<?xml version="1.0"?>
<News hasArchived="true" page="6" pageCount="6" pageSize="10" timestamp="Sun, 26 Apr 2026 02:09:22 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=6&amp;tag=computer-science">
<NewsItem contentIssues="true" id="74886" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74886">
<Title></Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/03/blockchain-technology.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1>Global Impact, Promise &amp; Perils of Blockchain</h1>
    <p>UMBC Professors <a href="https://www.csee.umbc.edu/haibin-zhang/" rel="nofollow external" class="bo">Haibin Zhang</a> (Computer Science and Electrical Engineering) and <a href="http://karuna.informationsystems.umbc.edu/" rel="nofollow external" class="bo">Karuna Joshi</a> (Information Systems) will be panelists for an event focused on the impact, promise and perils of blockchain technologies at the <a href="http://www.bwtechumbc.com/" rel="nofollow external" class="bo">bwtech@UMBC Research &amp; Technology Park</a>. The event will take place from 8:15 to 11:15am on Tuesday, March 20 2018 at and will include breakfast and time for networking.  They will be joined on the panel by <a href="https://www.linkedin.com/in/marcus-edwards/" rel="nofollow external" class="bo">Marcus Edwards</a>, from Northrop Grumman’s Cyber &amp; Intelligence Mission Solutions, <a href="https://www.linkedin.com/in/steve-cook-15283a/" rel="nofollow external" class="bo">Steve Cook</a> of Verizon Enterprise Solutions, <a href="https://www.linkedin.com/in/sean-manion-6383a64/" rel="nofollow external" class="bo">Sean Manion</a> of  Science Distributed and moderator <a href="https://www.linkedin.com/in/razvan-miutescu-83b44912/" rel="nofollow external" class="bo">Razvan Miutescu</a> of Whiteford, Taylor &amp; Preston, LLP.   For more information and tickets are available on <a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo">eventbrite</a>.</p>
    <h1><a href="https://www.eventbrite.com/e/cyberinnovation-briefing-the-global-impact-promise-perils-of-blockchain-tickets-42796523554" rel="nofollow external" class="bo"><strong>CyberInnovation Briefing: The Global Impact, Promise &amp; Perils of Blockchain</strong></a></h1>
    <h4>8:15 – 11:15 Tuesday, March 20, 2018</h4>
    <h4>bwtech@UMBC Research &amp; Technology Park<br>
    5520 Research Park Drive, Baltimore, MD 21228</h4>
    <p>Cryptocurrency market capitalizations have soared over the past year and new innovative blockchain applications are continuing to emerge seemingly by the day. However, the average end-user is left to singularly make sense of a vast and global marketplace that is rapidly converging the core tenets of economics and technology development. The future prospects of traditional business and financial models is uncertain as blockchain technology leaves key decision makers in an untenable position to either adopt and adapt or simply be left behind. Industry and academic experts in the field will discuss the pros and cons and opportunities and challenges of this disruptive technology movement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/" rel="nofollow external" class="bo">🗣️ CyberInnovation Briefing: Global Impact, Promise &amp; Perils of Blockchain</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Global Impact, Promise &amp; Perils of Blockchain   UMBC Professors Haibin Zhang (Computer Science and Electrical Engineering) and Karuna Joshi (Information Systems) will be panelists for an event...</Summary>
<Website>https://www.csee.umbc.edu/2018/03/umbc-cyberinnovation-briefing-global-impact-promise-perils-of-blockchain/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74886/guest@my.umbc.edu/071b57ec9d7f66fc52ec392277325cb1/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 16 Mar 2018 08:34:37 -0400</PostedAt>
<EditAt>Fri, 16 Mar 2018 08:34:37 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="74319" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74319">
<Title>UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/capture-the-flag.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h1>UMBC Cyber Dawgs<br>
    Capture The Flag Cybersecurity Competition</h1>
    <p>The national champion <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">UMBC Cyber Dawgs</a> will hold the second annual computer security Capture The Flag (CTF) competition on Sunday, March 11th from 11am-7pm in the UC Ballroom. This CTF event is a Jeopardy-style competition where teams of four people use their laptops to discover answers to questions about cybersecurity, including network forensics, reverse engineering, reconnaissance, and cryptography. Each question has a point value based upon its difficulty and whichever team has the most points at the end wins!</p>
    <p>The competition is open to all current UMBC students and student from a few other nearby schools. Both beginners and experts are welcome to participate.</p>
