<?xml version="1.0"?>
<News hasArchived="true" page="7" pageCount="17" pageSize="10" timestamp="Sat, 18 Apr 2026 17:17:29 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=7">
<NewsItem contentIssues="true" id="100998" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100998">
<Title>talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>T<em>he UMBC Cyber Defense Lab presents</em></h4><hr><h2><strong>Thinking Like an Attacker:<br>Towards a Definition and Non-Technical Assessment of Adversarial Thinking</strong></h2><hr><h3><strong>Prof. Peter A. H. Peterson<br>Department of Computer Science<br>University of Minnesota Duluth</strong></h3><hr><h3><strong>12:00–1:00 pm ET,  Friday, 30 April 2021<br>via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p><em>“Adversarial thinking” (AT)</em>, sometimes called the “security mindset” or described as the ability to “think like an attacker,” is widely accepted in the computer security community as an essential ability for successful cybersecurity practice. Supported by intuition and anecdotes, many in the community stress the importance of AT, and multiple projects have produced interventions explicitly intended to strengthen individual AT skills to improve security in general. However, there is no agreed-upon definition of “adversarial thinking” or its components, and accordingly, no test for it. Because of this absence, it is impossible to meaningfully quantify AT in subjects, AT’s importance for cybersecurity practitioners, or the effectiveness of interventions designed to improve AT. Working towards the goal of a characterization of AT in cybersecurity and a non-technical test for AT that anyone can take, I will discuss existing conceptions of AT from the security community, as well as ideas about AT in other fields with adversarial aspects including war, politics, law, critical thinking, and games. I will also describe some of the unique difficulties of creating a non-technical test for AT, compare and contrast this effort to our work on the CATS and Security Misconceptions projects, and describe some potential solutions. I will explore potential uses for such an instrument, including measuring a student’s change in AT over time, measuring the effectiveness of interventions meant to improve AT, comparing AT in different populations (e.g., security professionals vs. software engineers), and identifying individuals from all walks of life with strong AT skills—people who might help meet our world’s pressing need for skilled and insightful security professionals and researchers. Along the way, I will give some sample non-technical adversarial thinking challenges and describe how they might be graded and validated.</p><hr><p><a href="https://www.google.com/url?q=https://www.d.umn.edu/~pahp/&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw2KbY0Y-8OtY454pn3qRo0E" rel="nofollow external" class="bo"> Peter A. H. Peterson</a> is an assistant professor of computer science at the University of Minnesota Duluth, where he teaches and directs the <em>Laboratory for Advanced Research in Systems (LARS)</em>, a group dedicated to research in operating systems and security, with a special focus on research and development to make security education more effective and accessible. He is an active member of the <em>Cybersecurity Assessment Tools (CATS)</em> project working to create and validate two concept inventories for cybersecurity, is working on an NSF-funded grant to identify and remediate commonsense misconceptions about cybersecurity, and is also the author of several hands-on security exercises for Deterlab that have been used at many institutions around the world. He earned his Ph.D. from the University of California, Los Angeles for work on <em>“adaptive compression”</em>—systems that make compression decisions dynamically to improve efficiency. He can be reached at *protected email*.</p><hr><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant </em><em>DGE-1753681</em><em>. </em><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. </em><strong>Upcoming CDL Meetings: </strong>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/" rel="nofollow external" class="bo">talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking   Prof. Peter A. H. Peterson Department of Computer...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100998/guest@my.umbc.edu/b9eb41315e9af41ec2b20963321b76ce/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 16 Apr 2021 22:05:06 -0400</PostedAt>
<EditAt>Fri, 16 Apr 2021 22:05:06 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100551" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100551">
