<?xml version="1.0"?>
<News hasArchived="true" page="3" pageCount="17" pageSize="10" timestamp="Sat, 18 Apr 2026 17:17:31 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=3">
<NewsItem contentIssues="true" id="146467" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146467">
<Title>CodeBot'25 Workshop: Can We Trust AI-Generated Code?</Title>
<Tagline>Workshop Feb. 25-26, 2025 in Columbia, MD and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div><h3><strong>Can We Trust AI-Generated Code?</strong></h3></div><h5><strong>Workshop sponsored by UMBC &amp; Army Research Laboratory</strong></h5><h5><span>Feb. 25-26, 2025 </span><span>UMBC Training Centers, Columbia, MD &amp; online<br><br><p>
    position paper deadline extended to 1/20/2025</p></span></h5>The era of generative AI is upon us, and chatbots such as chatGPT are being used by programmers at all levels of experience to produce code.  Some generative AI systems, such as <a href="https://cloud.google.com/gemini/docs/codeassist/overview" rel="nofollow external" class="bo"><strong>Gemini Code Assist</strong></a>, specialize in code generation.  Unfortunately, AI-generated code often contains errors in the form of functionality that fails to meet specifications or vulnerabilities that can be exploited by hackers.  People have been working on program verification and secure coding for sixty years, but even so, the skill needed to find such errors is possessed by only a fraction of software engineers, and these skills are not being passed on to student programmers as they should be.<br><br>The goal of this FREE workshop is to gather and produce actionable ideas and suggestions that may be of use to the IT profession.  The workshop will consist of invited speakers, panels, and open discussion. </div><div><br></div><div><strong>We invite would-be participants to submit short position papers offering comments, observations, experiences, and suggestions that pertain to any or all of the following workshop themes:</strong><br><ol><li>What is or could be done to make AI-generated code more trustworthy, from the perspective of functionality and/or cybersecurity?</li><li>How can we do better at instilling the ideas and tools of secure development into the software profession?</li><li>Being able to produce quality code, with or without the aid of AI, seems to be related to system skills in general. How can we do better at giving students these skills before (or as) they enter the workplace?</li></ol>Position papers should limited to three pages and submitted according to this <a href="https://docs.google.com/document/d/11nr-Zy2MPObMYihN2x_v2jS7EcUkOLXm/edit?usp=sharing&amp;ouid=117342243438066964240&amp;rtpof=true&amp;sd=true" rel="nofollow external" class="bo"><strong>template</strong></a>.  Submit your position paper via email to <a href="mailto:codebot25@umbc.edu" rel="nofollow external" class="bo"><strong>codebot25@umbc.edu</strong></a> after <strong><a href="https://forms.gle/CipmPbbBVBLfHc728" rel="nofollow external" class="bo">registering</a> </strong>for the workshop.</div><div><br></div><div>The organizing committee will select several papers for live presentation at the workshop. Selection will be based on relevance to the workshop themes, technical merit, and perceived interest to the audience.  Position papers that are mere marketing pieces will not be considered, but descriptions of hardware and software solutions tying into the themes described above are welcome. Limited travel support may be available for non-local speakers. Position papers and summaries of the discussions that follow will make up the core of the workshop report.<br><br>UMBC students, both graduate or undergraduate, are welcome to submit position papers that describe their own personal experience and observations with AI-generated code in their own words.  Students may include their resumes with position papers if they wish to have their work/resume circulated to other attendees.  Domestic and international students are welcome to participate in this workshop.<br><br><strong>Important Dates:</strong><br></div><div>  <strong>Position paper submission deadline: January 20, 2025</strong></div><div>  Notice of acceptance: January 31, 2025<br>  Registration deadline: February 18, 2025<br>    (no registration fee, but space is limited)<br>  Workshop dates: February 25-26, 2025<br><br>The workshop will take place at <strong><a href="https://www.umbctraining.com/" rel="nofollow external" class="bo">UMBC Training Centers</a></strong>, 6996 Columbia Gateway Dr #100, Columbia, MD 21046</div><div><br></div><div><strong>REGISTER </strong>@ <a href="https://forms.gle/CipmPbbBVBLfHc728" rel="nofollow external" class="bo"><strong>https://forms.gle/CipmPbbBVBLfHc728</strong></a><br><br><strong>In-person space is limited, so register early! Based on RSVPs received, the organizing committee reserves the right to be selective in whom it selects to join the in-person meeting.</strong></div><div><br>Instructions for virtual participation will be made available prior to the workshop.<br><br><strong>Organizing Committee:</strong><br>  Prajna Bhandary, UMBC<br>  Mike De Lucia, Army Research Laboratory<br>  Richard Forno, UMBC<br>  Lindsay Gaughan, UMBC Training Centers<br>  Cynthia Matuszek, UMBC<br>  Charles Nicholas, UMBC<br>  Steve Simske, Colorado State University<br>  Larry Wagoner, Dept. of Defense<br>  Linda Kidder Yarlott, UMBC<br>  Paul Yu, Army Research Laboratory<br><br></div><div>Questions? Send email to <a href="mailto:codebot25@umbc.edu" rel="nofollow external" class="bo"><strong>codebot25@umbc.edu</strong></a></div>
