<?xml version="1.0"?>
<News hasArchived="true" page="2" pageCount="6" pageSize="10" timestamp="Sun, 26 Apr 2026 15:09:14 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=2&amp;tag=computer-science">
<NewsItem contentIssues="true" id="112022" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/112022">
<Title>Webinar on NSA Codebreaker challenge and student opportunities, Sept 9</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/09/nsalive.jpeg" rel="nofollow external" class="bo"><img width="1024" height="536" src="https://www.csee.umbc.edu/wp-content/uploads/2021/09/nsalive-1024x536.jpeg" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>NSA Codebreaker challenge and student opportunities</strong> Webinar</h2><hr><h2><strong>4-6 pm EDT Thursday, 9 September 2021, Online</strong></h2><hr><h2><a href="https://icag1.recsolu.com/external/events/83mfIlupzGcOpF6anEwyQw/sign_up" rel="nofollow external" class="bo"><strong>Register Here</strong></a></h2><hr><p>NSA will hold an  NSALive Adobe Webinar on Thursday, September 9, 2021, from 4-6 pm EDT to learn about the National Security Agency and Student Program opportunities, as well as a deep dive into the 2021 Codebreaker Challenge. Register for the online session <a href="https://icag1.recsolu.com/external/events/83mfIlupzGcOpF6anEwyQw/sign_up" rel="nofollow external" class="bo">here</a>.</p><p>The Codebreaker Challenge is the NSA’s annual cybersecurity and cryptanalysis challenge with a realistic, NSA mission-centric scenario open to U.S-based academic institutions. The 2021 challenge is open now and runs through December 31, 2021.</p><p>While the challenge is intended for students, faculty are encouraged to participate as well. Furthermore, the site was designed to make it easy for those faculty interested in incorporating the challenge into their courses (see the additional FAQ entries below.)</p><p>The <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">2021 Codebreaker Challenge</a> consists of a series of tasks worth a varying amount of points based upon their difficulty. Schools will be ranked according to their students’ total number of points with the current ranking shown on a <a href="https://nsa-codebreaker.org/leaderboard" rel="nofollow external" class="bo">leaderboard</a>. Solutions may be submitted at any time for the duration of the Challenge. </p><p>While not required, it is recommended that participants solve tasks in order since they flow with the storyline. Later tasks may rely on artifacts or inputs from earlier tasks. Each task in the 2021 challenge will require a range of skills. You will need to call upon all of your technical expertise, intuition, and common sense.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/09/nsa-codebreaker-challenge-and-student-opportunities/" rel="nofollow external" class="bo">Webinar on NSA Codebreaker challenge and student opportunities, Sept 9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>NSA Codebreaker challenge and student opportunities Webinar   4-6 pm EDT Thursday, 9 September 2021, Online   Register Here   NSA will hold an  NSALive Adobe Webinar on Thursday, September 9,...</Summary>
<Website>https://www.csee.umbc.edu/2021/09/nsa-codebreaker-challenge-and-student-opportunities/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112022/guest@my.umbc.edu/8e76470c1c9d4181a80a149d6fdf2ebe/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 04 Sep 2021 10:24:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="100066" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100066">
<Title>talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning.png" rel="nofollow external" class="bo"><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning-1024x451.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Transparent Dishonesty: Front-Running Attacks on Blockchain</strong></h2><hr><h3><strong>Professor Jeremy Clark<br>Concordia Institute for Information Systems Engineering<br>Concordia University, Montreal, Canada</strong></h3><hr><h3><strong>12–1 pm ET Friday, March 26, 2021<br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchain’s decentralized and transparent nature. I will discuss our “systemization of knowledge” paper which draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out a detailed analysis of Status.im initial coin offering (ICO) and show evidence of abnormal miner’s behavior indicative of front-running token purchases. Finally, we map the proposed solutions to front-running into useful categories.