<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Mon, 20 Apr 2026 09:19:32 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=llm">
<NewsItem contentIssues="true" id="146826" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146826">
<Title>Talk: Do LLMs Exhibit Cybersecurity Misconceptions? 1/31 online</Title>
<Tagline>Evaluation of LLMs on CCI and CCA examinations</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h4>Do LLMs Show Cybersecurity Misconceptions?<br></h4><h5>Evaluation of LLMs Performance on Cybersecurity Concept Inventories</h5><h5>Shan Huang, UIUC</h5><div><strong>Joint work with Jeffrey Herman and Alan Sherman, et al.</strong></div><div><strong>12:00–1pm ET Friday, Jan. 31, 2025, <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></strong> </div><div><br></div><div>We evaluated the performance of five LLMs (Llama a, GPT-3.5-turbo, GPT-4, GPT-4O, and GPT-O1) on two cybersecurity concept inventories: <a href="https://dl.acm.org/doi/fullHtml/10.1145/3451346" rel="nofollow external" class="bo"><strong>Cybersecurity Concept Inventory</strong></a> (CCI) and <strong><a href="https://dl.acm.org/doi/10.1145/3545945.3569762" rel="nofollow external" class="bo">Cybersecurity Curriculum Assessment</a> </strong>(CCA). Using a zero-shot setting to minimize external influencing factors, we compared the performance of these LLMs with that of students previously studied, and we conducted a qualitative analysis of GPT-O1's output to examine if it exhibits misconceptions. Quantitative analysis reveals that, for the CCI and CCA, GPT-O1 significantly outperformed other models and students, correctly answering 92% of CCI and 72% of CCA test items. These results indicate GPT-O1’s strong proficiency in foundational topics (CCI) but reveal its limitations in addressing these concepts in more technically advanced scenarios (CCA). Qualitative analysis of GPT-O1’s reasoning patterns uncovered instances of insightful reasoning but also highlighted ways in which GPT-O1's answers reflect persistent student mistakes, such as biases, overgeneralizations, and logical inconsistencies. This work highlights the significant potential of GPT-O1 as a tool for introductory cybersecurity education in its ability to provide detailed explanations and structured reasoning for novice learners.</div><div><br></div><div><strong><a href="https://www.linkedin.com/in/shan-huang-262041193/" rel="nofollow external" class="bo">Shan Huang</a> </strong>is a Ph.D. candidate in Computer Science at the University of Illinois Urbana-Champaign. She is broadly interested in how educational games can improve student learning. Current work includes improving student learning in cybersecurity with educational games and accessing student knowledge of cybersecurity concepts. Shan is also involved in various educational data mining projects.</div><div><br></div><hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Do LLMs Show Cybersecurity Misconceptions?   Evaluation of LLMs Performance on Cybersecurity Concept Inventories  Shan Huang, UIUC  Joint work with Jeffrey Herman and Alan Sherman, et al....</Summary>
<Website>https://cybersecurity.umbc.edu/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146826/guest@my.umbc.edu/34eff5855f2e469c84e2d84660d9f67c/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cca</Tag>
<Tag>cci</Tag>
<Tag>cybersecurity</Tag>
<Tag>llm</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xxlarge.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xlarge.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/large.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/medium.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/small.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xsmall.jpg?1738158075</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/826/e6632845d26b56a6caf99baab2f84036/xxsmall.jpg?1738158075</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 29 Jan 2025 08:42:49 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="146467" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/146467">
<Title>CodeBot'25 Workshop: Can We Trust AI-Generated Code?</Title>
<Tagline>Workshop Feb. 25-26, 2025 in Columbia, MD and online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><div><h3><strong>Can We Trust AI-Generated Code?</strong></h3></div><h5><strong>Workshop sponsored by UMBC &amp; Army Research Laboratory</strong></h5><h5><span>Feb. 25-26, 2025 </span><span>UMBC Training Centers, Columbia, MD &amp; online<br><br><p>