    <br></div>
]]>
</Body>
<Summary>Can We Trust AI-Generated Code?   Workshop sponsored by UMBC &amp; Army Research Laboratory  Feb. 25-26, 2025 UMBC Training Centers, Columbia, MD &amp; online    position paper deadline extended...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146467/guest@my.umbc.edu/3963cf670aae6c0ef88607f359dd9477/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>assistant</Tag>
<Tag>codebot</Tag>
<Tag>coding</Tag>
<Tag>genai</Tag>
<Tag>llm</Tag>
<Tag>workshop</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xxlarge.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xlarge.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/large.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/medium.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/small.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xsmall.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xxsmall.jpg?1736288331</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 07 Jan 2025 17:22:27 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="146399" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146399">
<Title>6th International Country-to-Country Capture the Flag Competition</Title>
<Tagline>Students register by February 1, 2025</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>The </span><a href="https://incs-coe.org/" rel="nofollow external" class="bo"><span><strong>International Cyber Security Center of Excellence</strong></span></a><span> and Northeastern University invite students to participate in the </span><span><a href="https://www.c2c-ctf-2025.org/" rel="nofollow external" class="bo">6th </a><strong><a href="https://www.c2c-ctf-2025.org/" rel="nofollow external" class="bo">International Country-to-Country (C2C) Capture the Flag (CTF) competition</a></strong></span><span><strong>,</strong> C2C-CTF. This exciting competition allows students to work together as international teams to solve interesting <strong><a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo">CTF</a></strong> challenges while learning new skills, socializing, and promoting international collaboration and friendship. </span></p><p><span><a href="https://www.c2c-ctf-2025.org/" rel="nofollow external" class="bo"><strong>C2C-CTF 2025</strong></a> is organized and hosted by Northeastern University and will take place in person on its campus in Boston, Massachusetts. The organizing committee invites students at all levels from universities in the UK, USA, Japan, Israel, EU, and Australia to apply to participate.</span></p><p><span>Students can <a href="https://www.c2c-ctf-2025.org/registration" rel="nofollow external" class="bo">register online</a> and participate individually in an online qualifying event from February 7 to 9, 2025. Students who qualify for the final competition will be organized into teams of five members from different universities to encourage international academic collaboration. These teams will compete in person at the final event in Boston from July 7 to 9, 2025. </span></p><p><span>The organizers will hold webinars as part of the competition and educational process, during which students will learn about and discuss cybersecurity issues. </span></p><p><span>A goal is to create diverse teams for the competition by selecting competitors from a broad range of backgrounds, nationalities, languages, genders, experiences, and cybersecurity skills. We seek motivated and resourceful participants who enjoy a tough, intellectual challenge in a cooperative international context -- we are not merely looking for experts who have won other hacking competitions, although those students are also welcome and strongly encouraged to participate. </span></p><p><strong><span>Interested students should apply </span><a href="https://www.c2c-ctf-2025.org/registration" rel="nofollow external" class="bo"><span>here</span></a><span> by February 1, 2025.</span></strong></p><ul><li><span>Register by February 1, 2025</span></li><li>Qualifier event online: February 7-9, 2025 </li><li>Final CTF competition: July 6-10, 2025 </li></ul><p><strong><span>Send questions about C2C-CTF to </span><a href="mailto:c2cctf@northeastern.edu" rel="nofollow external" class="bo"><span>c2cctf@northeastern.edu</span></a><span>.</span></strong></p><div></div></span>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>The International Cyber Security Center of Excellence and Northeastern University invite students to participate in the 6th International Country-to-Country (C2C) Capture the Flag (CTF)...</Summary>
<Website>https://www.c2c-ctf-2025.org/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146399/guest@my.umbc.edu/712ba63526fea829fb9c0f0f8efe3271/api/pixel</TrackingUrl>
<Tag>capture-the-flag</Tag>
<Tag>ctf</Tag>
<Tag>cybersecurity</Tag>
<Tag>event</Tag>