</p><hr><p><a href="https://users.encs.concordia.ca/~clark/" rel="nofollow external" class="bo">Jeremy Clark</a> is an associate professor at the Concordia Institute for Information Systems Engineering. At Concordia, he holds the NSERC/Raymond Chabot Grant Thornton/Catallaxy Industrial Research Chair in Blockchain Technologies. He earned his Ph.D. from the University of Waterloo, where his gold medal dissertation was on designing and deploying secure voting systems including Scantegrity—the first cryptographically verifiable system used in a public sector election. He wrote one of the earliest academic papers on Bitcoin, completed several research projects in the area, and contributed to the first textbook. Beyond research, he has worked with several municipalities on voting technology and testified to both the Canadian Senate and House finance committees on Bitcoin. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings: April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking;<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/" rel="nofollow external" class="bo">talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Transparent Dishonesty: Front-Running Attacks on Blockchain   Professor Jeremy Clark Concordia Institute for Information Systems Engineering Concordia...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100066/guest@my.umbc.edu/d4bc2ab5111c08f1abdbdbda8c5ad757/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Mar 2021 16:56:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99829" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99829">
<Title>talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><hr><h2><strong>EIPC: Efficient Asynchronous BFT with Adaptive Security</strong></h2><hr><h3><strong>Chao Liu, CSEE, UMBC</strong></h3><h3>12:00–1:00 pm ET, Friday, 12 March 2021<br>via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p>We present EPIC, a novel and efficient asynchronous <em><a href="https://www.geeksforgeeks.org/practical-byzantine-fault-tolerancepbft/" rel="nofollow external" class="bo">Byzantine fault-tolerant (BFT)</a></em> protocol with <em>adaptive security</em>. We characterize efficient BFT protocols using adaptive vs. static corruptions corruption models. EPIC takes a new approach to adaptively secure asynchronous BFT. It uses the adaptively secure threshold <em>pseudorandom function (PRF)</em> scheme for coin tossing and uses the Cobalt asynchronous binary agreement (ABA) protocol, which resolves the liveness issue of HoneyBadgerBFT and BEAT. As our new protocol modifies almost all building blocks for asynchronous BFT (including ABA, threshold PRF, and threshold encryption but not Byzantine reliable broadcast (RBC)), evaluating which component dominates the performance bottleneck is a difficult task. We mix and match different building blocks to implement four asynchronous BFT protocols and evaluate their performance. Via a five-continent deployment on Amazon EC2, we show that EPIC is slightly slower for small and medium-sized networks than the most efficient asynchronous BFT protocols with static security. We also find when the number of replicas less than 46, EPIC’s throughput is stable, achieving a peak throughput of 8,000–12,500 tx/sec using t2.medium VMs. When the network size grows larger, EPIC is not as efficient as those with static security, with a throughput of 4,000–6,300 tx/sec.</p><p>BFT state machine replication is the only known software solution for masking arbitrary failures and malicious attacks. BFT has been regarded as the model for building <a href="https://www.investopedia.com/terms/p/permissioned-blockchains.asp" rel="nofollow external" class="bo">permissioned blockchains</a>, where the distributed ledgers (i.e., replicas) know each other’s identities but may not trust each other.</p><p>Asynchronous protocols are inherently more robust against timing and <em>denial-of-service (DoS)</em> attacks. Two recent asynchronous BFT systems—<em>HoneyBadgerBFT</em> proposed by Miller et al. in CCS’16 and <em>BEAT</em> by Duan et al. in CCS’18—have comparable performance as partially synchronous BFT protocols and can scale to 100 replicas. The protocols, however, achieve static security, where the adversary needs to choose the set of corrupted replicas before protocol execution. This security property is weaker than that for many existing BFT protocols (e.g., <em>PBFT</em>), which achieve adaptive security, where the adversary can choose to corrupt replicas at any moment during the execution of the protocol.</p><p>Chao Liu is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests focus on cryptography, cybersecurity, and distributed systems.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings include Mar 26, Jeremy Clark (Concordia); April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking; and May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/" rel="nofollow external" class="bo">talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   EIPC: Efficient Asynchronous BFT with Adaptive Security   Chao Liu, CSEE, UMBC  12:00–1:00 pm ET, Friday, 12 March 2021 via WebEx    We present EPIC, a novel...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99829/guest@my.umbc.edu/84382550ee5147b2c2a3c3aa7b60ce2b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 06 Mar 2021 21:07:51 -0500</PostedAt>
