<?xml version="1.0"?>
<News hasArchived="true" page="1" pageCount="15" pageSize="10" timestamp="Sun, 19 Apr 2026 17:20:30 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=cybersecurity">
<NewsItem contentIssues="false" id="151702" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/151702">
<Title>Talk: Uncovering Insecure Designs of Cellular Emergency Services</Title>
<Tagline>UMBC Prof. Yiwen Hu, 12-1pm EDT Fri., Sept. 5, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>UMBC Assistant Professor <strong><a href="https://www.csee.umbc.edu/yiwen-hu/" rel="nofollow external" class="bo"><strong>Yiwen Hu</strong></a> </strong>will give a <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a> talk on her research on the security of US 911 services from 12-1pm EST on Friday, September 5 as part of the <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab </a>biweekly Fall series of research talks.</span><div><span><div><br></div><div><div>Emergency communication over cellular networks (4G, 5G, and beyond) is a vital part of our nation’s emergency response and disaster preparedness system. Its security, however, is still far from satisfactory due to cellular-specific technical challenges and the diversified requirements from standards organizations and administrative authorities.</div><div><br></div><div>She will share our research insights and findings on (1) identifying design defects in cellular emergency services standards, and (2) investigating the security of operational emergency services in the U.S., as well as the technical challenges we encountered and how to address them.  Her results show that operational cellular emergency services can be abused in deniable ways. She will also discuss emerging challenges and opportunities for safeguarding next-generation emergency services.</div><div><br></div><div><a href="https://www.csee.umbc.edu/yiwen-hu/" rel="nofollow external" class="bo"><strong>Yiwen Hu</strong></a> is an assistant professor in the CSEE Department at UMBC. She received her Ph.D. in computer science from Michigan State University and her B.S. degree from Zhejiang University, China. Her research interests span wireless communication, network security, mobile systems and applications. Her recent work focuses on safeguarding next-generation emergency services and advancing Vehicle-to-Everything (V2X) communications.</div><div><br></div><div>You can participate in the online seminar via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>WebEx</strong></a>.</div><div><br></div></div></span></div></div>
]]>
</Body>
<Summary>UMBC Assistant Professor Yiwen Hu will give a online talk on her research on the security of US 911 services from 12-1pm EST on Friday, September 5 as part of the UMBC Cyber Defense Lab biweekly...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/151702/guest@my.umbc.edu/6f7892f00be0c5718180a5aff3077081/api/pixel</TrackingUrl>
<Tag>cellular</Tag>
<Tag>cybersecurity</Tag>
<Tag>networks</Tag>
<Tag>orientation</Tag>
<Tag>umbc</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/xxlarge.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/xlarge.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/large.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/medium.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/small.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/xsmall.jpg?1756133828</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/702/6176b2d5a4fb77613b69bf23f96305a3/xxsmall.jpg?1756133828</ThumbnailUrl>
<ThumbnailAltText>headshot of UMBC professor Yiwen Hu</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 25 Aug 2025 11:03:35 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="151456" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/151456">
<Title>UMBC Receives $1M NSF Grant for its SFS Cybersecurity Program</Title>
<Tagline>Three year award will support five new Cyber Scholars</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>The National Science Foundation awarded UMBC a third grant to continue its </span><a href="https://sfs.opm.gov/" rel="nofollow external" class="bo"><span>Scholarship for Service</span></a><em> </em><span>(SFS) cybersecurity scholarship program directed by computer science professors </span><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo"><span>Alan T. Sherman</span></a><span> (PI) and </span><a href="https://robertoyus.com/" rel="nofollow external" class="bo"><span>Roberto Yus</span></a><span> (CoPI). The three-year award will support five new scholars majoring in CS, CE, or IS at the BS, MS, or PhD levels. Each year, scholars receive full tuition and fees and $6000 for professional expenses. In return, they must work for the government for each year of support at the federal, state, local, tribal, or territorial level. Scholars must be US citizens or permanent residents.</span><span>Prospective scholars may apply by noon, September 12, 2025, via </span><a href="https://scholarships.umbc.edu/retriever/" rel="nofollow external" class="bo"><span>Scholarship Retriever</span></a><span>.