<Tag>incs-coe</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/xxlarge.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/xlarge.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/large.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/medium.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/small.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/xsmall.jpg?1734879110</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/399/0c41450906b18985e43fa7f5cd625e82/xxsmall.jpg?1734879110</ThumbnailUrl>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 22 Dec 2024 10:58:07 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="146256" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146256">
<Title>Salt Typhoon and its attacks on US telecommunications networks</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>UMBC’s <a href="https://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo"><strong>Dr. Richard Forno</strong></a> describes <strong><a href="https://en.wikipedia.org/wiki/Salt_Typhoon" rel="nofollow external" class="bo">Salt Typhoon</a></strong>, the Chinese threat actor group, and its recent attack on US telecommunications networks in an <a href="https://umbc.edu/stories/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks/" rel="nofollow external" class="bo"><strong>article</strong></a> in the latest issue of UMBC Magazine. Sen. Mark Warner, chair of the Senate Intelligence Committee, has called it the “worst telecom hack in our nation’s history” and noted that it makes prior cyberattacks by Russian operatives look like “child’s play” by comparison.</span></p><p><span>This attack comes on the heels of reports that the FBI and Cybersecurity and Infrastructure Security Agency were assisting telephone companies with countering other China-connected compromises of their networks. The earlier hacking was part of an attack targeting people in the Washington area in government or political roles, including candidates for the 2024 presidential election.</span></p><p><span>But Salt Typhoon is not just targeting Americans. Research from security vendor Trend Micro shows that attacks by Salt Typhoon compromised other critical infrastructure worldwide in recent years.</span></p><p><span>Read more about Salt Typhoon in Dr. Forno's </span><a href="https://umbc.edu/stories/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks/" rel="nofollow external" class="bo"><span><strong>UMBC magazine article</strong></span></a><span>.</span></p></span></div>
]]>
</Body>
<Summary>UMBC’s Dr. Richard Forno describes Salt Typhoon, the Chinese threat actor group, and its recent attack on US telecommunications networks in an article in the latest issue of UMBC Magazine. Sen....</Summary>
<Website>https://umbc.edu/stories/what-is-salt-typhoon-a-security-expert-explains-the-chinese-hackers-and-their-attack-on-us-telecommunications-networks/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146256/guest@my.umbc.edu/e96480f3936db5438c3d469e87412bcc/api/pixel</TrackingUrl>
<Tag>cyberattack</Tag>
<Tag>salt-typhoon</Tag>
<Tag>telecommunication</Tag>
<Tag>threat-actor</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/xxlarge.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/xlarge.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/large.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/medium.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/small.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/xsmall.jpg?1734044656</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/256/a19f0207a709fea452bc348235271f45/xxsmall.jpg?1734044656</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 12 Dec 2024 18:54:07 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="146246" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146246">
<Title>CodeBot '25: Can We Trust AI-Generated Code? 2/25-26</Title>
<Tagline>Workshop Feb. 25-26, 2025 in Columbia, MD and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div><strong><br></strong><h3><strong>Can We Trust AI-Generated Code?</strong></h3></div><h5><strong>Workshop sponsored by UMBC &amp; Army Research Laboratory</strong></h5><h5><span>Feb. 25-26, 2025 </span><span>UMBC Training Centers, Columbia, MD &amp; online</span></h5><br>The era of generative AI is upon us, and chatbots such as chatGPT are being used by programmers at all levels of experience to produce code.  Some generative AI systems, such as <a href="https://cloud.google.com/gemini/docs/codeassist/overview" rel="nofollow external" class="bo"><strong>Gemini Code Assist</strong></a>, specialize in code generation.  Unfortunately, AI-generated code often contains errors in the form of functionality that fails to meet specifications or vulnerabilities that can be exploited by hackers.  People have been working on program verification and secure coding for sixty years, but even so, the skill needed to find such errors is possessed by only a fraction of software engineers, and these skills are not being passed on to student programmers as they should be.<br><br>The goal of this FREE workshop is to gather and produce actionable ideas and suggestions that may be of use to the IT profession.  The workshop will consist of invited speakers, panels, and open discussion. </div><div><br></div><div><strong>We invite would-be participants to submit short position papers offering comments, observations, experiences, and suggestions that pertain to any or all of the following workshop themes:</strong><br><ol><li>What is or could be done to make AI-generated code more trustworthy, from the perspective of functionality and/or cybersecurity?