<EditAt>Sat, 06 Mar 2021 21:07:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99477" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99477">
<Title>talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><em>The UMBC Cyber Defense Lab presents</em></h4><h2><strong>Moving Target Mobile IPv6 Defense</strong></h2><h3><strong>Prof.</strong> <strong>Vahid Heydari<br>Computer Science, Rowan University</strong></h3><h4><strong>12:00–1 pm ET, Friday, 26 February 26, 2021</strong></h4><h4>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx  </a></h4><hr><p>Remote cyberattacks can be started from an unlimited distance through the Internet. These attacks include particular actions that allow attackers to compromise systems remotely. Address-based Distributed Denial-of-Service (DDoS) attacks and remote exploits are two main categories of these attacks. A remote exploit takes advantage of a bug or vulnerability to view or steal data or gain unauthorized access to a vulnerable system. Current security solutions in IPv6 such as IPsec, firewall, and Intrusion Detection and Prevention System (IDPS) can prevent remote attacks against known vulnerability exploits. However, zero-day exploits can defeat the best firewalls and IDPSs due to using undisclosed and uncorrected computer application vulnerability. Therefore, a new solution is needed to prevent these attacks. This talk discusses a Moving Target Mobile IPv6 Defense (MTM6D) that randomly and dynamically changes the IP addresses to prevent remote attacks in the reconnaissance step. The talk briefly covers the wide range of applications of MTM6D including critical infrastructure networks, virtual private networks, web servers, Internet-controlled robots, and anti-censorship.</p><p><a href="https://csm.rowan.edu/departments/cs/facultystaff/compsci_full_part/heydari.html" rel="nofollow external" class="bo"> Vahid Heydari</a> received the M.S. degree in Cybersecurity and the Ph.D. degree in Electrical and Computer Engineering from the University of Alabama in Huntsville. He is currently an Associate Professor of Computer Science and the Director of the Center for Cybersecurity Education and Research at Rowan University, Glassboro, NJ. He is also a co-founder of a cybersecurity startup ObtegoCyber. His research interests include moving target defenses, mobile ad-hoc, sensor, and vehicular network security. He is a member of ACM, IEEE Computer Society and Communications Society. </p><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*, </a>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p><p>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security<br>Mar 26, Jeremy Clark (Concordia)<br>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game<br>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/" rel="nofollow external" class="bo">talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Moving Target Mobile IPv6 Defense  Prof. Vahid Heydari Computer Science, Rowan University  12:00–1 pm ET, Friday, 26 February 26, 2021  remotely via WebEx  ...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99477/guest@my.umbc.edu/b263066653caa243e383338d141a32f9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Feb 2021 19:44:51 -0500</PostedAt>
<EditAt>Sun, 21 Feb 2021 19:44:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99277" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99277">
<Title>Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" alt="" style="max-width: 100%; height: auto;"></a><em>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)</em><hr><h2><strong>Three CSEE faculty receive MIPS research awards</strong></h2><hr><p>This post is adapted from a UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a> written by Adriana Fraser.</p><p>Six UMBC faculty members have just received grants from the Maryland Industrial Partnerships (MIPS) program to develop new technologies with potential to grow the state’s economy. This is UMBC’s largest number of winning proposals within a single proposal round since MIPS began in 1987. The program connects University System of Maryland (USM) faculty and students with Maryland businesses. UMBC’s latest MIPS grantees include computer science and electrical engineering faculty <strong><a href="https://www.csee.umbc.edu/people/faculty/tim-oates/" rel="nofollow external" class="bo">Tim Oates</a></strong>, <strong><a href="https://www.csee.umbc.edu/people/faculty/chein-i-chang/" rel="nofollow external" class="bo">Chein-I Chang</a></strong>, and <strong>A</strong><a href="https://www.csee.umbc.edu/people/faculty/anupam-joshi/" rel="nofollow external" class="bo"><strong>nupam Joshi</strong>;</a><a href="https://news.umbc.edu/sensing-an-opportunity-to-improve-wind-energy-maryland-innovation-initiative-and-bwtech-help-umbc-faculty-commercialize-their-research/" rel="nofollow external" class="bo"> <strong>Soobum Lee</strong></a>, mechanical engineering; <a href="https://news.umbc.edu/?s=dipanjan" rel="nofollow external" class="bo"><strong>Dipanjan Pan</strong></a>, chemical, biochemical, and environmental engineering; and <strong><a href="https://imet.usmd.edu/directory/vikram-vakharia" rel="nofollow external" class="bo">Vikram Vakharia</a></strong>, marine biotechnology. Among their industry partners are UMBC alumni entrepreneurs who are building businesses in Maryland.