<Title>talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary.png" rel="nofollow external" class="bo"><img width="1024" height="256" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary-1024x256.png" alt="" style="max-width: 100%; height: auto;"></a><h5><em>The UMBC Cyber Defense Lab presents</em></h5><hr><h2><strong>MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game</strong></h2><hr><h3><strong>Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink<br>UMBC Cyber Defense Lab</strong></h3><h4><strong>joint work with Alan Sherman, Marc Olano, Linda Oliva, Edward Zieglar, and Enis Golazewski</strong></h4><h3><strong>12:00 noon–1 pm ET, Friday, 9 April 2021<br>online via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We present our progress and plans in developing <em>MeetingMayhem</em>, a new web-based educational exercise that helps students learn adversarial thinking in communication networks. The goal of the exercise is to arrange a meeting time and place by sending and receiving messages through an insecure network that is under the control of a malicious adversary.  Players can assume the role of participants or an adversary.  The adversary can disrupt the efforts of the participants by intercepting, modifying, blocking, replaying, and injecting messages.  Through this engaging authentic challenge, students learn the dangers of the network, and in particular, the Dolev-Yao network intruder model. They also learn the value and subtleties of using cryptography (including encryption, digital signatures, and hashing), and protocols to mitigate these dangers.  Our team is developing the exercise in spring 2021 and will evaluate its educational effectiveness.</p><hr><p><em>Akriti Anand </em>(*protected email*) is an MS student in computer science working with Alan Sherman.  She is the lead software engineer and focuses on the web frontend. <em>Richard Baldwin </em>(*protected email*) is a BS student in computer science, a member of Cyberdawgs, and lab manager for the Cyber Defense Lab. <em>Sudha Kosuri </em>(*protected email*) is a MS student in computer science.  She is working on the frontend (using React and Flask) and its integration with the backend. <em>Julie Nau </em>(*protected email*) is a BS student in computer science.  She is working on the backend and on visualizations. <em>Ryan Wunk-Fink </em>(*protected email*) is a PhD student in computer science working with Alan Sherman. He is developing the backend.</p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p><p> Upcoming CDL Meetings: April 23, Peter Peterson (Univ. of Minnesota Duluth), Adversarial thinking; May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/" rel="nofollow external" class="bo">talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game   Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100551/guest@my.umbc.edu/bd9a50f5089d5fb7803fb276e43742af/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 04 Apr 2021 20:20:01 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="100543" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100543">
<Title>UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-scaled.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><em>  Photo by Marlayna Demond ’11 for UMBC</em><hr><p>Congratulation to the UMBC <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyber Dawgs</a> team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s team was one of eight teams out of an initial 23 that qualified for the final competition.  UMBC’s Cyber Dawgs will move on to compete in the National Collegiate Cyber Defense Competition (NCCDC), which will be held April 23-25, 2021.</p><p>The <a href="https://maccdc.org/competition/#regional-final" rel="nofollow external" class="bo">2021 MACCDC regional final</a> took place online April 1-3 and had teams fighting to protect their networks efficiently and effectively from simulated cyber threats and attacks using a scenario based on the COVID-19 global pandemic for its competition events. </p><blockquote> <p>The National Emergency Response Division (N.E.R.D.) is a data science-focused group within the Big Time Health Organization (BTHO), a multinational entity headquartered in Bethesda, Maryland. N.E.R.D. employees have been exceptionally busy dealing with the global health pandemic. As such, they have had to not only shift to work from home, but also expand the number of employees to support the inordinate amounts of data that is flooding each of its eight geographic locations throughout the U.S. Protecting the integrity of the data is critical, but when the data affects the delivery of health services to the public, the job of N.E.R.D. becomes even more mission critical.</p><p>The student teams will stand on the front lines of technology, alongside various healthcare providers. The main task at hand will be to ensure that pandemic-related data from state departments of health are accurate and delivered quickly. Information on outbreak locations, promising interventions, efficacy of testing, mortality rates, and other related statistics are critical so physicians, public health officials, and government entities can make informed decisions about resource allocations. Loss or inaccurate information can lead to tragic consequences. Vigilance is a must – be smart, be strong, be safe.