<?xml version="1.0"?>
<News hasArchived="true" page="4" pageCount="7" pageSize="10" timestamp="Tue, 28 Apr 2026 02:46:07 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=4&amp;tag=talks">
<NewsItem contentIssues="true" id="91615" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91615">
<Title>Online Talks Double Feature:  Blockchain and Network Defense, 12-2 Fri 3/27, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    
    
    <h4>UMBC will hold a double feature with two online security-oriented talks from 12:00 pm to 2:00 pm EDT on Friday, March 27.  Both talks will be shared via Webex.</h4>
    
    
    
    <br><hr><br><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/Screen-Shot-2020-03-26-at-9.59.41-PM-1024x457.png" alt="" style="max-width: 100%; height: auto;"><br><h4>From 1:00-2:00 pm, Professor Dr. John Mitchell of Stanford University will give a Lockheed Martin Distinguished lecture on “<a href="https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/" rel="nofollow external" class="bo">Will Blockchain Change Everything</a>“.  Join the presentation online at 1:00 pm EDT at <strong><a href="https://umbc.webex.com/meet/joshi" rel="nofollow external" class="bo">https://umbc.webex.com/meet/joshi</a></strong>.</h4>
    
    
    
    <h4>Far from serving only as a foundation for cryptocurrency, blockchain technology provides a general framework for trusted distributed ledgers. Over the past few years, their popularity has grown tremendously, as shown by the number of companies and efforts associated with the Linux Foundation’s Hyperledger project, for example. From a technical standpoint, a blockchain combines a storage layer, networking protocols, a consensus layer, and a programmable transaction layer, leveraging cryptographic operations. The distributed state machine paradigm provides atomicity and transaction rollback, while consensus supports distributed availability as well as certain forms of fair access. From an applications perspective, blockchains appeal to distributed networks of independent agents, as arise in supply chain, credentialing, and decentralized financial services. The talk will look at the potential for radical change as well as specific technical challenges associated with verifiable consensus protocols and trustworthy smart contracts.</h4>
    
    
    
    <br><hr><br><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/Screen-Shot-2020-03-26-at-9.59.58-PM-1024x462.png" alt="" style="max-width: 100%; height: auto;"><br><h4>From 12:00-1:00  pm EDT Col. Dan Yaroslaski, a former operations officer at the Marine Forces Cyberspace Command will talk on “<a href="https://www.csee.umbc.edu/2020/03/webex-talk-hard-learned-lesson-in-defense-of-a-network-12-1-fri-3-27/" rel="nofollow external" class="bo">Hard-Learned Lesson in Defense of a Network</a>“.  You can join the presentation online at 12:00 pm at <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">https://umbc.webex.com/meet/sherman</a>.</h4>
    
    
    
    <h4>Often network defenders fail to take into account organizational culture when attempting to provide a secure, reliable, and usable enterprise network. Users and process leaders often fall victim to the false allure of the value of networked systems, without asking the question, “Should this be networked?” Collectively, organizations also forget that networks are a combination of the humans who use the network, the personas we all have to form to gain access to this manmade domain, and the interplay of logical and physical network architecture manifested in geographical locations. The value of some simple military principles—including defense-in-depth, mission focus, redundancy, and resiliency versus efficiency—can help a network defender better advise everyone from the “C Suite” decision-makers to the average network user, on how to have a secure network while accepting reasonable limitations.</h4>
    
    
    
    
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/online-talks-double-feature-blockchain-and-network-defense-12-2-fri-3-27-umbc/" rel="nofollow external" class="bo">Online Talks Double Feature:  Blockchain and Network Defense, 12-2 Fri 3/27, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC will hold a double feature with two online security-oriented talks from 12:00 pm to 2:00 pm EDT on Friday, March 27.  Both talks will be shared via Webex.          From 1:00-2:00 pm,...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/online-talks-double-feature-blockchain-and-network-defense-12-2-fri-3-27-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91615/guest@my.umbc.edu/02d72add2655694ae942c1b404c60363/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 26 Mar 2020 22:50:30 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="91356" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91356">
<Title>Webex talk: John Mitchell: Will Blockchain Change Everything? Fri 3/27 1-2pm</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/jm-1.png" alt="" style="max-width: 100%; height: auto;"><h4><strong>Lockheed Martin Distinguished Speaker Series</strong></h4>
    