</p><p>Joshi, professor and chair of computer science and electrical engineering, received a MIPS grant for a cybersecurity collaboration with the startup <strong><a href="https://cydeploy.com/" rel="nofollow external" class="bo">CyDeploy</a>.</strong> They are developing a platform that automates the quality assurance process for cybersecurity updates made to IT and “internet of things” (IoT) devices like Amazon Alexa, Google Home, and health and medical devices. CyDeploy CEO <strong><a href="https://tcecure.com/tina-williams-koroma/" rel="nofollow external" class="bo">Tina Williams-Koroma</a></strong> ’02, computer science, presented Joshi with the idea to develop a “cybersecurity-driven change management system.” The technology is based on and leverages the use of artificial intelligence and machine learning to create a cloud-based replica of a company’s systems. </p><p>Williams-Koroma and Joshi’s group at UMBC developed a conceptual prototype. It shows the infrastructure and technology that would make the system feasible, combining off-the-shelf tools with novel research. “Increasingly, the government is now beginning to mandate security requirements around IoT devices. The longer-term vision that CyDeploy has is capturing the state of these systems, virtually recreating them and then running the security changes against virtual versions to see how the changes would affect those systems,” Joshi adds. </p><p>Williams-Koroma, who is also an adjunct instructor at UMBC, projects that the initial development of the platform will be complete in late spring 2021. They anticipate launching a free pilot version for businesses to test their IT systems. IoT pilots will come in a later phase.</p><hr><p>Read more about these awards in the UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a>.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/" rel="nofollow external" class="bo">Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)  Three CSEE faculty receive MIPS research awards   This...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99277/guest@my.umbc.edu/be762a3ecac75c981fea346f57be054f/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 13 Feb 2021 12:27:43 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99049" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99049">
<Title>Two UMBC alumnae featured in Cybersecurity podcast</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2>Two UMBC alumnae featured in The CyberWire podcast</h2><hr><p>The CyberWire produced a special podcast, <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo"><strong>In the clear: what it’s like working as a woman in the cleared community</strong>,</a> that features three women working on cybersecurity atNorthrop Grumman. Two are UMBC alumnae, software engineering manager <a href="https://www.linkedin.com/in/laurenmazzoli/" rel="nofollow external" class="bo">Lauren</a> and cyber software engineer <a href="https://www.linkedin.com/in/priyanka-ranade/" rel="nofollow external" class="bo">Priyanka</a>. </p><p>Lauren received a BS in Computer Science in 2015 and an M.S. in Computer Science in 2017.  As an undergraduate student, she worked part-time as an IT Security Analyst tracking, locating, and performing forensics on infected computers located on campus.  She joined Northrop Grumman in 2015 and continued her studies as a part-time graduate student, doing research on investigating different ways of characterizing cybersecurity exploit kits and the malware they produce.</p><p>Priyanka received a BS in Computer Science in 2018 and an MS in Computer Science in 2019. Her MS research was on multilingual text alignment for cybersecurity.  She has been a lecture in the UMBC Computer Science program and the UMD Advanced Cybersecurity Experience for Students (<a href="https://aces.umd.edu/" rel="nofollow external" class="bo">ACES</a>) program. She is currently working on a Computer Science Ph.D. at UMBC focused on how AI can help protect cybersecurity systems from data poisoning attacks.</p><hr><h4><strong>Listen to the 47 minute podcast <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo">here</a>.</strong></h4></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/" rel="nofollow external" class="bo">Two UMBC alumnae featured in Cybersecurity podcast</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Two UMBC alumnae featured in The CyberWire podcast   The CyberWire produced a special podcast, In the clear: what it’s like working as a woman in the cleared community, that features three women...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99049/guest@my.umbc.edu/8cbe836bf34d307b2d78936645d9ea5b/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 20:19:43 -0500</PostedAt>