    <p>Prizes will be awarded to the top teams. There will also be door prizes for randomly selected participants as well as T-Shirts for everyone. Some prizes from last year include Raspberry Pis, a Wireless Pineapple Nano, a YARD Stick One, and a Chromebook! Lunch and dinner (Lima’s Chicken) will be provided for everyone.</p>
    <p>Students who are interested must <a href="https://goo.gl/forms/g2oxUMeyKYlf2QVD3%22" rel="nofollow external" class="bo">register</a> online in advance and bring a laptop to the event. Please note any dietary restrictions on the registration form as well as your T-Shirt size. See the <a href="http://umbccd.umbc.edu/dawgctf" rel="nofollow external" class="bo">event website</a> for more information</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/" rel="nofollow external" class="bo">UMBC Cyber Dawgs Capture The Flag Cybersecurity Competition, Sunday March 11</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Dawgs  Capture The Flag Cybersecurity Competition   The national champion UMBC Cyber Dawgs will hold the second annual computer security Capture The Flag (CTF) competition on Sunday,...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-cyber-dawgs-capture-flag-cybersecurity-competition-sunday-march-11-2018/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74319/guest@my.umbc.edu/2e5232853dad24355b1c4efb82961c8a/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 26 Feb 2018 23:53:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="74246" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/74246">
<Title>talk: Circuit Complexity of One-Way Boolean Functions, 12pm Fri 2/23, ITE229</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/oneway.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/oneway-1024x537.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3><em>The UMBC Cyber Defense Lab presents</em></h3>
    <h1><strong>Experimentally Measuring the Circuit Complexity</strong><br><strong>of One-Way Boolean Functions</strong></h1>
    <h2><em>Brian Weber, CSEE, UMBC<br></em></h2>
    <h2>12:00–1:00pm, <span>Friday, 23 February 2018, ITE 229</span></h2>
    <p>I present preliminary results from an exhaustive search for <a href="https://en.wikipedia.org/wiki/One-way_function" rel="nofollow external" class="bo">one-way functions</a> in certain classes of small Boolean functions.   One-way functions are functions that are easy to compute but hard to invert.  They are vital for cryptography, yet no one has proven their existence for arbitrary input sizes.  For any bounded circuit model of computation, it is possible to search exhaustively over all possible Boolean functions of restricted size and thereby determine for the searched class the maximum disparity between the complexity of any function and its inverse.  Throughout, we assume a circuit model in which each gate has fan-in 2 and fan-out 1.</p>
    <p>In his 1985 dissertation at MIT, Steven Boyack carried out the first such search.  For any positive integers <em>n</em> and <em>M</em>, let <em>F<sub>n,M</sub></em> denote the set of Boolean functions with <em>n</em> inputs and <em>M</em>outputs. Using circuit size as the complexity measure, Boyack searched the space of every combinatorial function in <em>F<sub>3,3 </sub></em>by searching each of 52 equivalency classes of functions in this space.  He found that every function class in this space has an identically sized inverse.  He was able to prove that functions do exist with more complex inverses outside the space he searched, but not by more than a constant factor.</p>
    <p>In spring 2017, using circuit depth as the complexity measure, I searched all injective functions up to <em>F<sub>8,8</sub></em> whose coordinate functions are in <em>F<sub>2,1</sub></em>.  A coordinate function in this context refers to the function that computes an individual output bit.  In addition, I searched up to <em>F<sub>4,4 </sub></em>allowing coordinate functions in <em>F<sub>3,1</sub></em>.  In the space I searched, the most one-way function has fixed depth of 1, and an inverse depth exactly equal to the input size of the function. That is, for each 2 &lt; <em>n</em> &lt; 9, the hardest inverse in the space I searched has a depth of <em>n</em>, where <em>n</em> is the number of input bits. In addition, a search space allowing a larger fan-in for the coordinate functions did not yield functions less invertible than were found in the original search space.</p>
    <p><em>Brian Weber</em> is a senior BS/MS computer engineering student and SFS scholar at UMBC.  He hopes to extend the work presented here into his Master’s thesis next year.  Email: *protected email*</p>
    <p><strong>Host:</strong> Alan T.  Sherman, *protected email*Support for this research was provided in part by the National Science Foundation under SFS grant 1241576.</p>