</li><li>How can we do better at instilling the ideas and tools of secure development into the software profession?</li><li>Being able to produce quality code, with or without the aid of AI, seems to be related to system skills in general. How can we do better at giving students these skills before (or as) they enter the workplace?</li></ol>Position papers should limited to three pages and submitted according to this <a href="https://docs.google.com/document/d/11nr-Zy2MPObMYihN2x_v2jS7EcUkOLXm/edit?usp=sharing&amp;ouid=117342243438066964240&amp;rtpof=true&amp;sd=true" rel="nofollow external" class="bo"><strong>template</strong></a>.  The organizing committee will select several papers for live presentation at the workshop. Selection will be based on relevance to the workshop themes, technical merit, and perceived interest to the audience.  Position papers that are mere marketing pieces will not be considered, but descriptions of hardware and software solutions tying into the themes described above are welcome. Limited travel support may be available for non-local speakers. Position papers and summaries of the discussions that follow will make up the core of the workshop report.<br><br>UMBC students, both graduate or undergraduate, are welcome to submit position papers that describe their own personal experience and observations with AI-generated code in their own words.  Students may include their resumes with position papers if they wish to have their work/resume circulated to other attendees.  Domestic and international students are welcome to participate in this workshop.<br><br><strong>Important Dates:</strong><br>  Position paper submission deadline: <strong>January 7, 2025</strong><br>  Notice of acceptance: January 31, 2025<br>  Registration deadline: February 18, 2025<br>    (no registration fee, but space is limited)<br>  Workshop dates: February 25-26, 2025<br><br>The workshop will take place at <strong><a href="https://www.umbctraining.com/" rel="nofollow external" class="bo">UMBC Training Centers</a></strong>, 6996 Columbia Gateway Dr #100, Columbia, MD 21046</div><div><br></div><div><strong>REGISTER </strong>@ <a href="https://forms.gle/CipmPbbBVBLfHc728" rel="nofollow external" class="bo"><strong>https://forms.gle/CipmPbbBVBLfHc728</strong></a><br><br><strong>In-person space is limited, so register early! Based on RSVPs received, the organizing committee reserves the right to be selective in whom it selects to join the in-person meeting.</strong></div><div><br>Instructions for virtual participation will be made available prior to the workshop.<br><br><strong>Organizing Committee:</strong><br>  Prajna Bhandary, UMBC<br>  Mike De Lucia, Army Research Laboratory<br>  Richard Forno, UMBC<br>  Lindsay Gaughan, UMBC Training Centers<br>  Cynthia Matuszek, UMBC<br>  Charles Nicholas, UMBC<br>  Steve Simske, Colorado State University<br>  Larry Wagoner, Dept. of Defense<br>  Linda Kidder Yarlott, UMBC<br>  Paul Yu, Army Research Laboratory<br><br></div><div>Questions? Send email to <a href="mailto:codebot25@umbc.edu" rel="nofollow external" class="bo"><strong>codebot25@umbc.edu</strong></a></div>
    <hr><a href="https://https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Can We Trust AI-Generated Code?   Workshop sponsored by UMBC &amp; Army Research Laboratory  Feb. 25-26, 2025 UMBC Training Centers, Columbia, MD &amp; online  The era of generative AI is upon us,...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146246/guest@my.umbc.edu/d5167d07b6a032b83194a6f4a657be2e/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>code</Tag>
<Tag>programming</Tag>
<Tag>trust</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC and Army Research Laboratory</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 12 Dec 2024 13:16:07 -0500</PostedAt>
<EditAt>Thu, 12 Dec 2024 13:18:11 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="146242" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146242">
<Title>AI Lunchbox: Security Risk in AI/ML, 12/12</Title>
<Tagline>12:00-1:00 pm EST, Thursday, December 12, 2024</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In the AI Lunchbox session </span><span><strong>Security Risk in AI/ML</strong></span><span>, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach participants how to incorporate AI security risk into their organizational strategy and AI development workflows. </span><a href="https://www.linkedin.com/in/randyabernethy/" rel="nofollow external" class="bo"><span>Randy Abernethy</span></a><span> from </span><a href="https://rx-m.com/" rel="nofollow external" class="bo"><span>RX-M, LLC</span></a><span> will be a speaker. </span><span>The session will be held online from 12 to 1 p.m. EST on December 12, 2024. Register <a href="https://c4ai.umbctraining.com/event/security-risk-in-ai-ml/" rel="nofollow external" class="bo"><strong>here</strong></a> to receive a link to the</span><span> event from the UMBC Training Centers </span><a href="https://c4ai.umbctraining.com/" rel="nofollow external" class="bo"><span>Center for Applied AI</span></a><span>.</span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>In the AI Lunchbox session Security Risk in AI/ML, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146242/guest@my.umbc.edu/4dedc88a7fdb994c7c9d405ab1ebd828/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>risk</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xxlarge.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xlarge.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/large.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/medium.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/small.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xsmall.jpg?1734019439</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xxsmall.jpg?1734019439</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 12 Dec 2024 11:05:19 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="145965" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/145965">
