<?xml version="1.0"?>
<News hasArchived="true" page="2" pageCount="2" pageSize="10" timestamp="Sun, 26 Apr 2026 13:29:28 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=2&amp;tag=uncategorized">
<NewsItem contentIssues="true" id="92101" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92101">
<Title>Talk: Lance Hoffman (GWU) Cyber Policy Challenges, 12-1pm 4/24 online</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="1024" height="536" src="https://www.csee.umbc.edu/wp-content/uploads/2020/04/Lance_Hoffman_talk-1024x536.png" alt="" style="max-width: 100%; height: auto;"><h4>The UMBC Cyber Defense Lab presents</h4><h2>Cyber Policy Challenges</h2><h3>Lance J. Hoffman<br>Distinguished Professor, George Washington University</h3><h3>12–1:00 pm, Friday, 24 April 2020</h3><h3><a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">remotely via WebEx</a> </h3><hr><p>System attackers and defenders operate on a constantly changing battlefield, and some of the more serious conflicts involving nation-states could be considered acts of war, though we are still in the early stages of defining war in cyberspace. Policies for security and privacy can vary wildly, and have important personal, national, and global consequences for privacy, free speech, censorship, and other issues. Things get even more complicated with the advent of the Internet of Things, where (mostly unsophisticated) users may think they have more control than they actually do and can make bad mistakes. Various ethical issues related to the development of these systems, including bias in artificial intelligence and what harm to choose when harm is unavoidable have only started to be examined. This talk will provide both historical context and some discussion of topical issues such as Zoombombing and the security of electronic voting systems as compared to mail ballots and traditional voting.</p><hr><p>Professor <a href="https://www.cs.seas.gwu.edu/lance-j-hoffman" rel="nofollow external" class="bo">Lance J. Hoffman</a> is the author or editor of numerous articles and five books on computer security and privacy. He developed the first regularly offered course on computer security at the University of California, Berkeley in 1970. A Fellow of the Association for Computing Machinery and a member of the Cyber Security Hall of Fame, Dr. Hoffman institutionalized the ACM Conference on Computers, Freedom, and Privacy. He has served on a number of Advisory Committees including those of Federal Trade Commission and the Department of Homeland Security and has testified before Congress on security and privacy-related issues. He is the principal investigator of the CyberCorps program at GWU. Dr. Hoffman earned his Ph. D. in Computer Science from Stanford University, after a B.S. in Mathematics from Carnegie Mellon University.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL meetings: May 8, Jason Wells (UMBC SFS scholar) law enforcement;  May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE456</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/talk-lance-hoffman-gwu-cyber-policy-challenges/" rel="nofollow external" class="bo">Talk: Lance Hoffman (GWU) Cyber Policy Challenges, 12-1pm 4/24 online</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Cyber Policy Challenges  Lance J. Hoffman Distinguished Professor, George Washington University  12–1:00 pm, Friday, 24 April 2020  remotely via WebEx...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/talk-lance-hoffman-gwu-cyber-policy-challenges/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92101/guest@my.umbc.edu/82505162580cdf42c92f5a6e2c15d321/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 11 Apr 2020 12:15:46 -0400</PostedAt>
<EditAt>Sat, 11 Apr 2020 12:15:46 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="91615" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91615">
<Title>Online Talks Double Feature:  Blockchain and Network Defense, 12-2 Fri 3/27, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    
    
    <h4>UMBC will hold a double feature with two online security-oriented talks from 12:00 pm to 2:00 pm EDT on Friday, March 27.  Both talks will be shared via Webex.</h4>
    
    
    
    <br><hr><br><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/Screen-Shot-2020-03-26-at-9.59.41-PM-1024x457.png" alt="" style="max-width: 100%; height: auto;"><br><h4>From 1:00-2:00 pm, Professor Dr. John Mitchell of Stanford University will give a Lockheed Martin Distinguished lecture on “<a href="https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/" rel="nofollow external" class="bo">Will Blockchain Change Everything</a>“.  Join the presentation online at 1:00 pm EDT at <strong><a href="https://umbc.webex.com/meet/joshi" rel="nofollow external" class="bo">https://umbc.webex.com/meet/joshi</a></strong>.</h4>
    