<EditAt>Sun, 07 Feb 2021 20:19:43 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="98052" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/98052">
<Title>event: UMBC INSuRE Research Projects from Fall 2020, 12-1:30 ET 12/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/12/insure_logo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h4><strong>UMBC’s Cyber Defense Lab presents</strong></h4><hr><h2><strong>Presentations of the UMBC INSuRE Research Projects from Fall 2020</strong></h2><hr><h3><strong>12:00noon–1:30pm, Friday, 18 December 2020</strong></h3><h3>via <a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><hr><p>The <a href="https://arxiv.org/pdf/1703.08859.pdf" rel="nofollow external" class="bo">Information Security Research and Education</a> (INSuRE) research collaborative is a network of National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) universities that cooperate to engage students in solving applied cybersecurity research problems. Since fall 2012, INSuRE has fielded a multi-institutional cybersecurity research course in which BS, MS, and Ph.D. students work in small groups to solve unclassified problems proposed by the National Security Agency (NSA) and by other government and private organizations and laboratories.</p><p><strong>Schedule</strong><br>12:00-12:15pm poster presentations<br>12:15-12:40pm Detecting Web-Based Cryptomining Malware by Mining Open-Source Repositories<br>12:40-1:05pm Meeting Mayhem: A Network Adversary Game<br>1:05-1:30pm Analysis of the 5G AKA protocol with Comparison to 4G AKA</p><p><strong>Detecting Web-Based Cryptomining Malware by Mining Open-Source Repositories</strong><br>Naomi Albert, Elias Enamorado, Benjamin Padgette, Anshika Patel<br>Technical Director: William J. La Cholter (APL)<br>UMBC Expert: Charles Nicholas</p><p>With the ever-increasing popularity of browser-based cryptomining it is now more important than ever to detect malicious cryptojacking code. This paper serves to identify reliable indicators of injected cryptomining code in open-source repositories using static source code analysis techniques. We analyze static source code features of a curated set of cryptomining projects and innocuous codebases that are available as open-source projects on GitHub. Through this analysis we show that a novel Normalized Halstead Difficulty metric can be an important indicator of the presence of cryptomining software. Specifically, the Normalized Halstead complexity is significantly higher for cryptomining source code files as compared to the sampled non-miners. Using this newfound knowledge of the complexity of browser-based JavaScript cryptominers, supply-chain cryptojacking injection attacks in open-source repositories may be easier to identify through automated code review techniques.</p><p><strong>Meeting Mayhem: A Network Adversary Game</strong><br>Richard Baldwin, Trenton Foster<br>Technical Director: Edward Zieglar (NSA)<br>UMBC Experts: Marc Olano, Linda Oliva</p><p>Meeting Mayhem, a web-based educational game, teaches adversarial thinking through the Dolev-Yao security model. Meeting Mayhem is based on the paper-and-pencil “Protocol Analysis Game,” introduced by Edward Zieglar and adapted by UMBC PhD student Enis Golaszewski. Two or more users try to arrange a meeting time and place by sending messages through an insecure network controlled by an adversary. Through self discovery, players learn the dangers of network communications and the value of sound protocols supported by encryption, hashing, and digital signatures.</p><p><strong>Formal Methods Analysis of the 5G AKA protocol, with Comparison to 4G AKA</strong><br>Prajna Bhandary, Ryan Jahnige, Jason Schneck<br>Technical Director: Edward Zieglar (NSA)</p><p>We analyze the Fifth Generation (5G) Authentication and Key Agreement (AKA) protocol and the Fourth Generation (4G) Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol for possible structural faults using the Cryptographic Protocol Shapes Analyzer (CPSA). It is fundamental to provide authentication and key management in the security of cellular networks. 