<Title>Talk: Privacy-Preserving Data Sharing in Intrusion Detection Systems, 12/6 online</Title>
<Tagline>12&#8211;1pm EST Friday, December 6, 2024, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h5><span><strong>UMBC Cyber Defense Lab presents</strong></span><span> </span></h5><h4><span>Privacy-Preserving Data Sharing in Intrusion Detection Systems</span></h4><h5><span><strong>Zhiyuan Chen<br></strong></span><span><strong>Professor and Chair, UMBC Information Systems Department</strong></span></h5><h5><strong><span>12:00–1pm, Friday, December 6, 2024, </span><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><span>online</span></a></strong></h5><div><br></div><p><span>Intrusion detection systems increasingly use machine learning methods, which require large volumes of data to be effective. Sharing such data sets will benefit the research community and industry. One obstacle to sharing such data is data privacy because network trace data or server log data often contains sensitive information, such as IP addresses. Even if IP addresses are encrypted, adversaries may still inject packets with unique patterns (e.g., with a certain packet sizes) such that they can use these packets to infer encrypted information. Another challenge arises when multiple intrusion detection systems from multiple organizations need to correlate their detected alerts to identify a larger threat, but the information they exchange may contain sensitive information such as network topology and traffic. This talk covers two approaches to address this problem. First, we propose a data anonymization approach that de-identifies network trace data. Compared to existing approaches, this approach provides stronger privacy protection and is robust to injection attacks. Second, we propose two privacy-preserving distributed alert correlation methods, one using additive secret sharing and the other using differential privacy. We also investigate tradeoffs between these two methods.</span></p><p><a href="https://userpages.umbc.edu/~zhchen/" rel="nofollow external" class="bo"><span><strong>Dr. Zhiyuan Chen</strong></span></a><span> is a Professor in the Department of Information Systems at UMBC. He received a BS and a MS from Fudan University, China, and a PhD in Computer Science from Cornell University. His research covers the areas of data science, big data, privacy preserving data mining and data management, data exploration and navigation, and semantic-based search and data integration using semantic networks, adversarial learning and its applications in cybersecurity. He has published extensively in these areas and has received funding from NSF, Department of Energy, IBM, Office of Naval Research, MITRE, and Department of Education.</span></p><p><span>Host: <a href="https://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a>. Support for this event was provided in part by NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Privacy-Preserving Data Sharing in Intrusion Detection Systems  Zhiyuan Chen Professor and Chair, UMBC Information Systems Department  12:00–1pm, Friday, December...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/145965/guest@my.umbc.edu/e0574ed2de8fc798b31101e61e796b54/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>privacy</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xxlarge.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xlarge.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/large.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/medium.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/small.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xsmall.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xxsmall.jpg?1732912896</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 29 Nov 2024 17:28:15 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="140429" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/140429">
<Title>CMSC-491/691 Cybersecurity Research (INSuRE), Fall 2024</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><span>In fall 2024, UMBC will offer the cybersecurity research course CMSC-491/691 Special Topics in Computer Science: Cybersecurity Research (INSuRE).  Professor Alan Sherman will teach it Tues/Thurs 10am-11:15am in ILSB 237, plus some remote sessions Friday 1:30-3:30pm as needed for the common sessions across all universities offering INSuRE. Working in a small group of at least two students, each student will carry out a research project, under the guidance of a project mentor from NSA or a national lab.</span></div><div><span><br></span></div><div><span>Each semester, approximately one dozen universities across the US participate in INSuRE. By INSuRE central policy, enrollment will be limited to at most 20 students per university. </span><span>UMBC offers INSuRE once every two years.  