    
    
    <h4>Far from serving only as a foundation for cryptocurrency, blockchain technology provides a general framework for trusted distributed ledgers. Over the past few years, their popularity has grown tremendously, as shown by the number of companies and efforts associated with the Linux Foundation’s Hyperledger project, for example. From a technical standpoint, a blockchain combines a storage layer, networking protocols, a consensus layer, and a programmable transaction layer, leveraging cryptographic operations. The distributed state machine paradigm provides atomicity and transaction rollback, while consensus supports distributed availability as well as certain forms of fair access. From an applications perspective, blockchains appeal to distributed networks of independent agents, as arise in supply chain, credentialing, and decentralized financial services. The talk will look at the potential for radical change as well as specific technical challenges associated with verifiable consensus protocols and trustworthy smart contracts.</h4>
    
    
    
    <br><hr><br><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/Screen-Shot-2020-03-26-at-9.59.58-PM-1024x462.png" alt="" style="max-width: 100%; height: auto;"><br><h4>From 12:00-1:00  pm EDT Col. Dan Yaroslaski, a former operations officer at the Marine Forces Cyberspace Command will talk on “<a href="https://www.csee.umbc.edu/2020/03/webex-talk-hard-learned-lesson-in-defense-of-a-network-12-1-fri-3-27/" rel="nofollow external" class="bo">Hard-Learned Lesson in Defense of a Network</a>“.  You can join the presentation online at 12:00 pm at <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">https://umbc.webex.com/meet/sherman</a>.</h4>
    
    
    
    <h4>Often network defenders fail to take into account organizational culture when attempting to provide a secure, reliable, and usable enterprise network. Users and process leaders often fall victim to the false allure of the value of networked systems, without asking the question, “Should this be networked?” Collectively, organizations also forget that networks are a combination of the humans who use the network, the personas we all have to form to gain access to this manmade domain, and the interplay of logical and physical network architecture manifested in geographical locations. The value of some simple military principles—including defense-in-depth, mission focus, redundancy, and resiliency versus efficiency—can help a network defender better advise everyone from the “C Suite” decision-makers to the average network user, on how to have a secure network while accepting reasonable limitations.</h4>
    
    
    
    
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/online-talks-double-feature-blockchain-and-network-defense-12-2-fri-3-27-umbc/" rel="nofollow external" class="bo">Online Talks Double Feature:  Blockchain and Network Defense, 12-2 Fri 3/27, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC will hold a double feature with two online security-oriented talks from 12:00 pm to 2:00 pm EDT on Friday, March 27.  Both talks will be shared via Webex.          From 1:00-2:00 pm,...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/online-talks-double-feature-blockchain-and-network-defense-12-2-fri-3-27-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91615/guest@my.umbc.edu/02d72add2655694ae942c1b404c60363/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 26 Mar 2020 22:50:30 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="89804" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/89804">
<Title>JHU/APL CIRCUIT internship program information session, 3pm Fri 1/31</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/01/jhuapl_internships-1024x536.png" alt="" style="max-width: 100%; height: auto;"><h2>JHU/APL CIRCUIT internship program information session</h2>
    
    
    
    <h3>3:00-4:00 pm Friday, 31 January 2020</h3>
    
    
    
    <h3>ITE 459, UMBC</h3>
    
    
    
    <p>There will be a special information session on the JHU/APL CIRCUIT internship program from 3:00 pm to 4:30 pm on Friday, 31 January 2020 in room ITE 459.</p>
    
    
    
    <p>This session is for undergraduates who want to spend their summer (June through August) getting paid to do mentored research at the<a href="https://www.jhuapl.edu/" rel="nofollow external" class="bo"> Johns Hopkins University Applied Physics Lab</a>.  The research areas include AI, data science, cybersecurity, precision medicine, and planetary exploration.</p>
    