</p></blockquote><p>These regional and national competitions attract leading collegiate cybersecurity teams from across the nation. They put teams in situations that mimic scenarios they might encounter working to secure and protect online systems for government agencies and companies.  Throughout each challenge, teammates work together to protect their systems from hackers and cyber attacks. At the same time, they keep their networks accessible to the users relying on them. </p><p>The UMBC Cyber Dawgs team won the MACCDC regionals last year and were national champions in 2017. In this year’s MACCDC, George Mason placed second and Liberty University third. Good luck to the Cyber Dawgs as they compete with the winners of nine other regional competitions in the <a href="https://www.nationalccdc.org/" rel="nofollow external" class="bo">National Collegiate Cyber Defense Competition</a> later this month.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Photo by Marlayna Demond ’11 for UMBC  Congratulation to the UMBC Cyber Dawgs team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100543/guest@my.umbc.edu/ffe2780cdfd7eea3e6ba57291000831f/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 03 Apr 2021 22:52:33 -0400</PostedAt>
<EditAt>Sat, 03 Apr 2021 22:52:33 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100066" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100066">
<Title>talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning.png" rel="nofollow external" class="bo"><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning-1024x451.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Transparent Dishonesty: Front-Running Attacks on Blockchain</strong></h2><hr><h3><strong>Professor Jeremy Clark<br>Concordia Institute for Information Systems Engineering<br>Concordia University, Montreal, Canada</strong></h3><hr><h3><strong>12–1 pm ET Friday, March 26, 2021<br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchain’s decentralized and transparent nature. I will discuss our “systemization of knowledge” paper which draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out a detailed analysis of Status.im initial coin offering (ICO) and show evidence of abnormal miner’s behavior indicative of front-running token purchases. Finally, we map the proposed solutions to front-running into useful categories.</p><hr><p><a href="https://users.encs.concordia.ca/~clark/" rel="nofollow external" class="bo">Jeremy Clark</a> is an associate professor at the Concordia Institute for Information Systems Engineering. At Concordia, he holds the NSERC/Raymond Chabot Grant Thornton/Catallaxy Industrial Research Chair in Blockchain Technologies. He earned his Ph.D. from the University of Waterloo, where his gold medal dissertation was on designing and deploying secure voting systems including Scantegrity—the first cryptographically verifiable system used in a public sector election. He wrote one of the earliest academic papers on Bitcoin, completed several research projects in the area, and contributed to the first textbook. Beyond research, he has worked with several municipalities on voting technology and testified to both the Canadian Senate and House finance committees on Bitcoin. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings: April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking;<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/" rel="nofollow external" class="bo">talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Transparent Dishonesty: Front-Running Attacks on Blockchain   Professor Jeremy Clark Concordia Institute for Information Systems Engineering Concordia...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100066/guest@my.umbc.edu/d4bc2ab5111c08f1abdbdbda8c5ad757/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Mar 2021 16:56:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99829" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99829">
<Title>talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><hr><h2><strong>EIPC: Efficient Asynchronous BFT with Adaptive Security</strong></h2><hr><h3><strong>Chao Liu, CSEE, UMBC</strong></h3><h3>12:00–1:00 pm ET, Friday, 12 March 2021<br>via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p>We present EPIC, a novel and efficient asynchronous <em><a href="https://www.geeksforgeeks.org/practical-byzantine-fault-tolerancepbft/" rel="nofollow external" class="bo">Byzantine fault-tolerant (BFT)</a></em> protocol with <em>adaptive security</em>. We characterize efficient BFT protocols using adaptive vs. static corruptions corruption models. EPIC takes a new approach to adaptively secure asynchronous BFT. It uses the adaptively secure threshold <em>pseudorandom function (PRF)</em> scheme for coin tossing and uses the Cobalt asynchronous binary agreement (ABA) protocol, which resolves the liveness issue of HoneyBadgerBFT