5G AKA provides mutual authentication between subscribers and the network, by providing the keys to protect both signaling and user plane data. 4G defines an authentication method, EPS-AKA, whereas 5G offers several different authentication techniques: 5G AKA, 5G EAP-AKA, and 5G EAP-TLS. In addition to our formal method analysis of 5G AKA and 4G EPS-AKA, we also analyze the differences in security properties between the 4G EPS-AKA protocol, and 5G AKA protocol. We verify that the upgrades made to 4G EPS-AKA improves control of the Home Network (HN) in 5G AKA. Additionally, we found that the ambiguous nature of the documentation regarding the channel between Serving Network (SN) and HN results in authentication concerns and we propose a solution.</p><p>Course Instructor: Alan T. Sherman</p><p>Support for this event is provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL meetings:</p><p>Biweekly CDL talks will resume in the spring 2021 semester.<br>The 2021 UMBC SFS/CySP Research Study will take place remotely in January (likely January 11-15).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/12/event-umbc-insure-research-projects-from-fall-2020-12-130-et-12-18/" rel="nofollow external" class="bo">event: UMBC INSuRE Research Projects from Fall 2020, 12-1:30 ET 12/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Cyber Defense Lab presents   Presentations of the UMBC INSuRE Research Projects from Fall 2020   12:00noon–1:30pm, Friday, 18 December 2020  via WebEx   The Information Security Research...</Summary>
<Website>https://www.csee.umbc.edu/2020/12/event-umbc-insure-research-projects-from-fall-2020-12-130-et-12-18/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/98052/guest@my.umbc.edu/a7f293a2362640ad181a5fa3ae035606/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>education</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 12 Dec 2020 10:11:12 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="97183" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/97183">
<Title>Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2020/11/remotegrity-1024x451.png" alt="" style="max-width: 100%; height: auto;">Remotegrity was the first voter-verifiable Internet voting system used in 2011 for a public office election in Takoma Park, Maryland<hr><h2><strong>Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</strong></h2><hr><p>Over the past several months, the topic of online voting has been at the top of the minds of millions of Americans and has been widely debated. Supporters often highlight how it would increase voter turnout through improved accessibility and convenience. Privacy and election integrity are among the top concerns about implementing an online voting system.</p><p>Researchers from UMBC and <strong>xx.network</strong> have been working to design an online voting system that is resistant to coercion and would provide a secure way for people to cast their ballots from computers, tablets, and smartphones in the future. <strong><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo">Alan Sherman</a></strong>, professor of computer science and electrical engineering, is developing the system, <a href="http://votexx.org" rel="nofollow external" class="bo"><strong>VoteXX</strong></a>, with <strong><a href="https://en.wikipedia.org/wiki/David_Chaum" rel="nofollow external" class="bo">David Chaum</a></strong>, a cryptographer known for his work on privacy-centered technology, and <strong>Richard Carback </strong>‘05, M.S. ‘08, Ph.D. ‘10, computer science, who has spent his career deflecting would-be hackers.</p><p>The security of devices that voters might use to cast their ballot is a significant concern, notes Sherman. He explains that malware on the devices that voters use might change the votes or spy on the voter.</p><div><img src="https://i2.wp.com/news.umbc.edu/wp-content/uploads/2020/11/Sherman-Forno-NSF-5120.jpg?resize=720%2C480&amp;ssl=1" alt="Two men facing each other talking in a hallway." style="max-width: 100%; height: auto;">Alan Sherman, right, talking with Rick Forno on campus in 2018. Photo by Marlayna Demond ’11 for UMBC.</div><p>As described in a <a href="https://votexx.org/votexx-press-release.pdf" rel="nofollow external" class="bo">press release</a> and the researchers’ <a href="https://votexx.org/votexx-whitepaper.pdf" rel="nofollow external" class="bo">new whitepaper</a>, <strong>VoteXX</strong> allows voters to confirm that their ballots were accurately cast, collected, and counted. This system uses ideas from an earlier system, <a href="https://www.csee.umbc.edu/2011/11/remotegrity-first-voter-verifiable-internet-voting-for-public-office/" rel="nofollow external" class="bo">Remotegrity</a>, that the collaborators developed and used in a municipal election in Takoma Park, Maryland, in 2011. Voters received secret vote codes on a scratch-off card via traditional mail, which they used to hide their votes from the software and hardware.  Remotegrity was based on <a href="https://en.wikipedia.org/wiki/Scantegrity" rel="nofollow external" class="bo">Scantegrity</a>, an earlier in-person verifiable voting that was also used in binding elections in Takoma Park, Maryland.