    
    
    <p>Interns selected for the program will do mission-oriented research on-site at JHU/APL in Laurel MD mentored by STEM professionals.  There will also be year-round opportunities for engagement and enrichment. The selection for an internship will be based on a combination of potential, need and commitment.</p>
    
    
    
    <p>Email *protected email* or *protected email* with questions.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/01/jhu-apl-circuit-internship-program-information-session-3pm-fri-1-31/" rel="nofollow external" class="bo">JHU/APL CIRCUIT internship program information session, 3pm Fri 1/31</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>JHU/APL CIRCUIT internship program information session      3:00-4:00 pm Friday, 31 January 2020      ITE 459, UMBC      There will be a special information session on the JHU/APL CIRCUIT...</Summary>
<Website>https://www.csee.umbc.edu/2020/01/jhu-apl-circuit-internship-program-information-session-3pm-fri-1-31/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/89804/guest@my.umbc.edu/78328c3f0e19647545384211b4aa76f6/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Tag>undergraduate</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 22 Jan 2020 16:05:36 -0500</PostedAt>
<EditAt>Wed, 01 Jan 2020 16:05:36 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="88544" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/88544">
<Title>UMBC Cyberdawgs win first place in the 2019 DOE CyberForce Competition</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/11/doe_cyberforce-1024x536.png" alt="" style="max-width: 100%; height: auto;">UMBC’s CyberDawgs win first place in the 2019 DOE Cyberforce Competition<h3><strong>Cyberdawgs place first out of 105 teams in DOE’s 5th CyberForce Competition</strong></h3>
    
    
    
    <p>Congratulations to the <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">UMBC CyberDawgs</a> team for their first place finish in a field of 105 collegiate teams in the U.S. Department of Energy’s Fifth Annual <a href="https://cyberforcecompetition.com/" rel="nofollow external" class="bo">CyberForce Competition</a>. The distributed event was held at ten of the DOE’s National Laboratories and challenged 105 teams to defend a simulated energy infrastructure from cyber-attacks. </p>
    
    
    
    <p>The took place on November 15 and 16  with the goal of  bolstering the U.S. cybersecurity workforce by extending skill-building opportunities for students, offering memorable hands-on experiences and highlighting the crucial role this field plays in preserving national energy security.  The Cyberdawgs participated at the <a href="https://www.anl.gov/" rel="nofollow external" class="bo">Argonne National Laboratory</a> site in Illinois.</p>
    
    
    
    <p>During the competition, teams competed to defend their simulated infrastructure from attacks by adversarial ​“red teams” composed of industry professionals, all while maintaining service for their ​“green team” customers, played by volunteers.  The scenarios included simulated industrial control system components, real-world anomalies and constraints, and interaction with users of the systems. </p>
    
    
    
    <p>Teams were  scored on their success in protecting the infrastructure against attacks while ensuring the usability of the system, with additional points awarded for innovative ideas and defenses.</p>
    
    
    
    <p>The team that competed in this year’s competition was chosen from members of the <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">CyberDawgs</a> student group, composed of students from a variety of majors who share a common interest in computer and network security.  No prior experience is required to join and any UMBC students who want to learn more about cybersecurity and learn new skills in the field are encouraged to subscribe to its mailing list and attend meetings.</p>
    
    
    
    
    
    
    
    <p>The CyberDawgs group is advised by CSEE faculty <a href="https://www.csee.umbc.edu/people/faculty/charles-nicholas/" rel="nofollow external" class="bo">Charles Nicholas</a> and <a href="https://www.csee.umbc.edu/~rforno/" rel="nofollow external" class="bo">Richard Forno</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/11/umbc-cyberdawgs-win-first-place-2019-doe-cyberforce-competition-argonne-cybersecurity-security/" rel="nofollow external" class="bo">UMBC Cyberdawgs win first place in the 2019 DOE CyberForce Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s CyberDawgs win first place in the 2019 DOE Cyberforce Competition Cyberdawgs place first out of 105 teams in DOE’s 5th CyberForce Competition      Congratulations to the UMBC CyberDawgs...</Summary>
<Website>https://www.csee.umbc.edu/2019/11/umbc-cyberdawgs-win-first-place-2019-doe-cyberforce-competition-argonne-cybersecurity-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/88544/guest@my.umbc.edu/ee7b8df122690fe7ad2794a05a16674d/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Tag>undergraduate</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>8</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 17 Nov 2019 17:25:26 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="86326" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86326">
<Title>talk: Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/09/srp_image-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4>
    