and BEAT. As our new protocol modifies almost all building blocks for asynchronous BFT (including ABA, threshold PRF, and threshold encryption but not Byzantine reliable broadcast (RBC)), evaluating which component dominates the performance bottleneck is a difficult task. We mix and match different building blocks to implement four asynchronous BFT protocols and evaluate their performance. Via a five-continent deployment on Amazon EC2, we show that EPIC is slightly slower for small and medium-sized networks than the most efficient asynchronous BFT protocols with static security. We also find when the number of replicas less than 46, EPIC’s throughput is stable, achieving a peak throughput of 8,000–12,500 tx/sec using t2.medium VMs. When the network size grows larger, EPIC is not as efficient as those with static security, with a throughput of 4,000–6,300 tx/sec.</p><p>BFT state machine replication is the only known software solution for masking arbitrary failures and malicious attacks. BFT has been regarded as the model for building <a href="https://www.investopedia.com/terms/p/permissioned-blockchains.asp" rel="nofollow external" class="bo">permissioned blockchains</a>, where the distributed ledgers (i.e., replicas) know each other’s identities but may not trust each other.</p><p>Asynchronous protocols are inherently more robust against timing and <em>denial-of-service (DoS)</em> attacks. Two recent asynchronous BFT systems—<em>HoneyBadgerBFT</em> proposed by Miller et al. in CCS’16 and <em>BEAT</em> by Duan et al. in CCS’18—have comparable performance as partially synchronous BFT protocols and can scale to 100 replicas. The protocols, however, achieve static security, where the adversary needs to choose the set of corrupted replicas before protocol execution. This security property is weaker than that for many existing BFT protocols (e.g., <em>PBFT</em>), which achieve adaptive security, where the adversary can choose to corrupt replicas at any moment during the execution of the protocol.</p><p>Chao Liu is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests focus on cryptography, cybersecurity, and distributed systems.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings include Mar 26, Jeremy Clark (Concordia); April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking; and May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/" rel="nofollow external" class="bo">talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   EIPC: Efficient Asynchronous BFT with Adaptive Security   Chao Liu, CSEE, UMBC  12:00–1:00 pm ET, Friday, 12 March 2021 via WebEx    We present EPIC, a novel...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99829/guest@my.umbc.edu/84382550ee5147b2c2a3c3aa7b60ce2b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 06 Mar 2021 21:07:51 -0500</PostedAt>
<EditAt>Sat, 06 Mar 2021 21:07:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99477" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99477">
<Title>talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><em>The UMBC Cyber Defense Lab presents</em></h4><h2><strong>Moving Target Mobile IPv6 Defense</strong></h2><h3><strong>Prof.</strong> <strong>Vahid Heydari<br>Computer Science, Rowan University</strong></h3><h4><strong>12:00–1 pm ET, Friday, 26 February 26, 2021</strong></h4><h4>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx  </a></h4><hr><p>Remote cyberattacks can be started from an unlimited distance through the Internet. These attacks include particular actions that allow attackers to compromise systems remotely. Address-based Distributed Denial-of-Service (DDoS) attacks and remote exploits are two main categories of these attacks. A remote exploit takes advantage of a bug or vulnerability to view or steal data or gain unauthorized access to a vulnerable system. Current security solutions in IPv6 such as IPsec, firewall, and Intrusion Detection and Prevention System (IDPS) can prevent remote attacks against known vulnerability exploits. However, zero-day exploits can defeat the best firewalls and IDPSs due to using undisclosed and uncorrected computer application vulnerability. Therefore, a new solution is needed to prevent these attacks. This talk discusses a Moving Target Mobile IPv6 Defense (MTM6D) that randomly and dynamically changes the IP addresses to prevent remote attacks in the reconnaissance step. The talk briefly covers the wide range of applications of MTM6D including critical infrastructure networks, virtual private networks, web servers, Internet-controlled robots, and anti-censorship.