    <p><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-talk-experimentally-measuring-circuit-complexity-one-way-boolean-functions/" rel="nofollow external" class="bo">talk: Circuit Complexity of One-Way Boolean Functions, 12pm Fri 2/23, ITE229</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Experimentally Measuring the Circuit Complexity of One-Way Boolean Functions   Brian Weber, CSEE, UMBC    12:00–1:00pm, Friday, 23 February 2018, ITE 229   I...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-talk-experimentally-measuring-circuit-complexity-one-way-boolean-functions/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/74246/guest@my.umbc.edu/186a018dd105cdb013ccb23caf98fdaa/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>sfs</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 22 Feb 2018 22:28:33 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="73767" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73767">
<Title>UMBC&#8217;s Haibin Zhang shares tips to secure data in the cloud</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/Cybersecurity_locked-screen-1920x768.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1><strong>UMBC’s Haibin Zhang shares tips to secure data in the cloud</strong></h1>
    <p>As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and general users have voiced concerns about cloud security. In a new <a href="https://theconversation.com/us" rel="nofollow external" class="bo"><em>Conversation</em></a> article recently published by <em>Scientific American</em>, <a href="https://www.csee.umbc.edu/~hbzhang/" rel="nofollow external" class="bo"><strong>Haibin Zhang</strong>,</a> assistant professor of computer science and electrical engineering, explains precautions consumers can take to protect their files in the cloud.</p>
    <p>Zhang explains that data stored and secured using commercial cloud storage systems is encrypted, which means that without the key, the information looks like a series of meaningless characters. Encryption keys have the potential to be misused, if they end up in the wrong hands, which can compromise the security of files stored in a cloud.</p>
    <p>“Just like regular keys, if someone else has them, they might be stolen or misused without the data owner knowing,” says Zhang. “And some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>Zhang notes that some cloud services allow customers to maintain their encryption key themselves, which give the consumer the control in ensuring that their data remains safe. Other services keep the encryption keys internally and manage the security for their customers. He says that while each option has benefits, it is important to recognize that “some services might have flaws in their security practices that leave users’ data vulnerable.”</p>
    <p>To keep data secure in the cloud, Zhang suggests using enhanced security features offered by cloud storage companies and taking additional precautions that are available to individual customers. He recommends that people use a cloud storage service that allows customers to encrypt their data before uploading it for storage, and to rely on services that have been “validated by independent security researchers.”</p>
    <p>Read “How secure is your data when it’s stored in the cloud?” in <a href="https://theconversation.com/how-secure-is-your-data-when-its-stored-in-the-cloud-90000" rel="nofollow external" class="bo"><em>The Conversation </em></a>for Zhang’s additional recommendations on securing data on the cloud. The piece also appeared in <a href="https://www.scientificamerican.com/article/how-secure-is-your-data-when-it-rsquo-s-stored-in-the-cloud/" rel="nofollow external" class="bo"><em>Scientific American</em></a>, and has so far been read nearly 20,000 times.</p>
    <p><em>Adapted from a UMBC <a href="https://news.umbc.edu/umbcs-haibin-zhang-shares-tips-to-secure-data-in-the-cloud/" rel="nofollow external" class="bo">News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>. Photo by Yuri Samoilov, <a href="https://creativecommons.org/licenses/by/2.0/" rel="nofollow external" class="bo">CC by 2.0</a>.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/" rel="nofollow external" class="bo">UMBC’s Haibin Zhang shares tips to secure data in the cloud</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Haibin Zhang shares tips to secure data in the cloud   As more consumers rely on cloud-based data storage for everything from family photos to financial information, both experts and...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/umbc-haibin-zhang-tips-secure-data-cloud-cybersecurity-computer-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73767/guest@my.umbc.edu/ac1cc011dc557e189defafd6aae1fa07/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>faculty-and-staff</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 07 Feb 2018 14:14:06 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73664" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73664">
<Title>talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity-1024x536.jpg" alt="cybersecurity" style="max-width: 100%; height: auto;"></a></p>