    
    
    <h2>Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</h2>
    
    
    
    <h3>Erin Lanus, UMBC Cyber Defense Lab</h3>
    
    
    
    <h4>12:00–1:00pm, Friday, 6 September 2019, ITE 227, UMBC</h4>
    
    
    
    <p>Joint work with Alan Sherman, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus Bonyadi, Mario Costa, Moses Liskov, and Edward Zieglar</p>
    
    
    
    <p><a href="https://en.wikipedia.org/wiki/Secure_Remote_Password_protocol" rel="nofollow external" class="bo">Secure Remote Password</a> (SRP) is a widely deployed password authenticated key exchange (PAKE) protocol used in products such as 1Password and iCloud Keychain. As with other PAKE protocols, the two participants in SRP use knowledge of a pre-shared password to authenticate each other and establish a session key. I will explain the SRP protocol and security goals it seeks to achieve. I will demonstrate how to model the protocol using the Cryptographic Protocol Shapes Analyzer (CPSA) tool and present my analysis of the shapes produced by CPSA.</p>
    
    
    
    <p><a href="https://www.linkedin.com/in/erin-lanus-27b340176/" rel="nofollow external" class="bo">Erin Lanus</a> earned her Ph.D. in computer science in May 2019 from Arizona State University. Dr. Lanus is currently conducting research with Professor Sherman’s Protocol Analysis Lab at UMBC. Her previous results include how to use state to enable CPSA to reason about time in forced-latency protocols. Her research also explored algorithmic approaches to constructing combinatorial arrays employed in interaction testing and the creation of a new type of array for attribute distribution to achieve anonymous authorization in attribute-based systems. In October she will begin as a research assistant professor at Virginia Tech’s Hume Center in Northern Virginia.  email: *protected email*</p>
    
    
    
    <p>Support for this research was provided in part by grants to <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">CISA</a> from the Department of Defense, CySP grants H98230-17-1-0387 and H98230-18-0321.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/09/talk-analysis-of-secure-remote-password-srp-protocol-using-cpsa-umbc-cybersecurity/" rel="nofollow external" class="bo">talk: Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Analysis of the Secure Remote Password (SRP) Protocol Using CPSA      Erin Lanus, UMBC Cyber Defense Lab      12:00–1:00pm, Friday, 6 September 2019, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2019/09/talk-analysis-of-secure-remote-password-srp-protocol-using-cpsa-umbc-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86326/guest@my.umbc.edu/fa69f8ed49100aecdbfa8e0cfc867b00/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 03 Sep 2019 22:21:17 -0400</PostedAt>
<EditAt>Tue, 03 Sep 2019 22:21:17 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="86104" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86104">
<Title>CSEE faculty Ben Shariati co-author of NIST guide on mobile device security and privacy</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/07/mobile_sec-1024x536.png" alt="" style="max-width: 100%; height: auto;"><h3>Dr. Ben Shariati co-author of NIST guide on mobile device security and privacy</h3>
    
    
    
    <p><a href="https://cybersecurity.umbc.edu/ben-shariati/" rel="nofollow external" class="bo">Dr. Behnam Shariati</a>, Assistant Director of the <a href="http://cyber.umbc.edu/" rel="nofollow external" class="bo">UMBC Graduate Cybersecurity Program</a>, is one of the authors of a new NIST Cybersecurity Practice Guide guide on how organizations can use standards-based, commercially available products to help meet their mobile device security and privacy needs.  Dr. Shariati is also a lecturer in Cybersecurity graduate program and oversees its operations at the Universities at Shady Grove in Rockville, MD. </p>
    