    
    
    <h1><strong>Will Blockchain Change Everything?</strong></h1>
    
    
    
    <h3>Dr. John Mitchell<br> Mary and Gordon Crary Family Professor <br> Departments of Computer Science &amp; Electrical Engineering <br> Stanford University</h3>
    
    
    
    <h4><strong>1:00-2:00pm EST, Friday, 27 March 2020<br> Webex meeting hosted by Anupam Joshi<br><a href="https://umbc.webex.com/meet/joshi" rel="nofollow external" class="bo">https://umbc.webex.com/meet/joshi</a></strong></h4>
    
    
    
    <p>Far from serving only as a foundation for cryptocurrency, blockchain technology provides a general framework for trusted distributed ledgers. Over the past few years, their popularity has grown tremendously, as shown by the number of companies and efforts associated with the Linux Foundation’s Hyperledger project, for example. From a technical standpoint, a blockchain combines a storage layer, networking protocols, a consensus layer, and a programmable transaction layer, leveraging cryptographic operations. The distributed state machine paradigm provides atomicity and transaction rollback, while consensus supports distributed availability as well as certain forms of fair access. From an applications perspective, blockchains appeal to distributed networks of independent agents, as arise in supply chain, credentialing, and decentralized financial services. The talk will look at the potential for radical change as well as specific technical challenges associated with verifiable consensus protocols and trustworthy smart contracts.</p>
    
    
    
    <p><a href="https://theory.stanford.edu/~jcm/" rel="nofollow external" class="bo">John Mitchell</a> is the Mary and Gordon Crary Family Professor in the School of Engineering, Professor of Computer Science, co-director of the Stanford Computer Security Lab, and Professor (by courtesy) of Education. He was Vice Provost at Stanford University from 2012 to 2018. Mitchell’s research focusses on programming languages, computer, and network security, privacy, and education. He has published over 200 research papers, served as editor of eleven journals, including Editor-in-Chief of the Journal of Computer Security, and written two books. He has led research projects funded by numerous organizations and served as advisor and consultant to successful small and large companies. His first research project in online learning started in 2009 when he and six undergraduate students built Stanford CourseWare, an innovative platform that served as the foundation for initial flipped classroom experiments at Stanford and helped inspire the first massive open online courses (MOOCs) from Stanford. Professor Mitchell currently serves as Chair of the Stanford Department of Computer Science.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/" rel="nofollow external" class="bo">Webex talk: John Mitchell: Will Blockchain Change Everything? Fri 3/27 1-2pm</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Lockheed Martin Distinguished Speaker Series      Will Blockchain Change Everything?      Dr. John Mitchell  Mary and Gordon Crary Family Professor   Departments of Computer Science &amp;...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/webex-talk-john-mitchell-will-blockchain-change-everything-fri-3-27-1-2pm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91356/guest@my.umbc.edu/98a6a027f52a1e7e10d749e5648e138a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 15 Mar 2020 17:27:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="91355" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91355">
<Title>Webex Talk: Hard-Learned Lesson in Defense of a Network, 12-1 Fri 3/27</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/cyber_security-1024x427.jpg" alt="" style="max-width: 100%; height: auto;"><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4>
    
    
    
    <h2><strong>Hard-Learned Lesson in Defense of a Network</strong></h2>
    
    
    
    <h3><strong>Dan Yaroslaski<br>Former Operations Officer at Marine Forces Cyberspace Command, Colonel, USMC   </strong>       </h3>
    
    
    
    <br><h3>12–1:00pm, Friday, 27 March 2020<br>WebEx: <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">https://umbc.webex.com/meet/sherman</a>  </h3>
    
    
    