</p><p><a href="https://csm.rowan.edu/departments/cs/facultystaff/compsci_full_part/heydari.html" rel="nofollow external" class="bo"> Vahid Heydari</a> received the M.S. degree in Cybersecurity and the Ph.D. degree in Electrical and Computer Engineering from the University of Alabama in Huntsville. He is currently an Associate Professor of Computer Science and the Director of the Center for Cybersecurity Education and Research at Rowan University, Glassboro, NJ. He is also a co-founder of a cybersecurity startup ObtegoCyber. His research interests include moving target defenses, mobile ad-hoc, sensor, and vehicular network security. He is a member of ACM, IEEE Computer Society and Communications Society. </p><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*, </a>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p><p>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security<br>Mar 26, Jeremy Clark (Concordia)<br>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game<br>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/" rel="nofollow external" class="bo">talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Moving Target Mobile IPv6 Defense  Prof. Vahid Heydari Computer Science, Rowan University  12:00–1 pm ET, Friday, 26 February 26, 2021  remotely via WebEx  ...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99477/guest@my.umbc.edu/b263066653caa243e383338d141a32f9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Feb 2021 19:44:51 -0500</PostedAt>
<EditAt>Sun, 21 Feb 2021 19:44:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99277" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99277">
<Title>Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mips2021.png" alt="" style="max-width: 100%; height: auto;"></a><em>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)</em><hr><h2><strong>Three CSEE faculty receive MIPS research awards</strong></h2><hr><p>This post is adapted from a UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a> written by Adriana Fraser.</p><p>Six UMBC faculty members have just received grants from the Maryland Industrial Partnerships (MIPS) program to develop new technologies with potential to grow the state’s economy. This is UMBC’s largest number of winning proposals within a single proposal round since MIPS began in 1987. The program connects University System of Maryland (USM) faculty and students with Maryland businesses. UMBC’s latest MIPS grantees include computer science and electrical engineering faculty <strong><a href="https://www.csee.umbc.edu/people/faculty/tim-oates/" rel="nofollow external" class="bo">Tim Oates</a></strong>, <strong><a href="https://www.csee.umbc.edu/people/faculty/chein-i-chang/" rel="nofollow external" class="bo">Chein-I Chang</a></strong>, and <strong>A</strong><a href="https://www.csee.umbc.edu/people/faculty/anupam-joshi/" rel="nofollow external" class="bo"><strong>nupam Joshi</strong>;</a><a href="https://news.umbc.edu/sensing-an-opportunity-to-improve-wind-energy-maryland-innovation-initiative-and-bwtech-help-umbc-faculty-commercialize-their-research/" rel="nofollow external" class="bo"> <strong>Soobum Lee</strong></a>, mechanical engineering; <a href="https://news.umbc.edu/?s=dipanjan" rel="nofollow external" class="bo"><strong>Dipanjan Pan</strong></a>, chemical, biochemical, and environmental engineering; and <strong><a href="https://imet.usmd.edu/directory/vikram-vakharia" rel="nofollow external" class="bo">Vikram Vakharia</a></strong>, marine biotechnology. Among their industry partners are UMBC alumni entrepreneurs who are building businesses in Maryland.</p><p>Joshi, professor and chair of computer science and electrical engineering, received a MIPS grant for a cybersecurity collaboration with the startup <strong><a href="https://cydeploy.com/" rel="nofollow external" class="bo">CyDeploy</a>.</strong> They are developing a platform that automates the quality assurance process for cybersecurity updates made to IT and “internet of things” (IoT) devices like Amazon Alexa, Google Home, and health and medical devices. CyDeploy CEO <strong><a href="https://tcecure.com/tina-williams-koroma/" rel="nofollow external" class="bo">Tina Williams-Koroma</a></strong> ’02, computer science, presented Joshi with the idea to develop a “cybersecurity-driven change management system.” The technology is based on and leverages the use of artificial intelligence and machine learning to create a cloud-based replica of a company’s systems. </p><p>Williams-Koroma and Joshi’s group at UMBC developed a conceptual prototype. It shows the infrastructure and technology that would make the system feasible, combining off-the-shelf tools with novel research. “Increasingly, the government is now beginning to mandate security requirements around IoT devices. The longer-term vision that CyDeploy has is capturing the state of these systems, virtually recreating them and then running the security changes against virtual versions to see how the changes would affect those systems,” Joshi adds. </p><p>Williams-Koroma, who is also an adjunct instructor at UMBC, projects that the initial development of the platform will be complete in late spring 2021. They anticipate launching a free pilot version for businesses to test their IT systems. IoT pilots will come in a later phase.