    
    
    <p>To address the challenge of securing mobile devices while managing risks, the <a href="https://www.nccoe.nist.gov/" rel="nofollow external" class="bo">National Cybersecurity Center of Excellence</a> (NCCoE) at the National Institute of Standards and  Technology (NIST) built a laboratory environment to explore how various mobile security technologies can be integrated within an enterprise’s network.</p>
    
    
    
    <p>A draft version of the document is available as NIST SPECIAL PUBLICATION 1800-21A, <a href="https://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/corporate-owned-personally-enabled" rel="nofollow external" class="bo">Mobile Device Security, Corporate-Owned Personally-Enabled (COPE)</a> and NIST solicits comments on it by September 23, 2019.</p>
    
    
    
    <p>From the summary:</p>
    
    
    
    <p>“The rapid pace at which mobile technologies evolve requires regular reevaluation of a mobility program to ensure it is accomplishing its security, privacy, and workplace functionality. Built-in mobile protections may not be enough to fully mitigate the security challenges associated with mobile information systems. Usability, privacy, and regulatory requirements each influence which mobile security technologies and security controls are going to be well-suited to meet the needs of an organization’s mobility program.</p>
    
    
    
    <p>The goal of the Mobile Device Security: Corporate-Owned Personally-Enabled (COPE) project is to provide an example solution demonstrating how organizations can use a standards-based approach and commercially available technologies to meet their security needs for using mobile devices to access enterprise resources.</p>
    
    
    
    <p>The sample solution details tools for an enterprise mobility management (EMM) capability located on-premises, mobile threat defense (MTD), mobile threat intelligence (MTI), application vetting, secure boot/image authentication, and virtual private network (VPN) services.”</p>
    
    
    
    <p>This NCCoE project is the first in a series on Mobile Device Security for Enterprises. The next one, <a href="http://www.nccoe.nist.gov/projects/building-blocks/mobile-device-security/bring-your-own-device" rel="nofollow external" class="bo">Mobile Device Security: Bring Your Own Device (BYOD)</a>, is under development.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/07/csee-faculty-ben-shariati-co-author-of-nist-guide-on-mobile-device-security-and-privacy/" rel="nofollow external" class="bo">CSEE faculty Ben Shariati co-author of NIST guide on mobile device security and privacy</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Dr. Ben Shariati co-author of NIST guide on mobile device security and privacy      Dr. Behnam Shariati, Assistant Director of the UMBC Graduate Cybersecurity Program, is one of the authors of a...</Summary>
<Website>https://www.csee.umbc.edu/2019/07/csee-faculty-ben-shariati-co-author-of-nist-guide-on-mobile-device-security-and-privacy/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86104/guest@my.umbc.edu/275cd1fd959f945430fbd68099200067/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 23 Jul 2019 15:41:46 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="86105" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86105">
<Title>UMBC partners with five universities in the US, UK, and Japan to launch International Cybersecurity Center of Excellence</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/07/INCS-CoE-signing-1920x768-1024x410.jpg" alt="Representatives from the partnering institutions at UMBC." style="max-width: 100%; height: auto;"><em>image: Representatives from the partnering institutions at UMBC. Photo by Marlayna Demond ’11 for UMBC.</em><h4>UMBC partners with five universities in the US, UK, and Japan to launch International Cybersecurity Center of Excellence</h4>
    
    
    
    <p>UMBC has partnered to create a global university network dedicated to securing critical systems against cyber threats: the International Cybersecurity Center of Excellence (INCS-CoE). </p>
    
    
    
    <p>The INCS-CoE has its foundations in a 2018 <a href="https://news.umbc.edu/umbc-launches-infrastructure-focused-cybersecurity-research-collaboration-with-japanese-and-uk-partners/" rel="nofollow external" class="bo">cybersecurity collaboration</a> that included UMBC, Keio University in Japan, and Royal Holloway University of London. That initial group has now formally expanded to include Northeastern University, Kyushu University in Japan, and Imperial College London. </p>
    