    <p>Often network defenders fail to take into account organizational culture when attempting to provide a secure, reliable, and usable enterprise network. Users and process leaders often fall victim to the false allure of the value of networked systems, without asking the question, “Should this be networked?” Collectively, organizations also forget that networks are a combination of the humans who use the network, the personas we all have to form to gain access to this manmade domain, and the interplay of logical and physical network architecture manifested in geographical locations. The value of some simple military principles—including defense-in-depth, mission focus, redundancy, and resiliency versus efficiency—can help a network defender better advise everyone from the “C Suite” decision-makers to the average network user, on how to have a secure network while accepting reasonable limitations.   </p>
    
    
    
    <p>Colonel Dan Yaroslaski is a career Marine with over 30 years of service to the nation. He started as an enlisted anti-armor missileman, who then became an Assault Amphibian Vehicle Officer (AAV’s are 27 Ton armored amphibious descendants of the WW II vehicles used from Tarawa to Iwo Jima). He has made a career of integrating technology and human beings to form cohesive combat organizations. Dan’s diverse career placed him at the forefront of high-end, top-secret compartmentalized planning and execution, to the extremely human act of advising an Afghan National Army Kandak (Battalion). During his five-year tenure at Marine Forces Cyberspace Command, he successfully architected new techniques that took advantage of boundary defenses, to new and innovative ways to integrate traditional warfare methods with cyberspace operations, as highlighted in a recent NPR story about USCYBERCOM’s Operation GLOWING SYMPHONY. Dan also spent time creating effective policy directing network operations and defense, to include an extremely frustrating year negotiating the interplay of network operations, operations in the information environment, and Marine Corps culture.  Dan and his wife are now empty nesters, so they spend an enormous amount of time nurturing two dogs to fill the void left by their children. As the Rolling Stones point out, “What a drag it is getting old.” </p>
    
    
    
    <p>Host: Alan T. Sherman, *protected email*</p>
    
    
    
    <p>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p>
    
    
    
    <ul><li>Apr 10, Russ Fink (APL), ransomware</li>
    <li>Apr 24, Lance Hoffman (GWU), policy</li>
    <li>May 8, Jason Wells (UMBC SFS scholar), law enforcement</li>
    <li>May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE 456</li></ul>
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/webex-talk-hard-learned-lesson-in-defense-of-a-network-12-1-fri-3-27/" rel="nofollow external" class="bo">Webex Talk: Hard-Learned Lesson in Defense of a Network, 12-1 Fri 3/27</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Hard-Learned Lesson in Defense of a Network      Dan Yaroslaski Former Operations Officer at Marine Forces Cyberspace Command, Colonel, USMC...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/webex-talk-hard-learned-lesson-in-defense-of-a-network-12-1-fri-3-27/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91355/guest@my.umbc.edu/74d59cee6e5929961f6c25d66d715cd0/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 15 Mar 2020 14:42:11 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="91103" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/91103">
<Title>talk: Autonomous Agents, Deep Learning, and Graphs for Cyber Defense, 12-1 Fri. 3/13</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/03/hasan_cam-1024x512.png" alt="" style="max-width: 100%; height: auto;"><p><strong>The UMBC Cyber Defense Lab presents</strong> <br></p>
    
    
    
    <h2><strong>Autonomous Agents, Deep Learning,</strong><br><strong> and Graphs for Cyber Defense</strong><br></h2>
    
    
    
    <h3><strong>Dr. Hasan Cam</strong><br><strong>Army Research Laboratory</strong><br></h3>
    
    
    
    <h3><strong>12–1 pm Friday, 13 March 2020, ITE 227, UMBC</strong>                                                                                                                     </h3>
    
    
    
    <p> <br>Cyber resilience usually refers to the ability of an entity to detect, respond to, and recover from cybersecurity attacks to the extent that the entity can continuously deliver the intended outcome despite their presence. Cybersecurity tools such as intrusion detection and prevention systems usually generate far too many alerts, indicators or log data, many of which do not have obvious security implications unless their correlations and temporal causality relationships are determined. In this talk, I will present methods to first estimate the infected and exploited assets and then take recovery and preventive actions using autonomous agents, deep learning, and graphs. Autonomous adversary and defender agents are designed such that the adversary agent can infer the adversary activities and intentions, based on cybersecurity observations and measurements, while the defender agent aims at estimating the best reactive and pro-active actions to protect assets and mitigate the adversary activities. The graph thinking and causality analysis of cyber infection and exploitation helps predict the infection states of some assets. This prediction data of infections is taken as input data by deep reinforcement learning to train agents for determining effective actions. This talk will discuss some preliminary results from the development of building an automated system of autonomous agents to provide cyber resiliency over networks.</p>
    