</span></p><p><span>Sherman (PI) and </span><a href="https://rickf.org/" rel="nofollow external" class="bo"><span>Richard Forno</span></a><span> (CoPI) have directed UMBC’s SFS program since 2012, bringing over 12 million dollars to support cybersecurity at UMBC, including funds for scholarships and research activities of Sherman’s </span><a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><span>Cyber Defense Lab</span></a><span> (CDL). </span><span>UMBC has graduated over 100 SFS scholars, placing UMBC fifth in the nation for the number of SFS graduates. UMBC SFS scholars engage actively in research and hands-on learning. For example, each January, SFS scholars participate in a collaborative research project to analyze the security of some aspect of the UMBC network. In 2025, the scholars analyzed the security and privacy of a prototype of the new myUMBC search that integrates ChatGPT. Each summer, SFS scholars carry out an internship with the government.</span></p><p><span>Reflecting the growing importance of artificial intelligence and changing government funding priorities, new SFS scholars will be required to complete at least four AI courses in addition to completing a cybersecurity track. Previous innovations of UMBC’s SFS program included connecting scholars to local companies and government research labs, and extending SFS scholarships to two partner community colleges: Montgomery College and Prince George’s Community College.</span></p><p><span>At CDL, SFS scholars contribute to impactful research on several aspects of cybersecurity, including election security, formal-methods analysis of cryptographic protocols, and cybersecurity education. Recently, Sherman and his team have completed a security analysis of the </span><a href="https://securedna.org/" rel="nofollow external" class="bo"><span>SecureDNA</span></a><span> system, which enables DNA synthesis labs to screen order requests against a database of known hazards. Sherman is a coauthor on a paper to be presented this fall at </span><span><a href="https://e-vote-id-2025.inria.fr/" rel="nofollow external" class="bo">E-Vote-ID</a></span><span> on a coercion-resistant voting system. In 2023, Sherman won best research paper at the SIGSCE conference for his paper on the psychometric validation of a cybersecurity concept inventory</span><span> Drs. Sherman and former SFS scholar Golaszewski are organizing the </span><a href="https://ssresearch26.umbc.edu/" rel="nofollow external" class="bo"><span>2026 Security Standardisation Research</span></a><span> conference, which will take place in Baltimore.</span></p><br></span></div>
]]>
</Body>
<Summary>The National Science Foundation awarded UMBC a third grant to continue its Scholarship for Service (SFS) cybersecurity scholarship program directed by computer science professors Alan T. Sherman...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/151456/guest@my.umbc.edu/3c010c99800ba5ea93337425d6ecceee/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>nsf</Tag>
<Tag>scholarship</Tag>
<Tag>service</Tag>
<Tag>sfs</Tag>
<Tag>umbc</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/xxlarge.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/xlarge.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/large.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/medium.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/small.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/xsmall.jpg?1755014648</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/151/456/3c5b0d3609348c13227351185895673d/xxsmall.jpg?1755014648</ThumbnailUrl>
<ThumbnailAltText>UMBC Cyberscholars</ThumbnailAltText>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 12 Aug 2025 12:25:31 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="150255" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/150255">
<Title>Governments continue losing efforts to gain backdoor access to secure communications</Title>
<Tagline>Richard Forno discusses the complex &amp; conflicting issues</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>CSEE professor <a href="https://coeit.umbc.edu/deans-office-team/person/ma34575/" rel="nofollow external" class="bo">Richard Forno</a> writes about the conflicting interests highlighted by reports that prominent American national security officials used freely available encrypted messaging apps Signal and WhatsApp, which prevent anyone, including the government and the app companies, from reading messages they intercept. He </span><span>explores the complex technical, political, and social issues underlying the topic. You can read the article online on the  </span><a href="https://umbc.edu/stories/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications/" rel="nofollow external" class="bo">UMBC Magazine</a> site and <span><a href="https://theconversation.com/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications-253016" rel="nofollow external" class="bo">The Conversation</a>.</span></p><p><br></p></span></div>
]]>
</Body>
<Summary>CSEE professor Richard Forno writes about the conflicting interests highlighted by reports that prominent American national security officials used freely available encrypted messaging apps Signal...</Summary>
<Website>https://umbc.edu/stories/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/150255/guest@my.umbc.edu/fc95054da5552ebb8ad40dd35b753dee/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>encryption</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xxlarge.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xlarge.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/large.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/medium.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/small.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xsmall.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xxsmall.jpg?1747488272</ThumbnailUrl>