    
    
    <p>The INCS-CoE will support the efforts of the participating universities as they work together to address cybersecurity challenges facing society. The collaboration focuses on cybersecurity for critical national infrastructures including information technology, public transit, and financial services. Additionally, the Center of Excellence will include research, advocacy, and education components.</p>
    
    
    
    <p>“Trust is one of the key pillars for a free and interconnected world, for commerce and for exchange of information, be it in the real world or in the digital world,” says <strong>Karl V. Steiner</strong>, UMBC’s vice president for research. “In order for machines to communicate well with each other, we need to put in place policies and technologies that establish a trust basis.”</p>
    
    
    
    <p>He explains, “The INCS-CoE is built on a similar strong layer of trust among six institutions from three different continents. This first-of-its-kind global Center of Excellence will enable us to rapidly exchange ideas and find solutions to developing issues in an increasingly networked world.”</p>
    
    
    
    <p>In the future, INCS-CoE may expand to include government and corporate partners, says Steiner. </p>
    
    
    
    <p>“The challenges this first-of-its-kind partnership aims to solve span a complex set of cybersecurity issues,” said David Luzzi, senior vice provost for research at Northeastern.</p>
    
    
    
    <p>Each academic institution has specific strengths and areas of expertise that they bring to the partnership. UMBC’s Center for Cybersecurity and Center for Accelerated Real Time Analytics will be instrumental in contributing to INCS-CoE’s goals for UMBC.</p>
    
    
    
    <p><a href="https://research.umbc.edu/incs-coe/" rel="nofollow external" class="bo"><em><strong>Learn more about the INCS-CoE.</strong></em></a></p>
    
    
    
    <p><em>Adapted from a </em><a href="https://news.umbc.edu/umbc-partners-with-five-universities-in-the-us-uk-and-japan-to-launch-international-cybersecurity-center-of-excellence/" rel="nofollow external" class="bo"><em>UMBC News article</em></a><em> by </em><a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo"><em>Megan Hanks</em></a><em>, photo by Marlayna Demond ’11 for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/07/umbc-partners-with-five-universities-in-the-us-uk-and-japan-to-launch-international-cybersecurity-center-of-excellence/" rel="nofollow external" class="bo">UMBC partners with five universities in the US, UK, and Japan to launch International Cybersecurity Center of Excellence</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>image: Representatives from the partnering institutions at UMBC. Photo by Marlayna Demond ’11 for UMBC. UMBC partners with five universities in the US, UK, and Japan to launch International...</Summary>
<Website>https://www.csee.umbc.edu/2019/07/umbc-partners-with-five-universities-in-the-us-uk-and-japan-to-launch-international-cybersecurity-center-of-excellence/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86105/guest@my.umbc.edu/b33e12eacc045094d92a055df1614b80/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Jul 2019 13:22:14 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="83868" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/83868">
<Title>talk: Using CPSA to Analyze Force-Latency Protocols, 12-1 4/19</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/mitm_attack-1024x461.png" alt="" style="max-width: 100%; height: auto;"><h4><a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a></h4>
    <h2> Using CPSA to Analyze Force-Latency Protocols</h2>
    <h3>Dr. Edward Zieglar, National Security Agency</h3>
    <h3>12-1 Friday, 19 April 19, ITE 227</h3>
    
    
    
    <p>Several cryptographic protocols have been proposed to address the <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" rel="nofollow external" class="bo">Man-in-the-Middle attack</a> without the prior exchange of keys. This talk will describe a formal analysis of one such protocol proposed by Zooko Wilcox-O’Hearn, the forced-latency defense against the chess grandmaster attack. Using the Cryptographic Protocol Shapes Analyzer (CPSA), we validate the security properties of the protocol through the novel use of CPSA’s state features to represent time. We also describe a small message space attack that highlights how assumptions made in protocol design can affect the security of a protocol in use, even for a protocol with proven security properties.</p>
    