    <p><em>The UMBC Cyber Defense Lab presents</em></p>
    <h1><strong>Results from the January 2018 SFS Research Study at UMBC</strong></h1>
    <h3><strong>Enis Golaszewski<br>
    Department of Information Systems</strong><br><strong>University of Maryland, Baltimore County</strong></h3>
    <h4><strong>12:00–1:00pm, Friday, 9 February 2018, ITE 228 (or nearby)</strong></h4>
    <p>January 22-26, 2018, UMBC SFS scholars worked collaboratively to analyze the security of a targeted aspect of the UMBC computer system.  The focus of this year’s study was the WebAdmin module that enables users to perform various functions on their accounts, including changing the password.  Students identified vulnerabilities involving failure to sanitize user input properly and suggested mitigations.  Participants comprised BS, MS, MPS, and PhD students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College and Prince George’s Community College to complete their four-year degrees at UMBC. We hope that other universities can benefit from our motivational and educational strategy of cooperating with the university’s IT staff to engage students in active project-based learning centering on focused questions about the university computer system.</p>
    <p><em>This project was supported in part by the National Science Foundation under SFS grant 1241576.</em></p>
    <p><a href="https://www.linkedin.com/in/ennis-golaszewski-88742179/" rel="nofollow external" class="bo"><strong>Enis Golaszewski</strong></a> (*protected email*) is a PhD student and SFS scholar in computer science working with Dr. Sherman on blockchain, protocol analysis, and the security of software-defined networks.</p>
    <p><strong>Host:</strong> Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/" rel="nofollow external" class="bo">talk: Results of the 2018 SFS Research Study at UMBC, 12pm Fri 2/9, ITE228</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Results from the January 2018 SFS Research Study at UMBC   Enis Golaszewski  Department of Information Systems University of Maryland, Baltimore County...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-results-2018-research-study-umbc-cybersecurity-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73664/guest@my.umbc.edu/ceecd69001ec678793247f539105a2f0/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 21:08:32 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="73663" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/73663">
<Title>talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/hdwr_cyber.jpg" alt="hardware cybersecurity" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>Towards Hardware Cybersecurity</strong></h1>
    <h3><strong><a href="https://ece.gmu.edu/~hhomayou/goal.html" rel="nofollow external" class="bo">Professor Houman Homayoun</a><br>
    George Mason University<br></strong></h3>
    <h4><strong><span>11:00am-12:00pm Tuesday, 20 Febuary 2018</span>, ITE 325, UMBC</strong></h4>
    <p>Electronic system security, trust and reliability has become an increasingly critical area of concern for modern society. Secure hardware systems, platforms, as well as supply chains are critical to industry and government sectors such as national defense, healthcare, transportation, and finance.</p>
    <p>Traditionally, authenticity and integrity of data has been protected with various security protocol at the software level with the underlying hardware assumed to be secure, and reliable. This assumption however is no longer true with an increasing number of attacks reported on the hardware. Counterfeiting electronic components, inserting hardware trojans, and cloning integrated circuits are just few out of many malicious byproducts of hardware vulnerabilities, which need to be urgently addressed.</p>
    <p>In the first part of this talk I will address the security and vulnerability challenges in the horizontal integrated hardware development process. I will then present the concept of hybrid spin-transfer torque CMOS look up table based design which is our latest effort on developing a cost-effective solution to prevent physical reverse engineering attacks.</p>
    <p>In the second part of my talk I will present how information at the hardware level can be used to address some of the major challenges of software security vulnerabilities monitoring and detection methods. I will first discuss these challenges and will then show how the use of data at the hardware architecture level in combination with an effective machine learning based predictor helps protecting systems against various classes of hardware vulnerability attacks.</p>
    <p>I will conclude the talk by emphasizing the importance of this emerging area and proposing a research agenda for the future.</p>