    
    
    <p>Hasan Cam is a Computer Scientist at US Army Research Laboratory. He currently works on the projects involved with autonomous agents, active malware defense, cyber resiliency, and risk assessment over wired, mobile, and tactical networks. His research interests include cybersecurity, machine learning, data analytics, networks, algorithms, and parallel processing. He served as the government lead for the Risk area in Cyber Collaborative Research Alliance. He has previously worked as a faculty member in academia and a senior research scientist in the industry. He has served as an editorial member of two journals, a guest editor of two special issues of journals, an organizer of symposiums and workshops, and a Technical Program Committee Member in numerous conferences. He received a Ph.D. degree in electrical and computer engineering from Purdue University, and an M.S. degree in computer science from Polytechnic University, New York. He is a Senior Member of IEEE.</p>
    
    
    
    <p>Host: Alan T. Sherman, *protected email*</p>
    
    
    
    <p>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.  The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p>
    
    
    
    <ul><li>Mar 27, Dan Yaroslaski, cybercommand</li><li> Apr 10, Russ Fink (APL), ransomware</li><li> Apr 24, Lance Hoffman (GWU), policy</li><li> May 8, Jason Wells, law enforcement</li><li> May 22, Spring SFS Meeting at UMBC, 9:30-2, ITE 456</li></ul>
    <p>The post <a href="https://www.csee.umbc.edu/2020/03/talk-autonomous-agents-deep-learning-and-graphs-for-cyber-defense-12-1-fri-3-13/" rel="nofollow external" class="bo">talk: Autonomous Agents, Deep Learning, and Graphs for Cyber Defense, 12-1 Fri. 3/13</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents        Autonomous Agents, Deep Learning,  and Graphs for Cyber Defense       Dr. Hasan Cam Army Research Laboratory       12–1 pm Friday, 13 March 2020, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2020/03/talk-autonomous-agents-deep-learning-and-graphs-for-cyber-defense-12-1-fri-3-13/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/91103/guest@my.umbc.edu/4cdbd1c2dfd69476b76f6d340e202dc6/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 08 Mar 2020 13:06:35 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="90623" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/90623">
<Title>talk: Hardware Security Kernel for Managing Memory and Instruction Execution, 12pm Fri 2/28</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2020/02/00111_PSISDG11013_110130J_page_6_1-1024x536.png" alt="" style="max-width: 100%; height: auto;"><p>T<em>he UMBC Cyber Defense Lab presents</em></p>
    
    
    
    <h2><strong>Hardware Security Kernel for Managing Memory and Instruction Execution</strong></h2>
    
    
    
    <h2><strong> Patrick Jungwirth, PhD</strong></h2>
    
    
    
    <h4>Computational and Information Sciences Directorate<br>Army Research Lab, Aberdeen Proving Ground, USA</h4>
    
    
    
    <h4>12–1 pm Friday, 28 February 2020, ITE 227, UMBC</h4>
    
    
    
    <p>The cybersecurity world faces multiple attack vectors from hardware-level exploits, including cache bank malicious operations, rowhammer, Spectre, Meltdown, and Foreshadow attacks, and software-based attacks including buffer-overflows, et al.  Hardware-level exploits bypass protections provided by software-based separation kernels.  Current microprocessor execution pipelines are not designed to understand security:  they treat malicious instructions, software bugs, and harmless code the same. This presentation explores adding a hardware-level security monitor below the execution pipeline [1,2,3].</p>
    
    
    
    <p>[1] P. Jungwirth, et al.:  “Hardware security kernel for cyber-defense,” <em>Proc. SPIE 11013, Disruptive Technologies in Information Sciences II,</em> 110130J, Baltimore 10 May 2019); <a rel="nofollow external" class="bo">https://doi.org/10.1117/12.2513224</a><br>[2] P. Jungwirth, and J. Ross:  “Security Tag Fields and Control Flow Management,” <em>IEEE SouthEastCon 2019</em>, Huntsville, AL, April 2019.<br>[3] P. Jungwirth and D. Hahs:  “Transfer Entropy Quantifies Information Leakage,” <em>IEEE SouthEastCon 2019</em>, Huntsville, AL, April 2019.</p>
    