    
    
    <p>Edward Zieglar is a security researcher in the Research Directorate of the National Security Agency, where he concentrates on formal analysis and verification of cryptographic protocols and network security. He is also an adjunct professor at UMBC where he teaches courses in networking and network security. He received his master’s and doctoral degrees in computer science from UMBC.</p>
    
    
    
    <p>Host: Alan T.  Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-using-cpsa-to-analyze-force-latency-protocols-12-1-4-19/" rel="nofollow external" class="bo">talk: Using CPSA to Analyze Force-Latency Protocols, 12-1 4/19</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab    Using CPSA to Analyze Force-Latency Protocols   Dr. Edward Zieglar, National Security Agency   12-1 Friday, 19 April 19, ITE 227      Several cryptographic protocols have...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-using-cpsa-to-analyze-force-latency-protocols-12-1-4-19/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83868/guest@my.umbc.edu/f354661fc2364d2b95d67f287e25fe8c/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 18 Apr 2019 12:34:38 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78824" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78824">
<Title>Learn cybersecurity skills in NSA&#8217;s Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p> </p>
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge</h1>
    <p> </p>
    <p>NSA’s sixth annual <a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">Codebreaker Challenge</a> is a hands-on, cybersecurity engineering challenge in which students work to complete mission-focused objectives and push their university to the top of the competition leaderboard.</p>
    <p>The 2018 scenario involves ransomware and blockchain. A new strain of ransomware has managed to penetrate several critical government networks and NSA has been called upon to assist in remediating the infection to prevent massive data losses. For each infected machine, an encrypted copy of the key needed to decrypt the ransomed files has been stored in a smart contract on the <a href="http://www.ethdocs.org/en/latest/" rel="nofollow external" class="bo">Ethereum blockchain</a> and is set to only be unlocked upon receipt of the ransom payment. Your mission is to ultimately (1) find a way to unlock the ransomware without giving in to the attacker’s demands and (2) figure out a way to recover all of the funds already paid by other victims. Are YOU up to the challenge?</p>
    <p>UMBC students did well, both individually and as a group, in previous challenges.  Let’s make it to the top of the leaderboard this year.</p>
    <ul><li>The challenge is hosted at <a href="https://codebreaker.Ltsnet.net" rel="nofollow external" class="bo">https://codebreaker.Ltsnet.net</a></li>
    <li>The challenge end on December 31st</li>
    <li>Students register for the challenge at<a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">2017 Codebreaker Challenge</a> using their umbc.edu email addresses</li>
    <li>The challenge website has <a href="https://codebreaker.ltsnet.net/resources" rel="nofollow external" class="bo">nine lectures</a> on reverse engineering, so students with little coding or cybersecurity experience can participate</li>
    </ul><p>Feedback from previous iterations of the challenge showed that students were able to learn a great deal from participating. Each student receives a slightly different set of challenge binaries and associated files, so that one student’s solution won’t work for someone else. The binaries are similar enough so that students can work together to understand the problems and develop approaches to solutions and hen implement them independently and register their results.</p>
    <p>The 2018 challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. In previous years, tasks had to be solved in order to unlock the next task and rankings were based upon the quantity of solvers that progressed the furthest from each school. This way of ranking heavily weighted progression above participation and did not allow for skipping ahead if a particular task became a stumbling block. So to address these issues, all tasks will be available immediately upon registration and can be solved in any order. The point value associated with each task is based on relative difficulty and schools will be ranked according to total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is no longer a requirement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/" rel="nofollow external" class="bo">Learn cybersecurity skills in NSA’s Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>           Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge       NSA’s sixth annual Codebreaker Challenge is a hands-on, cybersecurity engineering challenge in...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78824/guest@my.umbc.edu/b5c63a73e1d311c9178ad83678684ddf/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 23 Sep 2018 09:45:05 -0400</PostedAt>
</NewsItem>

</News>