The next edition will be in fall 2026.</span></div><div><span><br></span></div><div><span>Each group carries out a standard or custom project. Mentors suggest standard projects, which embody a significant degree of flexibility to permit considerable customization. Any group that wishes to pursue a custom project must submit to me, and have approved, a written proposal by August 1, 2024, prior to the beginning of the course.  Each group must have at least two members, and at most five members (three is ideal).  Collaborative research is an essential aspect of INSuRE; any student wishing to carry out solo research (group size one) is invited to register for independent study.</span></div><div><span><br></span></div><div><span>Each student must be able to carry out an original research project in cybersecurity. That does not necessarily mean that extensive background in cybersecurity is necessary or sufficient. Each student needs to be motivated and be able to learn what is needed. Each student requires some expertise in some relevant area. There will be a wide variety of suggested standard projects. It is helpful to have a basic CS background (e.g., 411, 421, and 441) and some cybersecurity experience (e.g., 426).  But there are no absolute specific prerequisites, except willingness and ability to carry out original research in cybersecurity. It is not necessary that the student has taken all specified courses.</span></div><div><span><br></span></div><div><span>Even though NSA provides mentors, INSuRE is an unclassified course open to all students, including F1 students who are neither US citizens nor permanent residents.</span></div><div><span><br></span></div><div><span>There will be an opportunity for INSuRE groups to apply for possible research support for summer 2025, to continue work on their project.  In summer 2023, one of the UMBC groups (on protocol analysis including PhD student Enis Golaszewski) was one of the four or five projects in the nation funded by NSA under INSuRE+C.</span></div><div><span><br></span></div><div><span>Learn more about INSuRE:</span></div><div><span><a href="https://arxiv.org/pdf/1703.08859.pdf">https://arxiv.org/pdf/1703.08859.pdf</a>, </span></div><div><span><a href="https://caecommunity.org/initiative/insure">https://caecommunity.org/initiative/insure</a></span></div><div><span><br></span></div><div><span> </span></div></div>
]]>
</Body>
<Summary>In fall 2024, UMBC will offer the cybersecurity research course CMSC-491/691 Special Topics in Computer Science: Cybersecurity Research (INSuRE).  Professor Alan Sherman will teach it Tues/Thurs...</Summary>
<Website>https://caecommunity.org/initiative/insure</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/140429/guest@my.umbc.edu/2519fdcad2f4a0c922e19e9b7589018c/api/pixel</TrackingUrl>
<Tag>insure</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 01 Apr 2024 18:03:25 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="129847" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129847">
<Title>2022 NSA Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker.jpeg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker-1024x461.jpeg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>The 2022 NSA Codebreaker Challenge is Underway</strong></h1><p>The annual <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo"><strong>NSA Codebreaker Challenge</strong></a> consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will be ranked according to the total number of points accumulated by their students. Solutions may be submitted at any time for the duration of the Challenge, which will end early in January.</p><p>The initial tasks are divided into two sequences, A and B, which can be solved independently. Later tasks may rely on the results of earlier tasks. While not required, we recommend that you solve tasks in order since they flow with the storyline and may, in fact, be unsolvable without the information recovered from previous tasks.</p><p>Each task in this year’s challenge will require a range of skills. It starts with easy tasks but advances to harder ones, so it’s a great learning experience even if you are just learning about cybersecurity. To solve all of the tasks, you will need to call upon all of your technical expertise, your intuition, and your common sense. </p><p>Getting started is easy.  Go to the <a href="https://nsa-codebreaker.org/challenge" rel="nofollow external" class="bo"><strong>challenge webpage</strong></a>, and create an account using your UMBC email address.  After you’ve verified your email address, you will get an invitation to join the Discord server.  Joining will earn you (and UMBC) your first point!</p><div class="embed-container"><iframe src="https://www.youtube.com/embed/6sC6ozv5M7o" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/" rel="nofollow external" class="bo">2022 NSA Codebreaker Challenge</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2022 NSA Codebreaker Challenge is Underway  The annual NSA Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129847/guest@my.umbc.edu/e54989273e7bb3966650c7f5b3583f88/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Aug 2022 22:18:20 -0400</PostedAt>