    
    
    <p><strong>About the Speaker</strong>. <em>Dr. Jungwirth</em> is a computer architecture researcher at the Army Research Lab.  Previously he worked for the Aviation and Missile, RDEC in Huntsville, AL.  Currently, he is researching hardware state machines to provide simple operating system support (monitor) and control flow integrity in hardware.  Dr. Jungwirth is co-inventor of the OS Friendly Microprocessor Architecture, US Patent 9122610.  The OS Friendly Microprocessor Architecture includes hardware security features for an operating system and supports near single-cycle context switches in hardware. Email: *protected email*</p>
    
    
    
    <p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*</a></p>
    
    
    
    <p><em>Support for this event was provided in part by the National Science Foundation under SFS grant </em><em>DGE-1753681.</em></p>
    
    
    
    <p><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p>
    
    
    
    <p><strong>Upcoming CDL Meetings:</strong></p>
    
    
    
    <p>Mar 13, Hasan Cam, autonomous agents<br>Mar 27, Dan Yaroslaski, cybercommand<br>Apr 10, Russ Fink (APL), ransomware<br>Apr 24, TBA<br>May 8, Jason Wells, law enforcement<br>May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE 456</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/02/talk-hardware-security-kernel-for-managing-memory-and-instruction-execution-12pm-fri-2-28/" rel="nofollow external" class="bo">talk: Hardware Security Kernel for Managing Memory and Instruction Execution, 12pm Fri 2/28</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Hardware Security Kernel for Managing Memory and Instruction Execution       Patrick Jungwirth, PhD      Computational and Information Sciences Directorate...</Summary>
<Website>https://www.csee.umbc.edu/2020/02/talk-hardware-security-kernel-for-managing-memory-and-instruction-execution-12pm-fri-2-28/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/90623/guest@my.umbc.edu/73a2ef9aadd73410c584e89816bb8157/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 20 Feb 2020 11:57:26 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="88326" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/88326">
<Title>TALK: Reasoning About Time in a Crypto Protocol Analysis Tool</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/11/Clock-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"><h4>The UMBC Cyber Defense Lab presents</h4>
    
    
    
    <h2><strong>Reasoning About Time in a Crypto Protocol Analysis Tool</strong></h2>
    
    
    
    <h4>Dr. Catherine Meadows, Naval Research Laboratory</h4>
    
    
    
    <h4>12:00–1:00pm Friday, 15 November 2019, ITE 227                                                                                                                                              </h4>
    
    
    
    <p>The ability to guarantee timing properties, and in turn to use assumption about time to guarantee the security of protocols, is important to many of the applications we rely upon.  For example, to compute locations, GPS depends on time synchronization between entities.  Blockchain protocols require loose time synchronization to guarantee agreement on block timestamps.  Distance-bounding protocols use the roundtrip time of an RF signal to enforce constraints on location.  To analyze these types protocols formally, it is necessary to reason about time. This talk describes recent research in extending the Maude-NPA cryptographic protocol analysis tool to reason about cryptographic protocols that rely on or enforce timing properties.  We describe the timing model we have created for the tool. We show how we we represent timing properties as constraints, whose solution is outsourced to an SMT solver.  We also discuss our experimental results.</p>
    
    
    
    <p>Catherine Meadows is a senior researcher in computer security at the Center for High Assurance Systems at the Naval Research Laboratory and heads that group’s Formal Methods Section. She was the principal developer of the NRL Protocol Analyzer (NPA), which was one of the first software tools to find previously undiscovered flaws in cryptographic protocols, and was used successfully in the analysis of a number of protocol standards.  She is also leading, or has recently led, a number of projects related to the design and analysis of cryptographic protocols, including one focused the development of an analysis tool, Maude-NPA, that takes into account the the complex algebraic properties of cryptosystems, another that is focusing on the automatic generation of secure cryptosystems, and another devoted to formal methods for the design of cyber-physical systems with legacy components.</p>
    