    <p><a href="https://ece.gmu.edu/~hhomayou" rel="nofollow external" class="bo">Dr. Houman Homayoun</a> is an Assistant Professor in the Department of Electrical and Computer Engineering at George Mason University. He also holds a courtesy appointment with the Department of Computer Science as well as Information Science and Technology Department. He is the director of GMU’s Accelerated, Secure, and Energy-Efficient Computing Laboratory (ASEEC).  Prior to joining GMU, Houman spent two years at the University of California, San Diego, as NSF Computing Innovation (CI) Fellow awarded by the CRA-CCC. Houman graduated in 2010 from University of California, Irvine with a Ph.D. in Computer Science. He was a recipient of the four-year University of California, Irvine Computer Science Department chair fellowship. Houman received the MS degree in computer engineering in 2005 from University of Victoria and BS degree in electrical engineering in 2003 from Sharif University of Technology. Houman conducts research in hardware security and trust, big data computing, and heterogeneous computing, where he has published more than 80 technical papers in the prestigious conferences and journals on the subject. Since 2012 he leads ten research projects, a total of $7.2 million in funding, supported by DARPA, AFRL, NSF, NIST, and GM on the topics of hardware security and trust, big data computing, heterogeneous architectures, and biomedical computing. Houman received the 2016 GLSVLSI conference best paper award for developing a manycore accelerator for wearable biomedical computing. Since 2017 he has been serving as an Associate Editor of IEEE Transactions on VLSI. He is currently serving as technical program co-chair of 2018 GLSVLSI conference.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/" rel="nofollow external" class="bo">talk: Towards Hardware Cybersecurity, 11am Tue 2/20, ITE325, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Towards Hardware Cybersecurity   Professor Houman Homayoun  George Mason University    11:00am-12:00pm Tuesday, 20 Febuary 2018, ITE 325, UMBC   Electronic system security, trust and reliability...</Summary>
<Website>https://www.csee.umbc.edu/2018/02/talk-umbc-towards-hardware-cybersecurity-homayoun/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/73663/guest@my.umbc.edu/346faa5a3054d6e7d0b17a902843a9e0/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 04 Feb 2018 19:08:51 -0500</PostedAt>
<EditAt>Sat, 17 Feb 2018 19:08:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="72612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72612">
<Title>talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h4><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/quantum_crypto.jpeg" style="max-width: 100%; height: auto;"></h4>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1><strong>An Introduction to Quantum Cryptography:</strong><br><strong>Or, How Alice Outwits Eve</strong></h1>
    <h3>Sam Lomonaco, CSEE, UMBC<br>
    12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC</h3>
    <p>Alice and Bob wish to communicate without the archvillainess Eve eavesdropping on their conversation. Alice decides to take two college courses, one in cryptography, the other in quantum mechanics. During the courses, she discovers she can use what she has learned to devise a cryptographic communication system that automatically detects whether or not Eve is up to her villainous eavesdropping. Some of the topics discussed are Heisenberg’s Uncertainty Principle, the Vernam cipher, the BB84 and B92 cryptographic protocols. The talk ends with a discussion of some of Eve’s possible eavesdropping strategies, i.e., opaque eavesdropping, translucent eavesdropping, and translucent eavesdropping with entanglement.</p>
    <p><a href="https://www.csee.umbc.edu/~lomonaco/" rel="nofollow external" class="bo">Samuel J. Lomonaco Jr</a>. received his PhD in mathematics from Princeton University. He has been a full professor of computer science and electrical engineering at the University of Maryland, Baltimore County (UMBC) since 1985, serving as founding chair of the CS Department from 1985 to 1991. Representative Awards, Accomplishments, and Honors include: (1) He was a visiting key research scientist at the Mathematical Sciences Research Institute (MSRI) at the University of California at Berkley in 2004. (2) He was a senior LaGrange fellow at the Institute for Scientific Exchange in Torino, Italy in 2005. (3) For contributions made to the development of the programming language Ada, he received an award from the United States Under Secretary of Defense for Research and Engineering, Dr. Richard DeLauer. (4) He was the first to introduce quantum information science to the American Mathematical Society (AMS) by organizing and giving a two-day AMS short course on quantum computation at the Annual Meeting of the AMS in Washington, DC, in January 2000. (5) He published four books on quantum computation and information science. (6) He accepted an invitation to be a guest editor of the Journal of Quantum Information Processing for a special issue on topological quantum computation.