<ThumbnailAltText>Some apps, including Signal</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 17 May 2025 09:41:02 -0400</PostedAt>
<EditAt>Sat, 17 May 2025 09:46:57 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="149952" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/149952">
<Title>DoIT Student Digital Stories: Graduating senior William Brooks</Title>
<Tagline>Navigating Cybersecurity: Insights from a CS Major</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.youtube.com/watch?v=LN36dQ3Qti8" rel="nofollow external" class="bo"><img src="https://cybersecurity.umbc.edu/wp-content/uploads/sites/10/2025/05/brooks.jpg" alt="William Brooks at his workstation" style="max-width: 100%; height: auto;"></a></div><div><br></div>UMBC DoIT has a <a href="https://my3.my.umbc.edu/groups/doit/posts/149723" rel="nofollow external" class="bo"><strong>post</strong></a> featuring graduating computer science major senior William Brooks, who has been working<span> in DoIT's Cybersecurity Assurance and Digital Trust group. William describes </span><span>his cybersecurity journey as a computer science major following the cybersecurity track and a philosophy minor, and offers advice to future students.</span><div><span><br></span></div><div><span>Watch a video of an interview with William <a href="https://www.youtube.com/watch?v=LN36dQ3Qti8" rel="nofollow external" class="bo"><strong>here</strong></a>.</span></div></div>
]]>
</Body>
<Summary>UMBC DoIT has a post featuring graduating computer science major senior William Brooks, who has been working in DoIT's Cybersecurity Assurance and Digital Trust group. William describes his...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/149952/guest@my.umbc.edu/3ce7c941c26f92fe74a5044a1a8a2bef/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>doit</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 09 May 2025 10:15:18 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="149810" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/149810">
<Title>Talk: Charles Nicholas on Issues in Document Security, May 9</Title>
<Tagline>12-1pm EDT Friday, May 9, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h5>The UMBC Cyber Defense Lab</h5><div><br></div><h3>Issues in Document Security</h3><h4>Charles Nicholas, UMBC</h4><div><strong>Joint work with Robert Joyce, Ran Liu, Edward Raff, Maksim Eren, Rick Forno, and Cynthia Matuszek</strong></div><div><br></div><h5>12–1pm Friday, May 9, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>online</strong></a></h5><div><br></div><div>When hitherto separate areas of science intersect, research opportunities tend to pop up. So it is with the fields of Document Engineering and Cybersecurity. We present a summary of recent and ongoing work in our lab, including dealing with malicious PDF files, the construction of useful data sets, the use of tensor decomposition, and ongoing work in clustering, symbolic computation, and AI-generated code. We will point out certain themes in our work, as well as certain outstanding problems.</div><div><br></div><div><a href="https://news.cs.umbc.edu/people/faculty/charles-nicholas/" rel="nofollow external" class="bo">Charles Nicholas</a> has been a faculty member at UMBC since 1988. He received the B.S. degree from the University of Michigan-Flint and the M.S. and Ph.D. degrees from The Ohio State University, all in computer science. He has served five times as General Chair of the Conference on Information and Knowledge Management, and twice as Chair of the ACM Symposium on Principles of Document Processing. He served as chair of the Department of Computer Science and Electrical Engineering from 2003 to 2010. </div><div><br></div><div>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. </div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab     Issues in Document Security  Charles Nicholas, UMBC  Joint work with Robert Joyce, Ran Liu, Edward Raff, Maksim Eren, Rick Forno, and Cynthia Matuszek     12–1pm...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/149810/guest@my.umbc.edu/0251bf559adfdb887e4b638b2eff1631/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>documents</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/xxlarge.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/xlarge.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/large.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/medium.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/small.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/xsmall.jpg?1746470812</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/149/810/49ea1e20fbc940e3714605d193a42d41/xxsmall.jpg?1746470812</ThumbnailUrl>
<ThumbnailAltText>Locked folder with documents</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 05 May 2025 14:49:06 -0400</PostedAt>
<EditAt>Tue, 06 May 2025 10:30:51 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="149758" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/149758">
<Title>Graduating Computer Science senior Ethan Cheung</Title>