    
    
    <p>This work was supported by ONR 321 (*protected email*)   </p>
    
    
    
    <p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant 175368.  The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.  Upcoming CDL Events:
    </p><ul><li>December 6, Karl Henderson, Verisign</li> 
    <li>9am—5pm daily, January 13-17, UMBC SFS/CySP Research Study, ITE 456</li>
    <li> January 31, 2020, TBA, biweekly CDL talks resume</li></ul>
    <p>The post <a href="https://www.csee.umbc.edu/2019/11/talk-reasoning-about-time-in-a-crypto-protocol-analysis-tool-catherine-meadows-naval-research-laboratory/" rel="nofollow external" class="bo">TALK: Reasoning About Time in a Crypto Protocol Analysis Tool</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Reasoning About Time in a Crypto Protocol Analysis Tool      Dr. Catherine Meadows, Naval Research Laboratory      12:00–1:00pm Friday, 15 November 2019,...</Summary>
<Website>https://www.csee.umbc.edu/2019/11/talk-reasoning-about-time-in-a-crypto-protocol-analysis-tool-catherine-meadows-naval-research-laboratory/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/88326/guest@my.umbc.edu/5ee2a03aa6c8d943d63ec889fe036f2e/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 10 Nov 2019 15:12:03 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="86326" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86326">
<Title>talk: Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/09/srp_image-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4>
    
    
    
    <h2>Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</h2>
    
    
    
    <h3>Erin Lanus, UMBC Cyber Defense Lab</h3>
    
    
    
    <h4>12:00–1:00pm, Friday, 6 September 2019, ITE 227, UMBC</h4>
    
    
    
    <p>Joint work with Alan Sherman, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus Bonyadi, Mario Costa, Moses Liskov, and Edward Zieglar</p>
    
    
    
    <p><a href="https://en.wikipedia.org/wiki/Secure_Remote_Password_protocol" rel="nofollow external" class="bo">Secure Remote Password</a> (SRP) is a widely deployed password authenticated key exchange (PAKE) protocol used in products such as 1Password and iCloud Keychain. As with other PAKE protocols, the two participants in SRP use knowledge of a pre-shared password to authenticate each other and establish a session key. I will explain the SRP protocol and security goals it seeks to achieve. I will demonstrate how to model the protocol using the Cryptographic Protocol Shapes Analyzer (CPSA) tool and present my analysis of the shapes produced by CPSA.</p>
    
    
    
    <p><a href="https://www.linkedin.com/in/erin-lanus-27b340176/" rel="nofollow external" class="bo">Erin Lanus</a> earned her Ph.D. in computer science in May 2019 from Arizona State University. Dr. Lanus is currently conducting research with Professor Sherman’s Protocol Analysis Lab at UMBC. Her previous results include how to use state to enable CPSA to reason about time in forced-latency protocols. Her research also explored algorithmic approaches to constructing combinatorial arrays employed in interaction testing and the creation of a new type of array for attribute distribution to achieve anonymous authorization in attribute-based systems. In October she will begin as a research assistant professor at Virginia Tech’s Hume Center in Northern Virginia.  email: *protected email*</p>
    
    
    
    <p>Support for this research was provided in part by grants to <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">CISA</a> from the Department of Defense, CySP grants H98230-17-1-0387 and H98230-18-0321.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/09/talk-analysis-of-secure-remote-password-srp-protocol-using-cpsa-umbc-cybersecurity/" rel="nofollow external" class="bo">talk: Analysis of the Secure Remote Password (SRP) Protocol Using CPSA</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Analysis of the Secure Remote Password (SRP) Protocol Using CPSA      Erin Lanus, UMBC Cyber Defense Lab      12:00–1:00pm, Friday, 6 September 2019, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2019/09/talk-analysis-of-secure-remote-password-srp-protocol-using-cpsa-umbc-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86326/guest@my.umbc.edu/fa69f8ed49100aecdbfa8e0cfc867b00/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 03 Sep 2019 22:21:17 -0400</PostedAt>
<EditAt>Tue, 03 Sep 2019 22:21:17 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="86106" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86106">
<Title>talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/05/cps.png" alt="" style="max-width: 100%; height: auto;"><h4>UMBC Cyber Defense Lab</h4>
    