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/" rel="nofollow external" class="bo">talk: An Introduction to Quantum Cryptography, Noon Friday 11/17, ITE231</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   An Introduction to Quantum Cryptography: Or, How Alice Outwits Eve   Sam Lomonaco, CSEE, UMBC  12:00–1:00pm, Friday, 17 November 2017, ITE 231, UMBC   Alice...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/umbc-introduction-quantum-cryptography-lomonaco/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72612/guest@my.umbc.edu/54e3ce4738d132a9095207c57d198708/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 15 Nov 2017 08:10:40 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72613" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72613">
<Title>talk: A Practitioner&#8217;s Introduction to Deep Learning, 1pm Fri 11/17</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/11/deep_learning.png" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>ACM Tech Talk Series</h4>
    <h1><strong>​A Practitioner’s Introduction to Deep Learning</strong></h1>
    <h3>​Ashwin Kumar Ganesan, PhD student</h3>
    <h3>1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC</h3>
    <p>In recent years, Deep Neural Networks have been highly successful at performing a number of tasks in computer vision, natural language processing and artificial intelligence in general. The remarkable performance gains have led to universities and industries investing heavily in this space. This investment creates a thriving open source ecosystem of tools &amp; libraries that aid the design of new architectures, algorithm research as well as data collection.</p>
    <p>This talk (and hands-on session) introduce people to some of the basics of machine learning, neural networks and discusses some of the popular neural network architectures. We take a dive into one of the popular libraries, Tensorflow, and an associated abstraction library Keras.</p>
    <p>To participate in the hands-on aspects of the workshop, bring a laptop computer with Python installed and install the following libraries using pip.  For windows or (any other OS) consider doing an installation of anaconda that has all the necessary libraries.</p>
    <ul><li>numpy, scipy &amp; scikit-learn</li>
    <li>tensorflow / tensoflow-gpu (The first one is the GPU version)</li>
    <li>matplotlib for visualizations (if necessary)</li>
    <li>jupyter &amp; ipython (We will use python2.7 in our experiments)</li>
    </ul><p>Following are helpful links:</p>
    <ul><li><a href="https://www.tensorflow.org/install/" rel="nofollow external" class="bo">https://www.tensorflow.org/install/</a></li>
    <li><a href="https://www.scipy.org/install.html" rel="nofollow external" class="bo">https://www.scipy.org/install.html</a></li>
    </ul><p>Contact Nisha Pillai (NPillai1 at umbc.edu) with any questions regarding this event.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/" rel="nofollow external" class="bo">talk: A Practitioner’s Introduction to Deep Learning, 1pm Fri 11/17</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ACM Tech Talk Series   ​A Practitioner’s Introduction to Deep Learning   ​Ashwin Kumar Ganesan, PhD student   1:00-2:00pm Friday, 17 November 2017​, ITE325, UMBC   In recent years, Deep Neural...</Summary>
<Website>https://www.csee.umbc.edu/2017/11/practitioner-introduction-deep-learning-umbc-acm-teck-talk/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72613/guest@my.umbc.edu/e6c0244a9107e67e192737ee9aca6200/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 14 Nov 2017 14:56:17 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72617" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72617">
<Title>talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/iot_slider.jpg" style="max-width: 100%; height: auto;"></p>
    <h3>The UMBC Cybersecurity program at USG Speaker Series Presents</h3>
    <h1>The Internet of Things (IoT)</h1>
    <p>With speaker</p>
    <h3>William (Bill) Fisher, NCCoE Security Engineer</h3>
    <h3>Building III – Room 4230 (<a href="https://www.shadygrove.umd.edu/about-usg/directions-transportation" rel="nofollow external" class="bo">Universities @ Shady Grove Campus)</a></h3>
    <h3>Monday, October 30th 6:00-8:00 pm</h3>
    <p>The Internet of Things (IoT) is the inevitable result of years of Moore’s law – compact, cheap, chip platforms that can take ordinarily house hold items and make them data generating and collection devices that users can manage with their smart phone, web browser or their favorite automation platform. Physical proximity is no longer needed for things like cameras, door locks or thermostats. Instead users remotely access all of these “things” while on the go, even sharing some of their favorite things with friends and family, who need not own the thing, but simply be granted access through a web portal or mobile application. Like many technology trends before it, the IoT has brought great innovation but also great security challenges. These challenges go beyond standards and technology to economic and market forces that hinder security best practices, even for some of the most basic cyber hygiene. Join Bill Fisher of the National Cybersecurity Center of Excellence for a presentation on these challenges and basic mitigations organizations can put into place to help alleviate the risk that the IoT devices pose to consumers and the enterprise.</p>