</p><hr><p>Read more about these awards in the UMBC News article <a href="https://news.umbc.edu/umbc-faculty-alumni-entrepreneurs-receive-record-number-of-mips-awards-for-tech-collaborations/" rel="nofollow external" class="bo">UMBC faculty, alumni entrepreneurs receive record-number of MIPS awards for tech collaborations</a>.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/" rel="nofollow external" class="bo">Six UMBC faculty, incuding three in CSEE, receive MIPS research awards</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Anupam Joshi (left, photo by Marlayna Demond’ 11) and Tina Williams-Koroma, ’02 computer science  (right, photo courtesy of Williams-Koroma)  Three CSEE faculty receive MIPS research awards   This...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/six-umbc-faculty-incuding-three-in-csee-receive-mips-research-awards/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99277/guest@my.umbc.edu/be762a3ecac75c981fea346f57be054f/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 13 Feb 2021 12:27:43 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99052" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99052">
<Title>talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/startups-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>The UMBC Cyber Defense Lab presents</h4><h1><strong>Startup Lessons Learned</strong></h1><h3><strong>Richard Carback (Ph.D. UMBC CS 2010)</strong><br><strong>xx network</strong></h3><h4><strong>12:00–1:00pm ET, Friday,12 February 12 2021<br>WebEx:<a href="https://www.google.com/url?q=https://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw25rwcPisd9EH3SQYAqxmvd" rel="nofollow external" class="bo"> https://umbc.webex.com/meet/sherman</a></strong></h4><hr><p>This talk will explore the technology and lessons learned by UMBC alumnus Richard Carback from his experience co-founding and closing the security startup Lexumo, which provided the only automated service that continuously monitors IoT software platforms for the latest public vulnerabilities. In addition to covering some of the hard problems and Lexumo’s technical approach for monitoring all the world’s open-source software to assist companies in managing their vulnerabilities, Dr. Carback will discuss the mistakes and complexities of getting funded, delivering a product, and finding customers.</p><p><a href="https://www.linkedin.com/in/richard-carback-8157678/" rel="nofollow external" class="bo">Dr. Richard Carback</a> is a UMBC Alumnus (CS Ph.D., 2010) who is an entrepreneur who currently runs a private consultancy for computer security, computer forensics, cryptography, and smart contracts. He is a privacy-preserving systems expert with a background in elections and anonymity networks. While the group leader for the embedded systems security group at Charles Stark Draper Laboratories, he spun out an IoT vulnerability startup called Lexumo that provided the only automated service that continuously monitored IoT software platforms for the latest public vulnerabilities. At UMBC, he worked with Alan Sherman on secure elections and was the primary researcher behind Takoma Park’s deployment of the Scantegrity voting system, the first usage of voter-verifiable end-to-end election technology in a municipal election. email: *protected email*</p><p>Host: Alan T. Sherman, *protected email*. Support for this event was provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/" rel="nofollow external" class="bo">talk: Dr. Richard Carback on Startup Lessons Learned, 12-1 Fri 2/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Startup Lessons Learned  Richard Carback (Ph.D. UMBC CS 2010) xx network  12:00–1:00pm ET, Friday,12 February 12 2021 WebEx:...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-dr-richard-carback-on-startup-lessons-learned-12-1-fri-2-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99052/guest@my.umbc.edu/afa1dc13cc981b15aed9bf7eccba5300/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 21:30:34 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99049" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99049">
<Title>Two UMBC alumnae featured in Cybersecurity podcast</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/podcast-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2>Two UMBC alumnae featured in The CyberWire podcast</h2><hr><p>The CyberWire produced a special podcast, <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo"><strong>In the clear: what it’s like working as a woman in the cleared community</strong>,</a> that features three women working on cybersecurity atNorthrop Grumman. Two are UMBC alumnae, software engineering manager <a href="https://www.linkedin.com/in/laurenmazzoli/" rel="nofollow external" class="bo">Lauren</a> and cyber software engineer <a href="https://www.linkedin.com/in/priyanka-ranade/" rel="nofollow external" class="bo">Priyanka</a>. </p><p>Lauren received a BS in Computer Science in 2015 and an M.S. in Computer Science in 2017.  