressing these concepts in more technically advanced scenarios (CCA). Qualitative analysis of GPT-O1’s reasoning patterns uncovered instances of insightful reasoning but also highlighted ways in which GPT-O1's answers reflect persistent student mistakes, such as biases, overgeneralizations, and logical inconsistencies. This work highlights the significant potential of GPT-O1 as a tool for introductory cybersecurity education in its ability to provide detailed explanations and structured reasoning for novice learners.</div><div><br></div><div><strong><a href="https://www.linkedin.com/in/shan-huang-262041193/" rel="nofollow external" class="bo">Shan Huang</a> </strong>is a Ph.D. candidate in Computer Science at the University of Illinois Urbana-Champaign. She is broadly interested in how educational games can improve student learning. Current work includes improving student learning in cybersecurity with educational games and accessing student knowledge of cybersecurity concepts. Shan is also involved in various educational data mining projects.</div><div><br></div><hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Do LLMs Show Cybersecurity Misconceptions?   Evaluation of LLMs Performance on Cybersecurity Concept Inventories  Shan Huang, UIUC  Joint work with Jeffrey Herman and Alan Sherman, et al....</Summary>
<Website>https://cybersecurity.umbc.edu/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146826/guest@my.umbc.edu/34eff5855f2e469c84e2d84660d9f67c/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cca</Tag>
<Tag>cci</Tag>
<Tag>cybersecurity</Tag>
<Tag>llm</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xxlarge.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xlarge.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/large.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/medium.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/small.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xsmall.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xxsmall.jpg?1738158075</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 29 Jan 2025 08:42:49 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="146655" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146655">
<Title>Talk: Securing Distributed Networks with Reinforcement Learning &amp; Game Theory</Title>
<Tagline>10-11am Thursday, Jan. 30, 2025; ITE459 and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h4><span>Securing Distributed Networks: Leveraging Reinforcement Learning and Game Theory for Attack Detection and Mitigation</span></h4><h4><a href="https://ischool.syracuse.edu/md-tariqul-islam-pavel/#Biography" rel="nofollow external" class="bo"><span><strong>Dr. Md Tariqul Islam</strong></span></a><span>, Syracuse University</span></h4><h4><span>10-11am January 30, 2025;  ITE 459, UMBC and </span><a href="https://umbc.webex.com/umbc/j.php?MTID=m47153e19db08254c1e0d30e43cad1b24" rel="nofollow external" class="bo"><span>online</span></a></h4><p><br></p><p><span>Reinforcement learning (RL) has demonstrated remarkable success across diverse domains, from mastering complex games to optimizing real-time feedback systems in robotics and industrial control. However, its potential in cybersecurity, particularly for autonomous attack detection and mitigation in distributed systems, remains largely underexplored. Traditional single-agent RL approaches struggle in decentralized environments where multiple entities make independent decisions, necessitating multi-agent reinforcement learning (MARL). Our research explores blockchain networks as an ideal test case due to their decentralized architecture and trustless consensus mechanisms. We developed a novel MARL-based consensus mechanism for Proof-of-Stake blockchains, enabling nodes to collaboratively identify and penalize malicious behavior while preserving decentralization. This approach </span><span>effectively mitigated six major blockchain attack types with minimal computational overhead. Building on these results, we propose integrating game-theoretic principles into the MARL framework to model adversarial strategies and enhance system resilience. The synergy between reinforcement learning and game theory establishes a robust foundation for dynamic and adaptive security in distributed systems, effectively addressing current vulnerabilities while anticipating and countering future threats. This integrated approach enables the design of resilient, scalable defense mechanisms tailored to the complex dynamics of decentralized architectures.</span></p><p><span><br></span></p><a href="https://ischool.syracuse.edu/md-tariqul-islam-pavel/#Biography" rel="nofollow external" class="bo"><span><strong>Dr. Md Tariqul Islam</strong></span></a><span> is an Assistant Professor of Trustworthy Cyberspace in the School of Information Studies (iSchool) at Syracuse University. His research focuses on advancing the security, efficiency, and fault tolerance of networks and distributed systems, particularly in the domains of cloud and blockchain technologies. To this end, he designs and develops novel algorithms, protocols, and frameworks that enhance system reliability and security. In his doctoral dissertation, "Algorithms for Achieving Fault-Tolerance and Ensuring Security in Cloud Computing Systems," he developed dynamic scheduling algorithms for cloud computing that optimize resource usage and reduce the risk of system failures. He also devised several cloud storage schemes to protect data confidentiality, integrity, and availability while mitigating potential security vulnerabilities. Expanding his work to blockchain, his current research seeks to strengthen the security of the Proof-of-Stake (PoS) consensus mechanism by using multi-agent reinforcement learning (MRL) to detect malicious nodes in blockchain network and integrating Game Theory and Zero-Shot Learning (ZSL) to ensure consensus integrity. His long-term vision is to build resilient distributed networks that prioritize security, trust, and scalability and support the evolving demands of next-generation decentralized applications. Dr. Islam earned his bachelor’s degree in Computer Science and Engineering from the University of Dhaka, Bangladesh (2008), and both a master’s (2016) and Ph.D. (2020) in Computer Science from the University of Kentucky.</span></span></div>
]]>
</Body>
<Summary>Securing Distributed Networks: Leveraging Reinforcement Learning and Game Theory for Attack Detection and Mitigation  Dr. Md Tariqul Islam, Syracuse University  10-11am January 30, 2025;  ITE 459,...</Summary>
<Website>https://informationsystems.umbc.edu/home/calendar/events/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146655/guest@my.umbc.edu/1662b1eba791abbe21e897be7fc2f7e4/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>machine-learning</Tag>
<Tag>reinfircement-learning</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 22 Jan 2025 10:20:34 -0500</PostedAt>
<EditAt>Sat, 08 Mar 2025 15:52:14 -0500</EditAt>
</NewsItem>

</News>