<Tagline>Journey to Cybersecurity: From DoIT to MITRE</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span><img src="https://cybersecurity.umbc.edu/wp-content/uploads/sites/10/2025/05/ethan_cheung.jpg" alt="image for UMBC student Ethan Cheung" style="max-width: 100%; height: auto;"></span></p><p><span>UMBC’s Department of Information Technology (DoIT) has a </span><a href="https://doit.umbc.edu/post/149721/" rel="nofollow external" class="bo">post</a><span> and </span><a href="https://www.youtube.com/watch?v=TLHz6qgqCOI" rel="nofollow external" class="bo">video</a><span> on graduating computer science senior Ethan Cheung. For several years, he worked as an intern as part of DoIT's Cybersecurity Assurance and Digital Trust team. After graduation, he will take on a new role as a cybersecurity engineer at MITRE, applying the skills and knowledge he acquired at UMBC to real-world scenarios and contributing to the protection of critical data and infrastructure.  </span></p><p><span>Find out more in this </span><a href="https://my3.my.umbc.edu/groups/doit/posts/149721" rel="nofollow external" class="bo"><span>news article</span></a><span> and a </span><a href="https://www.youtube.com/watch?v=TLHz6qgqCOI" rel="nofollow external" class="bo"><span>video</span></a><span> of Ethan discussing his experiences at UMBC and working on cybersecurity for DoIT.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>UMBC’s Department of Information Technology (DoIT) has a post and video on graduating computer science senior Ethan Cheung. For several years, he worked as an intern as part of DoIT's...</Summary>
<Website>https://doit.umbc.edu/post/149721/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/149758/guest@my.umbc.edu/f75b015da863465e7de3e94a40533da2/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>doit</Tag>
<Tag>mitre</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 03 May 2025 10:29:20 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="148899" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148899">
<Title>talk: Adaptive Domain Inference Attack with Concept Hierarchy 4/11</Title>
<Tagline>12-1pm EDT Friday, April 11, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><strong><span>Adaptive Domain Inference Attack with Concept Hierarchy</span></strong></h3><div><h4><strong><span><a href="https://www.csee.umbc.edu/keke-chen/" rel="nofollow external" class="bo">Professor Keke Chen</a>, CSEE, </span><span><span>UMBC</span></span></strong></h4><h5><span>12–1pm </span><span>Fri.,</span><span> April 11<span>, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></span></span></h5><p><span> </span><span>Joint work with</span><span> <a href="https://yue-chun.com/" rel="nofollow external" class="bo">Yuechun Gu</a> and </span><span><span><a href="https://www.linkedin.com/in/jiajie-he-672673243/" rel="nofollow external" class="bo">Jiajie He</a></span></span></p><p><span>To appear, 2015 Int. Conf. on Knowledge Discovery and Data Mining</span></p><p><span>With increasingly deployed deep neural networks in sensitive application domains, such as healthcare and security, it is essential to understand what kind of sensitive information can be inferred from these models. Most known model-targeted attacks assume attackers have learned the application domain or training data distribution to ensure successful attacks. Can removing the domain information from model APIs protect models from these attacks? Our work studies this critical problem. Unfortunately, even with minimal knowledge, i.e., accessing the model as an unnamed function without leaking the meaning of input and output, the proposed adaptive <em>domain inference (ADI)</em> attack can still successfully estimate relevant subsets of training data. We show that the extracted relevant data can significantly improve the performance of model-inversion attacks, for instance. Specifically, the ADI method uses the <em>concept hierarchy</em> extracted from the public and private datasets that the attacker can access, and it applies a novel algorithm to adaptively tune the likelihood of leaf concepts in the hierarchy showing up in the unseen training data. For comparison, we also designed a straightforward hypothesis-testing-based attack called LDI. Among all candidate methods, the ADI attack extracts partial training data at the concept level, converges fastest, and requires the fewest target-model accesses.</span></p><p><span><strong><a href="https://www.csee.umbc.edu/keke-chen/" rel="nofollow external" class="bo">Dr. Keke Chen</a></strong></span><span> is an associate professor in the UMBC CSEE Department. His recent research focuses on privacy and security issues with AI model training and deployment. He earned his PhD in computer science from Georgia Tech in 2006. Before joining UMBC, he was a Northwestern Mutual associate professor of computer science at Marquette University. </span></p><p><em><span>Support for this event was provided in part by the NSF under SFS grant </span></em><em><span>DGE-1753681<span>.</span></span></em></p></div></div>
]]>
</Body>
<Summary>Adaptive Domain Inference Attack with Concept Hierarchy   Professor Keke Chen, CSEE, UMBC  12–1pm Fri., April 11, 2025 online   Joint work with Yuechun Gu and Jiajie He  To appear, 2015 Int. Conf....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148899/guest@my.umbc.edu/fe284a5648baf79678c69dec470ddc03/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>inference</Tag>