</p><p><strong>VoteXX</strong> uses a combination of simple strategies and complex cryptography to create a more secure online voting scheme.  For example, to address the issues of coercion and vote selling, VoteXX allows voters to cancel or change their vote up to a certain deadline. David Chalm explains how this simple capability undermines vote selling.  “You make it possible to flip (change or cancel) that vote outside the voting process. Because a vote buyer cannot be sure you didn’t or won’t flip your vote, they can’t be sure that a voter has been honest with them, making it useless to buy votes.”</p><p>This “vote flipping” approach provides a subversively simple yet powerful tool to voters. It’s accomplished by creating a “flip code” during the registration process that allows the voter to flip their vote after casting. </p><p>You can read more about this research in a <a href="https://news.umbc.edu/umbcs-alan-sherman-and-collaborators-develop-strategy-for-secure-online-voting-in-future-u-s-elections/" rel="nofollow external" class="bo">UMBC News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/11/alan-sherman-and-collaborators-develop-votexx-with-new-strategies-for-secure-online-voting/" rel="nofollow external" class="bo">Alan Sherman and collaborators develop VoteXX with new strategies for secure online voting</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Remotegrity was the first voter-verifiable Internet voting system used in 2011 for a public office election in Takoma Park, Maryland  Alan Sherman and collaborators develop VoteXX with new...</Summary>
<Website>https://www.csee.umbc.edu/2020/11/alan-sherman-and-collaborators-develop-votexx-with-new-strategies-for-secure-online-voting/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/97183/guest@my.umbc.edu/c14b5f60ec62248ffbb2b7d7dcb1df5d/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 03 Nov 2020 21:00:42 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="96548" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96548">
<Title>talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/voting-1024x512.png" alt="" style="max-width: 100%; height: auto;"> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the protocol).<hr><h4><strong>UMBC Cyber Defense Lab</strong></h4><h2><strong>BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer</strong></h2><h3><strong>Farid Javani, CSEE, UMBC</strong></h3><h4>12:00–1:00pm, Friday, 6 November 2020</h4><h4><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">http://<strong>umbc.webex.com/meet/sherman</strong></a></h4><p><strong>(Joint work with Alan T. Sherman)</strong></p><hr><p>A boardroom election is an election with a small number of voters carried out with public communications. We present <a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a>, a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally information is available before the polls close), and dispute-freeness (voters can observe that all voters correctly followed the protocol).</p><p><a href="https://arxiv.org/pdf/2010.02421.pdf" rel="nofollow external" class="bo">BVOT</a> works by using a multiparty threshold homomorphic encryption system in which each candidate is associated with a masked unique prime. Each voter engages in an oblivious transfer with an untrusted distributor: the voter selects the index of a prime associated with a candidate and receives the selected prime in a masked form. The voter then casts their vote by encrypting their masked prime and broadcasting it to everyone. The distributor does not learn the voter’s choice, and no one learns the mapping between primes and candidates until the audit phase. By hiding the mapping between primes and candidates, BVOT provides voters with insufficient information to carry out effective cheating. The threshold feature prevents anyone from computing any partial tally—until everyone has voted. Multiplying all votes, their decryption shares, and the unmasking factor yields a product of the primes each raised to the number of votes received.</p><p>In contrast to some existing boardroom voting protocols, BVOT does not rely on any zero-knowledge proof; instead, it uses oblivious transfer to assure ballot secrecy and correct vote casting. Also, BVOT can handle multiple candidates in one election. BVOT prevents cheating by hiding crucial information: an attempt to increase the tally of one candidate might increase the tally of another candidate. After all votes are cast, any party can tally the votes.</p><p><a href="https://www.linkedin.com/in/farid-javani-68118741/" rel="nofollow external" class="bo">Farid Javani</a> is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests include algorithms, security, applied cryptography, and distributed systems. He is the manager of the Enterprise Architecture team at CCC Information Services in Chicago. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1:00 pm. All meetings are open to the public. Upcoming CDL Meetings: Oct. 30, Jonathan Katz (UMCP), [possibly on secure distributed computation]; Nov. 13, TBA, [possibly: David R Imbordino (NSA), Security of the 2020 presidential election]; and Dec. 11, TBA, [possibly: Peter A. H. Peterson (Univ. of Minnesota Duluth), Adversarial Thinking]</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/" rel="nofollow external" class="bo">talk: BVOT, Self-Tallying Boardroom Voting with Oblivious Transfer; 12-1pm 11/6</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary> BVOT is a self-tallying boardroom voting protocol with ballot secrecy, fairness (no tally info. available before polls close), and dispute-freeness (voters can see that all voters followed the...</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-bvot-self-tallying-boardroom-voting-with-oblivious-transfer-12-1pm-11-6/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96548/guest@my.umbc.edu/ca88798fe3c6bb9e5e3e69188b2b1c80/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 11 Oct 2020 17:46:41 -0400</PostedAt>
<EditAt>Mon, 19 Oct 2020 17:46:00 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="96415" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/96415">
<Title>talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/10/dc_blockchain_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h3>UMBC Data Science Meetup Talk</h3><h1><strong>Exploding Blockchain Myths</strong></h1><h3><strong>Maria Vachino and Dr. James P. Howard</strong></h3><h3>5:30-7:00pm Tuesday, 13 October 2020</h3><hr><p>In this talk, Maria Vachino from Easy Dynamics and Dr. James P. Howard from APL will provide an overview of what blockchain is and isn’t, focusing on non-cryptocurrency use cases, will explain the results of their research for the DHS S&amp;T Cybersecurity Directorate, and will provide insight into the value (or lack therefore) of the technology. </p><p>References:<br>  • <a href="https://ieeexplore.ieee.org/document/8965252/" rel="nofollow external" class="bo">https://ieeexplore.ieee.org/document/8965252/</a><br>  • <a href="http://jitm.ubalt.edu/XXX-3/article3.pdf" rel="nofollow external" class="bo">http://jitm.ubalt.edu/XXX-3/article3.pdf</a></p><p><a href="https://www.linkedin.com/in/mariavachino/" rel="nofollow external" class="bo">Maria Vachino</a> is the Director of Digital Identity at <a href="https://www.easydynamics.com/" rel="nofollow external" class="bo">Easy Dynamics</a> where she is focused on Identity Credential &amp; Access Management (ICAM) technologies, policies, &amp; standards, Cybersecurity, and IT modernization for the US Federal Government. She started investigating applications for blockchain technology in 2015 as the Technical and Government Engagement Lead for the DHS S&amp;T Cyber Security Directorate’s Identity Management Research &amp; Development Program while a member of the Senior Professional Staff at the Johns Hopkins Applied Physics Lab. Maria has a BS in Computer Science from UMBC and an MS in Cybersecurity.</p><p>Dr. <a href="https://www.linkedin.com/in/k3jph/" rel="nofollow external" class="bo">James P. Howard, II</a> (UMBC Ph.D. ’14) is a scientist at the <a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo">Johns Hopkins Applied Physics Laboratory</a>. Previously, he was a consultant to numerous government agencies, including the Securities and Exchange Commission, the Executive Office of the President, and the United States Department of Homeland Security, and worked for the Board of Governors of the Federal Reserve System as an internal consultant on scientific computing. He is a passionate educator, teaching mathematics and statistics at the University of Maryland Global Campus since 2010 and has taught public management at Central Michigan University, Penn State, and the University of Baltimore. His most recent work has modeled the spread of infectious respiratory diseases and Ebolavirus, predicted global disruptive events, researched using blockchain for government services, and created devices for rescuing victims of building collapse. He is the author of two books.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/" rel="nofollow external" class="bo">talk: Exploding Blockchain Myths, 5:30pm Tue 10/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Data Science Meetup Talk  Exploding Blockchain Myths  Maria Vachino and Dr. James P. Howard  5:30-7:00pm Tuesday, 13 October 2020   In this talk, Maria Vachino from Easy Dynamics and Dr....</Summary>
<Website>https://www.csee.umbc.edu/2020/10/talk-exploding-blockchain-myths-530pm-tue-10-13/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/96415/guest@my.umbc.edu/097b844dc5ba2983199d05604cc47309/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 06 Oct 2020 20:58:09 -0400</PostedAt>
<EditAt>Tue, 06 Oct 2020 20:58:09 -0400</EditAt>
</NewsItem>

</News>