As an undergraduate student, she worked part-time as an IT Security Analyst tracking, locating, and performing forensics on infected computers located on campus.  She joined Northrop Grumman in 2015 and continued her studies as a part-time graduate student, doing research on investigating different ways of characterizing cybersecurity exploit kits and the malware they produce.</p><p>Priyanka received a BS in Computer Science in 2018 and an MS in Computer Science in 2019. Her MS research was on multilingual text alignment for cybersecurity.  She has been a lecture in the UMBC Computer Science program and the UMD Advanced Cybersecurity Experience for Students (<a href="https://aces.umd.edu/" rel="nofollow external" class="bo">ACES</a>) program. She is currently working on a Computer Science Ph.D. at UMBC focused on how AI can help protect cybersecurity systems from data poisoning attacks.</p><hr><h4><strong>Listen to the 47 minute podcast <a href="https://thecyberwire.com/podcasts/special-edition/39/notes" rel="nofollow external" class="bo">here</a>.</strong></h4></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/" rel="nofollow external" class="bo">Two UMBC alumnae featured in Cybersecurity podcast</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Two UMBC alumnae featured in The CyberWire podcast   The CyberWire produced a special podcast, In the clear: what it’s like working as a woman in the cleared community, that features three women...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/two-umbc-alumnae-featured-in-cybersecurity-podcast/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99049/guest@my.umbc.edu/8cbe836bf34d307b2d78936645d9ea5b/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 07 Feb 2021 20:19:43 -0500</PostedAt>
<EditAt>Sun, 07 Feb 2021 20:19:43 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="98823" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/98823">
<Title>talk: 2021 SFS Research Study: Vulnerabilities in UMBC&#8217;s Incident Management System, 12-1 Jan. 29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2.png" rel="nofollow external" class="bo"><img width="1024" height="432" src="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2-1024x432.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System</strong></h2><h3><strong>Cyrus Bonyadi and Enis Golaszewski</strong><br>CSEE Department, UMBC</h3><h3>12:00noon–1pm Friday, 29 January 2021</h3><h3>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p><strong> </strong>January 11–15, 2020, UMBC scholars in the CyberCorps: Scholarship for Service (SFS) and the DoD Cybersecurity Scholarship (CySP) programs collaboratively analyzed the security of UMBC’s Incident Management System (IMS). Students found numerous serious issues, including race conditions, code-injection, and cross-site scripting attacks, improper API implementation, and denial-of-service attacks. We present findings, recommendations, and details of these vulnerabilities.</p><p>UMBC’s Incident Management System (IMS) is a web application under development by UMBC’s DoIT to supplement their RequestTracker (RT). IMS allows DoIT security staff to supplement the information in RT by linking IMS incidents to RT tickets. IMS incidents store additional information and files regarding existing and potential security campaigns. Using the information in IMS and RT, DoIT generates executive reports, which can influence decisions related to budget, training, and other security concerns. Our study is helping to improve the architecture and implementation of IMS.</p><p>Participants comprised BS, MS, MPS, and Ph.D. students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College (MC) and Prince George’s Community College (PGCC) to complete their four-year degrees at UMBC.</p><p>About the Speakers. <em>Cyrus Jian Bonyadi</em> is a Ph.D. Student at UMBC working on distributed computing consensus theory. He is an alumnus of the varsity CyberDawgs team. email: *protected email*  Enis Golaszewski is a Ph.D. Student at UMBC working on protocol analysis. He is a leading member of the Protocol Analysis Lab under Dr. Sherman. email: *protected email*, </p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm.  All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 12, Richard Carback (xxnetwork), Startup lessons learned</li><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/" rel="nofollow external" class="bo">talk: 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System, 12-1 Jan. 29</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System  Cyrus Bonyadi and Enis Golaszewski CSEE Department, UMBC  12:00noon–1pm Friday, 29 January 2021  remotely via...</Summary>
<Website>https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/98823/guest@my.umbc.edu/e1c770981082bf24494dd3e617b48316/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 29 Jan 2021 09:30:31 -0500</PostedAt>
</NewsItem>

</News>