    <h1>Security for Smart Cyber-Physical Systems</h1>
    
    <h3> Prof. Anupam Joshi, UMBC</h3>
    <h3>12:00–1:00pm, Friday, 3 May 2019, ITE 227</h3>
    
    
    
    <p>Smart <a href="https://en.wikipedia.org/wiki/Cyber-physical_system" rel="nofollow external" class="bo">Cyber-Physical Systems</a> (CPS) are increasingly embedded in our everyday life. Security incidents involving them are often high-profile because of their ability to control critical infrastructure. Stuxnet and the Ukrainian power-grid attack are some notorious attacks reported against CPS which impacted governmental programs to ordinary users. In addition to the deliberate attacks, device malfunction and human error can also result in incidents with grave consequences. Hence the detection and mitigation of abnormal behaviors resulting from security incidents is imperative for the trustworthiness and broader acceptance of smart cyber-physical systems. We propose an automatic behavioral abstraction technique, ABATe, which automatically learns their typical behavior by finding the latent “context” space using available operational data and is used to discern anomalies. We evaluate our technique using two real-world datasets (a sewage water treatment plant dataset and an automotive dataset) to demonstrate the multi-domain adaptability and efficacy of our approach.</p>
    
    
    
    <p>Anupam Joshi is the Oros Family Professor and Chair of Computer Science and Electrical Engineering Department at the University of Maryland, Baltimore County(UMBC). He is the Director of UMBC’s Center for Cybersecurity, and one of the USM leads for the National Cybersecurity FFRDC. He is a Fellow of IEEE. Dr. Joshi obtained a B.Tech degree from IIT Delhi in 1989, and a Masters and Ph.D. from Purdue University in 1991 and 1993 respectively. His research interests are in the broad area of networked computing and intelligent systems. His primary focus has been on data management and security/privacy in mobile/pervasive computing environments, and policy driven approaches to security and privacy. He is also interested in Semantic Web and Data/Text/Web Analytics, especially their applications to (cyber) security. He has published over 250 technical papers with an h-index of 79 and over 23,250 citations (per Google scholar), filed and been granted several patents, and has obtained research support from National Science Foundation (NSF), NASA, Defense Advanced Research Projects Agency (DARPA), US Dept of Defense (DoD), NIST, IBM, Microsoft, Qualcom, Northrop Grumman, and Lockheed Martin amongst others</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/" rel="nofollow external" class="bo">talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab    Security for Smart Cyber-Physical Systems     Prof. Anupam Joshi, UMBC   12:00–1:00pm, Friday, 3 May 2019, ITE 227      Smart Cyber-Physical Systems (CPS) are...</Summary>
<Website>https://www.csee.umbc.edu/2019/05/umbc-talk-cybersecurity-smart-cyber-physical-systems-cps/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86106/guest@my.umbc.edu/2e4bbb97c805f4fd3d6ecbc7c7020288/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 01 May 2019 23:29:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="86107" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/86107">
<Title>talk: The Evolution of Mobile Authentication, 1pm 4/30, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/5G-phone-altered.png" alt="" style="max-width: 100%; height: auto;"><h1>The Evolution of Mobile Authentication</h1>
    
    <h3>Prof. Keith Mayes, Royal Holloway University of London</h3>
    
    <h3> 1:00pm Tuesday 30 April 2019, ITE325, UMBC </h3>
    
    
    
    <p>Mobile communication is an essential part or modern life, however it is dependent on some fundamental security technologies. Critical amongst these technologies, is mobile authentication, the ability to identify valid users (and networks) and enable their secure usage of communication services. In the GSM standards and the <a href="https://en.wikipedia.org/wiki/3GPP" rel="nofollow external" class="bo">3GPP</a> standards that evolved from them, the subscriber-side security has been founded on a removable, attack-resistant smart card known as a <a href="https://en.wikipedia.org/wiki/SIM_card" rel="nofollow external" class="bo">SIM</a> (or USIM) card. The presentation explains how this situation came about, and how and why the protocols and algorithms have improved over time. It will cover some work by the author on a recent algorithm for 3GPP and then discuss how Machine-to-Machine and IoT considerations have led to new standards, which may herald the demise of the conventional removable SIM, in favour of an embedded <a href="https://en.wikipedia.org/wiki/SIM_card#Embedded-SIM" rel="nofollow external" class="bo">eSIM</a>.</p>
    