    position paper deadline extended to 1/20/2025</p></span></h5>The era of generative AI is upon us, and chatbots such as chatGPT are being used by programmers at all levels of experience to produce code.  Some generative AI systems, such as <a href="https://cloud.google.com/gemini/docs/codeassist/overview" rel="nofollow external" class="bo"><strong>Gemini Code Assist</strong></a>, specialize in code generation.  Unfortunately, AI-generated code often contains errors in the form of functionality that fails to meet specifications or vulnerabilities that can be exploited by hackers.  People have been working on program verification and secure coding for sixty years, but even so, the skill needed to find such errors is possessed by only a fraction of software engineers, and these skills are not being passed on to student programmers as they should be.<br><br>The goal of this FREE workshop is to gather and produce actionable ideas and suggestions that may be of use to the IT profession.  The workshop will consist of invited speakers, panels, and open discussion. </div><div><br></div><div><strong>We invite would-be participants to submit short position papers offering comments, observations, experiences, and suggestions that pertain to any or all of the following workshop themes:</strong><br><ol><li>What is or could be done to make AI-generated code more trustworthy, from the perspective of functionality and/or cybersecurity?</li><li>How can we do better at instilling the ideas and tools of secure development into the software profession?</li><li>Being able to produce quality code, with or without the aid of AI, seems to be related to system skills in general. How can we do better at giving students these skills before (or as) they enter the workplace?</li></ol>Position papers should limited to three pages and submitted according to this <a href="https://docs.google.com/document/d/11nr-Zy2MPObMYihN2x_v2jS7EcUkOLXm/edit?usp=sharing&amp;ouid=117342243438066964240&amp;rtpof=true&amp;sd=true" rel="nofollow external" class="bo"><strong>template</strong></a>.  Submit your position paper via email to <a href="mailto:codebot25@umbc.edu" rel="nofollow external" class="bo"><strong>codebot25@umbc.edu</strong></a> after <strong><a href="https://forms.gle/CipmPbbBVBLfHc728" rel="nofollow external" class="bo">registering</a> </strong>for the workshop.</div><div><br></div><div>The organizing committee will select several papers for live presentation at the workshop. Selection will be based on relevance to the workshop themes, technical merit, and perceived interest to the audience.  Position papers that are mere marketing pieces will not be considered, but descriptions of hardware and software solutions tying into the themes described above are welcome. Limited travel support may be available for non-local speakers. Position papers and summaries of the discussions that follow will make up the core of the workshop report.<br><br>UMBC students, both graduate or undergraduate, are welcome to submit position papers that describe their own personal experience and observations with AI-generated code in their own words.  Students may include their resumes with position papers if they wish to have their work/resume circulated to other attendees.  Domestic and international students are welcome to participate in this workshop.<br><br><strong>Important Dates:</strong><br></div><div>  <strong>Position paper submission deadline: January 20, 2025</strong></div><div>  Notice of acceptance: January 31, 2025<br>  Registration deadline: February 18, 2025<br>    (no registration fee, but space is limited)<br>  Workshop dates: February 25-26, 2025<br><br>The workshop will take place at <strong><a href="https://www.umbctraining.com/" rel="nofollow external" class="bo">UMBC Training Centers</a></strong>, 6996 Columbia Gateway Dr #100, Columbia, MD 21046</div><div><br></div><div><strong>REGISTER </strong>@ <a href="https://forms.gle/CipmPbbBVBLfHc728" rel="nofollow external" class="bo"><strong>https://forms.gle/CipmPbbBVBLfHc728</strong></a><br><br><strong>In-person space is limited, so register early! Based on RSVPs received, the organizing committee reserves the right to be selective in whom it selects to join the in-person meeting.</strong></div><div><br>Instructions for virtual participation will be made available prior to the workshop.<br><br><strong>Organizing Committee:</strong><br>  Prajna Bhandary, UMBC<br>  Mike De Lucia, Army Research Laboratory<br>  Richard Forno, UMBC<br>  Lindsay Gaughan, UMBC Training Centers<br>  Cynthia Matuszek, UMBC<br>  Charles Nicholas, UMBC<br>  Steve Simske, Colorado State University<br>  Larry Wagoner, Dept. of Defense<br>  Linda Kidder Yarlott, UMBC<br>  Paul Yu, Army Research Laboratory<br><br></div><div>Questions? Send email to <a href="mailto:codebot25@umbc.edu" rel="nofollow external" class="bo"><strong>codebot25@umbc.edu</strong></a></div>
    <br></div>
]]>
</Body>
<Summary>Can We Trust AI-Generated Code?   Workshop sponsored by UMBC &amp; Army Research Laboratory  Feb. 25-26, 2025 UMBC Training Centers, Columbia, MD &amp; online    position paper deadline extended...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/146467/guest@my.umbc.edu/3963cf670aae6c0ef88607f359dd9477/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>assistant</Tag>
<Tag>codebot</Tag>
<Tag>coding</Tag>
<Tag>genai</Tag>
<Tag>llm</Tag>
<Tag>workshop</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xxlarge.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xlarge.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/large.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/medium.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/small.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xsmall.jpg?1736288331</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/146/467/e786a1f9c39521096c70fd762406108e/xxsmall.jpg?1736288331</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 07 Jan 2025 17:22:27 -0500</PostedAt>
</NewsItem>

</News>