<EditAt>Tue, 09 Aug 2022 22:18:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="126779" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/126779">
<Title>2022 NSA Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker.jpeg" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker-1024x461.jpeg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>The 2022 NSA Codebreaker Challenge is Underway</strong></h1><p>The annual <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo"><strong>NSA Codebreaker Challenge</strong></a> consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will be ranked according to the total number of points accumulated by their students. Solutions may be submitted at any time for the duration of the Challenge, which will end early in January.</p><p>The initial tasks are divided into two sequences, A and B, which can be solved independently. Later tasks may rely on the results of earlier tasks. While not required, we recommend that you solve tasks in order since they flow with the storyline and may, in fact, be unsolvable without the information recovered from previous tasks.</p><p>Each task in this year’s challenge will require a range of skills. It starts with easy tasks but advances to harder ones, so it’s a great learning experience even if you are just learning about cybersecurity. To solve all of the tasks, you will need to call upon all of your technical expertise, your intuition, and your common sense. </p><p>Getting started is easy.  Go to the <a href="https://nsa-codebreaker.org/challenge" rel="nofollow external" class="bo"><strong>challenge webpage</strong></a>, and create an account using your UMBC email address.  After you’ve verified your email address, you will get an invitation to join the Discord server.  Joining will earn you (and UMBC) your first point!</p><div class="embed-container"><iframe src="https://www.youtube.com/embed/6sC6ozv5M7o" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/" rel="nofollow external" class="bo">2022 NSA Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2022 NSA Codebreaker Challenge is Underway  The annual NSA Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will...</Summary>
<Website>https://www.csee.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126779/guest@my.umbc.edu/3a8cc1e8245b5d94c32bd9a51bb24d33/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Aug 2022 22:18:20 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="129848" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129848">
<Title>Profs. Sherman and Oliva receive NSF award to study cybersecurity education&#160;</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>Professors Sherman and Oliva receive NSF award to study cybersecurity education</strong></h1><p>UMBC Professors <strong><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a></strong> (PI, CSEE) and <strong><a href="https://education.umbc.edu/faculty-list/linda-oliva/" rel="nofollow external" class="bo">Linda Oliva</a></strong> (CO-PI,  Education)  recently received more than $260,000 of a $500,000 grant from the National Science Foundation (NSF) to study and improve how cybersecurity is taught at the U.S. Naval Academy and U.S. Military Academy. </p><p>The project, <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2138921" rel="nofollow external" class="bo">Examining Pedagogy in Cybersecurity</a> (EPIC), is collaborative with the University of Illinois Urbana-Champaign and the University of Minnesota Duluth and is funded through NSF’s Secure and Trustworthy Computing (SaTC) program. Because the academies teach cybersecurity to all first-year students, EPIC offers a large-scale opportunity to investigate how simulation-based teaching and learning affects different student populations.</p><p>In the first phase of the research, Sherman and his collaborators—including computer science Ph.D. student <strong>Andrew Slack</strong>—will study how instructors at the academies structure and teach their cybersecurity courses. In the second phase, they will introduce active simulation-based learning exercises and pedagogies and assess their effectiveness. </p><p>UMBC’s championship-winning Cyberdawgs cyberdefense team will help adapt and improve learning materials. As one quantitative measure of the new pedagogy’s effectiveness, EPIC will assess students’ conceptual understanding using the <a href="https://par.nsf.gov/servlets/purl/10290864" rel="nofollow external" class="bo">Cybersecurity Concept Inventory</a> (CCI) developed by Sherman and his team. </p><p>Some material adapted from this <a href="https://umbc.edu/stories/umbc-advances-maryland-through-innovative-computing-partnership/" rel="nofollow external" class="bo">UMBC News article</a></p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/" rel="nofollow external" class="bo">Profs. Sherman and Oliva receive NSF award to study cybersecurity education </a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professors Sherman and Oliva receive NSF award to study cybersecurity education  UMBC Professors Alan T. Sherman (PI, CSEE) and Linda Oliva (CO-PI,  Education)  recently received more than...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129848/guest@my.umbc.edu/f7400269abb245d7d2f4112e2bfc65d8/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 05 Aug 2022 11:13:23 -0400</PostedAt>
<EditAt>Fri, 05 Aug 2022 11:13:23 -0400</EditAt>
</NewsItem>

</News>