    
    
    <p><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Professor Keith Mayes</a> B.Sc. Ph.D. CEng FIET A.Inst.ISP, is a professor of information security within the Information Security Group (ISG) at Royal Holloway University of London. Prior to his sabbatical, he was the Director of the ISG and Head of the School of Mathematics and Information Security. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His current research interests are diverse, including, mobile communications, smart cards/RFIDS, the Internet of Things, and embedded systems. Keith joined the ISG in 2002, originally as the Founder Director of the ISG Smart Card Centre, following a career in industry working for Pye TVT, Honeywell Aerospace and Defence, Racal Research and Vodafone. Keith is a Chartered Engineer, a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and an experienced company director and consultant. He is active in the UK All Party Parliamentary Group (APPG) on Cyber Security and is an adjunct professor at UMBC.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-the-evolution-of-mobile-authentication-1pm-4-30-ite325-umbc-3gpp-esim/" rel="nofollow external" class="bo">talk: The Evolution of Mobile Authentication, 1pm 4/30, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Evolution of Mobile Authentication    Prof. Keith Mayes, Royal Holloway University of London     1:00pm Tuesday 30 April 2019, ITE325, UMBC       Mobile communication is an essential part or...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-the-evolution-of-mobile-authentication-1pm-4-30-ite325-umbc-3gpp-esim/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/86107/guest@my.umbc.edu/f459a33f3816eb7fdefc2ff80cc3a4b5/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Mon, 29 Apr 2019 18:34:04 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="83868" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/83868">
<Title>talk: Using CPSA to Analyze Force-Latency Protocols, 12-1 4/19</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/mitm_attack-1024x461.png" alt="" style="max-width: 100%; height: auto;"><h4><a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a></h4>
    <h2> Using CPSA to Analyze Force-Latency Protocols</h2>
    <h3>Dr. Edward Zieglar, National Security Agency</h3>
    <h3>12-1 Friday, 19 April 19, ITE 227</h3>
    
    
    
    <p>Several cryptographic protocols have been proposed to address the <a href="https://en.wikipedia.org/wiki/Man-in-the-middle_attack" rel="nofollow external" class="bo">Man-in-the-Middle attack</a> without the prior exchange of keys. This talk will describe a formal analysis of one such protocol proposed by Zooko Wilcox-O’Hearn, the forced-latency defense against the chess grandmaster attack. Using the Cryptographic Protocol Shapes Analyzer (CPSA), we validate the security properties of the protocol through the novel use of CPSA’s state features to represent time. We also describe a small message space attack that highlights how assumptions made in protocol design can affect the security of a protocol in use, even for a protocol with proven security properties.</p>
    
    
    
    <p>Edward Zieglar is a security researcher in the Research Directorate of the National Security Agency, where he concentrates on formal analysis and verification of cryptographic protocols and network security. He is also an adjunct professor at UMBC where he teaches courses in networking and network security. He received his master’s and doctoral degrees in computer science from UMBC.</p>
    
    
    
    <p>Host: Alan T.  Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-using-cpsa-to-analyze-force-latency-protocols-12-1-4-19/" rel="nofollow external" class="bo">talk: Using CPSA to Analyze Force-Latency Protocols, 12-1 4/19</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab    Using CPSA to Analyze Force-Latency Protocols   Dr. Edward Zieglar, National Security Agency   12-1 Friday, 19 April 19, ITE 227      Several cryptographic protocols have...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-using-cpsa-to-analyze-force-latency-protocols-12-1-4-19/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83868/guest@my.umbc.edu/f354661fc2364d2b95d67f287e25fe8c/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 18 Apr 2019 12:34:38 -0400</PostedAt>
</NewsItem>

</News>