<Tag>ontology</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/xxlarge.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/xlarge.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/large.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/medium.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/small.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/xsmall.jpg?1744224742</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/899/f18caf116a1b8c339e57e98733a9f42a/xxsmall.jpg?1744224742</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 09 Apr 2025 14:54:25 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="148281" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148281">
<Title>TowerCares donation supports UMBC Cyber Scholars program</Title>
<Tagline>Gift of $300,000 for a new cybersecurity scholarship fund</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span>Cyber threats, ransomware, and data breaches have become daily realities in our increasingly digital world. Despite the surge in cyberattacks and cybercrime, Maryland faces over 24,000 unfilled cybersecurity positions, while nationwide, that number exceeds 457,000, according to CyberSeek.</span><br><br><span>To address the urgent cybersecurity workforce shortage, the <a href="https://www.towercaresfoundation.org/" rel="nofollow external" class="bo"><strong>TowerCares Foundation</strong></a>, the philanthropic arm of <a href="https://www.towerfcu.org/" rel="nofollow external" class="bo"><strong>Tower Federal Credit Union</strong></a>, has commited $300,000 to the UMBC Cybersecurity Institute. The groundbreaking partnership will create a new scholarship fund within the <strong><a href="https://cybersecurity.umbc.edu/cyberscholars/" rel="nofollow external" class="bo">UMBC Cyber Scholars Program</a>,</strong> which is dedicated to equipping students with the skills needed for careers in cybersecurity, artificial intelligence, and data science.</span><div><br></div><div>Read more about the TowerCares Foundation's generous gift in their <strong><a href="https://www.towerfcu.org/advice-planning/financial-wellness/march-2025/towercares-makes-%24300000-commitment-to-umbc-cybersecurity-institute" rel="nofollow external" class="bo">announcement</a>.</strong></div><div><strong><br></strong></div>
    
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Cyber threats, ransomware, and data breaches have become daily realities in our increasingly digital world. Despite the surge in cyberattacks and cybercrime, Maryland faces over 24,000 unfilled...</Summary>
<Website>https://www.towerfcu.org/advice-planning/financial-wellness/march-2025/towercares-makes-$300000-commitment-to-umbc-cybersecurity-institute</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148281/guest@my.umbc.edu/8baa3f9fb51135cf94b7624b5f11ca47/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>scholarship</Tag>
<Tag>towercares</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 25 Mar 2025 12:12:43 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="147949" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147949">
<Title>Talk: Assessing DOGE's Impact on Federal Cybersecurity and Data, 3/14</Title>
<Tagline>12&#8211;1pm EDT Friday, March 14, 2025, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h3><span>Assessing DOGE's Impact on Federal Cybersecurity and Data</span></h3><h4><span>Dr. Richard Forno</span></h4><h4><span>Assistant Director, UMBC Cybersecurity Institute</span></h4><h5><span>12–1pm Friday, March 14, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a> </span></h5><br><p><span>In just its first month of operation, that has disrupted large portions of the federal government, the activities of the so-called Department of Government Efficiency (DOGE) have worried cybersecurity, national security, and information technology experts both inside and outside the federal government. Armed with root-level access and presidential authorization---yet often lacking relevant operational expertise or any meaningful oversight---DOGE’s staff, activities, and the security culture of the current administration in which they operate often seem to violate many time-tested best practices and principles for effective cybersecurity and technology management. They may also violate longstanding federal guidelines and regulations. As such, it is likely that DOGE is creating conditions that can cause operational, cybersecurity, or privacy incidents across the federal IT landscape and subsequently placing government information systems and sensitive citizen data at risk. On the CIA (confidentiality-integrity-availability) triad, this talk will examine DOGE's activities in the context of cybersecurity and technology best practices. Is DOGE truly an “insider threat” to the federal government as some claim? And if so, what countermeasures, if any, are available to address the threat?