    <p><strong>Speaker Bio:</strong></p>
    <p>Bill Fisher is a security engineer at the National Cybersecurity Center of Excellence (NCCoE). In this role, he is responsible for leading a team of engineers that work collaboratively with industry partners to address cybersecurity business challenges facing the nation. He leads the center’s Attribute Based Access Control (ABAC) project, Mobile Application Single Sign On (SSO) for the Public Safety and First Responder Sector, and is part of the ITL Cybersecurity for IoT program. Prior to his work at the NCCoE, Mr. Fisher was a program security advisor for the System High Corporation in support of the Network Security Deployment division at the Department of Homeland Security. He holds a bachelor’s degree in business administration from American University and a master’s degree in cybersecurity from Johns Hopkins University.</p>
    <p><strong>Host:</strong> Dr. Behnam Shariati (*protected email*) and UMBC Graduate Cybersecurity Association at USG</p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/" rel="nofollow external" class="bo">talk: Bill Fisher (NCCOE) on IoT Security @ USG 10/30 6-8PM</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cybersecurity program at USG Speaker Series Presents   The Internet of Things (IoT)   With speaker   William (Bill) Fisher, NCCoE Security Engineer   Building III – Room 4230...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-bill-fisher-nccoe-iot-security-usg-1030-6-8pm/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72617/guest@my.umbc.edu/85d6e62ef63ac2033b32c576bc185d28/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 16 Oct 2017 11:47:51 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="72618" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/72618">
<Title>talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/smartcard.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Attacks on Smart Cards, RFIDs and Embedded Systems</h1>
    <h3><a href="https://pure.royalholloway.ac.uk/portal/en/persons/keith-mayes(290542c6-8422-457e-85c0-cc4dde743624).html" rel="nofollow external" class="bo">Prof. Keith Mayes</a><br>
    Royal Holloway University of London</h3>
    <h3>10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC</h3>
    <p>Smart Cards and RFIDs exist with a range of capabilities and are used in their billions throughout the world. The simpler devices have poor security, however, for many years, high-end smart cards have successfully been used in a range of systems such as banking, passports, mobile communication, satellite TV etc. Fundamental to their success is a specialist design to offer remarkable resistance to a wide range of attacks, including physical, side-channel and fault. This talk describes a range of known attacks and the countermeasures that are employed to defeat them.</p>
    <p>Prof. Keith Mayes is the Head of the School of Mathematics and Information Security at Royal Holloway University of London. He received his BSc (Hons) in Electronic Engineering in 1983 from the University of Bath, and his PhD degree in Digital Image Processing in 1987. He is an active researcher/author with 100+ publications in numerous conferences, books and journals. His interests include the design of secure protocols, communications architectures and security tokens as well as associated attacks/countermeasures. He is a Fellow of the Institution of Engineering and Technology, a Founder Associate Member of the Institute of Information Security Professionals, a Member of the Licensing Executives Society and a member of the editorial board of the Journal of Theoretical and Applied Electronic Commerce Research (JTAER).</p>
    <p> </p>
    <p>The post <a href="https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/" rel="nofollow external" class="bo">talk: Keith Mayes on Attacks on Smart Cards, RFIDs and Embedded System</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Attacks on Smart Cards, RFIDs and Embedded Systems   Prof. Keith Mayes  Royal Holloway University of London   10-11:00am Tuesday, 10 October 2017, ITE 325, UMBC   Smart Cards and RFIDs exist...</Summary>
<Website>https://www.csee.umbc.edu/2017/10/talk-keith-mayes-attacks-smart-cards-rfids-embedded-system-cybersecurity-rfid/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/72618/guest@my.umbc.edu/f693b6777313d350fc774fad7d734ed2/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 06 Oct 2017 21:46:20 -0400</PostedAt>
</NewsItem>

</News>