</span></p><p><span><a href="https://rickf.org/" rel="nofollow external" class="bo"><strong>Dr. Richard Forno</strong></a> is a teaching professor in the UMBC Department of Computer Science and Electrical Engineering, where he directs the UMBC Graduate Cybersecurity Program, serves as the Assistant Director of UMBC's Cybersecurity Institute, and is an Affiliate Scholar at the Stanford Law School's Center for Internet and Society (CIS). Prior to academia, his twenty-year career includes helping build a formal cybersecurity program for the US House of Representatives, serving as the first Chief Security Officer for Network Solutions (then, the global center of Internet DNS), and other assorted roles with the government, military/defense entities, and private sector. In 2023, he was named a Distinguished Visiting Professor at the Universidad Autónoma del Estado de Hidalgo in Pachuca, Mexico. Along with regular public analysis and commentary, his most recent book is Cybersecurity for Local Governments (Wiley, 2022), coauthored with UMBC Public Policy colleagues Professor Emeritus Don Norris and Ph.D. candidate Laura Mateczun.</span></p></span><div><span><span>Support for this event was provided in part by NSF grant </span></span><span><span>DGE-1753681<span>.</span></span></span></div><div><span><span><span><br></span></span></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Assessing DOGE's Impact on Federal Cybersecurity and Data  Dr. Richard Forno  Assistant Director, UMBC Cybersecurity Institute  12–1pm Friday, March 14, 2025, online    In just its first month of...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147949/guest@my.umbc.edu/e1a6d8a845d2924dc9ce387c3b74091d/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>doge</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xxlarge.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xlarge.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/large.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/medium.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/small.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xsmall.jpg?1741466400</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/949/42e88593817c563bb75b6b4686ba46b2/xxsmall.jpg?1741466400</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>2</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 08 Mar 2025 15:46:37 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:12:43 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="147367" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147367">
<Title>Talk: Formal Methods or Usable Security: Why Not Both?</Title>
<Tagline>McKenna McCall, 11:45 ET, Monday, Feb 17, ITE325</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><span>Formal Methods or Usable Security: Why Not Both?</span></h3><h4><span><strong>McKenna McCall, CMU</strong></span></h4><h4><span><strong>11:45-12:45 Monday, Feb 17, UMBC ITE 325 and <a href="https://my3.my.umbc.edu/groups/csee/events/140127/join_meeting" rel="nofollow external" class="bo">online</a></strong></span></h4><p><span><br></span></p><p><span>Formal methods research involves using mathematical techniques to specify and verify properties of software and hardware systems. In security and privacy research, formal methods can lead to strong, provable security guarantees—and typically leave questions about how humans might interact with these systems unanswered. Indeed, formal methods and usable security are traditionally distinct areas of research. In this talk, I will demonstrate how techniques from both research areas can be applied—or even combined—to create solutions that are simultaneously mathematically rigorous and usable. In one project, we revisit static analysis tools for home IoT users from a usable security lens and investigate the usability and utility of the workflow involved in using the tools. Later in the talk, I will describe a project with a formal methods focus where we propose a new technique for preventing undesirable information flows on the web. We argue that this approach is usable in more realistic scenarios than what is proposed by prior work—without sacrificing security.</span></p><p><span><a href="https://www.andrew.cmu.edu/user/mckennak/" rel="nofollow external" class="bo"><strong>McKenna McCall</strong></a> is a postdoctoral researcher in the Software and Societal Systems Department at Carnegie Mellon University supervised by Lorrie Cranor and Lujo Bauer. She received her PhD from Carnegie Mellon University in 2023, advised by Limin Jia. McKenna’s research spans fields from information flow control and programming languages to security and privacy for home IoT and confidential computing. She is particularly interested in research where formal methods and usable security intersect, and combines techniques from both research areas to produce results that incorporate mathematical rigor as well as usability.</span></p><div><span><br></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Formal Methods or Usable Security: Why Not Both?  McKenna McCall, CMU  11:45-12:45 Monday, Feb 17, UMBC ITE 325 and online     Formal methods research involves using mathematical techniques to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147367/guest@my.umbc.edu/b9d28ddf5b42e211bedf3d7df3706e07/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>iot</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/large.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/medium.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/small.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xsmall.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxsmall.jpg?1739714164</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 16 Feb 2025 09:19:02 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:13:30 -0400</EditAt>
</NewsItem>

</News>
