<?xml version="1.0"?>
<News hasArchived="true" page="1" pageCount="8" pageSize="10" timestamp="Sun, 26 Apr 2026 02:09:58 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=news">
<NewsItem contentIssues="true" id="129847" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129847">
<Title>2022 NSA Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker.jpeg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker-1024x461.jpeg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>The 2022 NSA Codebreaker Challenge is Underway</strong></h1><p>The annual <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo"><strong>NSA Codebreaker Challenge</strong></a> consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will be ranked according to the total number of points accumulated by their students. Solutions may be submitted at any time for the duration of the Challenge, which will end early in January.</p><p>The initial tasks are divided into two sequences, A and B, which can be solved independently. Later tasks may rely on the results of earlier tasks. While not required, we recommend that you solve tasks in order since they flow with the storyline and may, in fact, be unsolvable without the information recovered from previous tasks.</p><p>Each task in this year’s challenge will require a range of skills. It starts with easy tasks but advances to harder ones, so it’s a great learning experience even if you are just learning about cybersecurity. To solve all of the tasks, you will need to call upon all of your technical expertise, your intuition, and your common sense. </p><p>Getting started is easy.  Go to the <a href="https://nsa-codebreaker.org/challenge" rel="nofollow external" class="bo"><strong>challenge webpage</strong></a>, and create an account using your UMBC email address.  After you’ve verified your email address, you will get an invitation to join the Discord server.  Joining will earn you (and UMBC) your first point!</p><div class="embed-container"><iframe src="https://www.youtube.com/embed/6sC6ozv5M7o" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/" rel="nofollow external" class="bo">2022 NSA Codebreaker Challenge</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2022 NSA Codebreaker Challenge is Underway  The annual NSA Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129847/guest@my.umbc.edu/e54989273e7bb3966650c7f5b3583f88/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Aug 2022 22:18:20 -0400</PostedAt>
<EditAt>Tue, 09 Aug 2022 22:18:20 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="126779" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/126779">
<Title>2022 NSA Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker.jpeg" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/codebreaker-1024x461.jpeg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>The 2022 NSA Codebreaker Challenge is Underway</strong></h1><p>The annual <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo"><strong>NSA Codebreaker Challenge</strong></a> consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will be ranked according to the total number of points accumulated by their students. Solutions may be submitted at any time for the duration of the Challenge, which will end early in January.</p><p>The initial tasks are divided into two sequences, A and B, which can be solved independently. Later tasks may rely on the results of earlier tasks. While not required, we recommend that you solve tasks in order since they flow with the storyline and may, in fact, be unsolvable without the information recovered from previous tasks.</p><p>Each task in this year’s challenge will require a range of skills. It starts with easy tasks but advances to harder ones, so it’s a great learning experience even if you are just learning about cybersecurity. To solve all of the tasks, you will need to call upon all of your technical expertise, your intuition, and your common sense. </p><p>Getting started is easy.  Go to the <a href="https://nsa-codebreaker.org/challenge" rel="nofollow external" class="bo"><strong>challenge webpage</strong></a>, and create an account using your UMBC email address.  After you’ve verified your email address, you will get an invitation to join the Discord server.  Joining will earn you (and UMBC) your first point!</p><div class="embed-container"><iframe src="https://www.youtube.com/embed/6sC6ozv5M7o" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/" rel="nofollow external" class="bo">2022 NSA Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2022 NSA Codebreaker Challenge is Underway  The annual NSA Codebreaker Challenge consists of a series of tasks that are worth a varying amount of points based on their difficulty. Schools will...</Summary>
<Website>https://www.csee.umbc.edu/2022/08/2022-nsa-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126779/guest@my.umbc.edu/3a8cc1e8245b5d94c32bd9a51bb24d33/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 09 Aug 2022 22:18:20 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="112022" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/112022">
<Title>Webinar on NSA Codebreaker challenge and student opportunities, Sept 9</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/09/nsalive.jpeg" rel="nofollow external" class="bo"><img width="1024" height="536" src="https://www.csee.umbc.edu/wp-content/uploads/2021/09/nsalive-1024x536.jpeg" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>NSA Codebreaker challenge and student opportunities</strong> Webinar</h2><hr><h2><strong>4-6 pm EDT Thursday, 9 September 2021, Online</strong></h2><hr><h2><a href="https://icag1.recsolu.com/external/events/83mfIlupzGcOpF6anEwyQw/sign_up" rel="nofollow external" class="bo"><strong>Register Here</strong></a></h2><hr><p>NSA will hold an  NSALive Adobe Webinar on Thursday, September 9, 2021, from 4-6 pm EDT to learn about the National Security Agency and Student Program opportunities, as well as a deep dive into the 2021 Codebreaker Challenge. Register for the online session <a href="https://icag1.recsolu.com/external/events/83mfIlupzGcOpF6anEwyQw/sign_up" rel="nofollow external" class="bo">here</a>.</p><p>The Codebreaker Challenge is the NSA’s annual cybersecurity and cryptanalysis challenge with a realistic, NSA mission-centric scenario open to U.S-based academic institutions. The 2021 challenge is open now and runs through December 31, 2021.</p><p>While the challenge is intended for students, faculty are encouraged to participate as well. Furthermore, the site was designed to make it easy for those faculty interested in incorporating the challenge into their courses (see the additional FAQ entries below.)</p><p>The <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">2021 Codebreaker Challenge</a> consists of a series of tasks worth a varying amount of points based upon their difficulty. Schools will be ranked according to their students’ total number of points with the current ranking shown on a <a href="https://nsa-codebreaker.org/leaderboard" rel="nofollow external" class="bo">leaderboard</a>. Solutions may be submitted at any time for the duration of the Challenge. </p><p>While not required, it is recommended that participants solve tasks in order since they flow with the storyline. Later tasks may rely on artifacts or inputs from earlier tasks. Each task in the 2021 challenge will require a range of skills. You will need to call upon all of your technical expertise, intuition, and common sense.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/09/nsa-codebreaker-challenge-and-student-opportunities/" rel="nofollow external" class="bo">Webinar on NSA Codebreaker challenge and student opportunities, Sept 9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>NSA Codebreaker challenge and student opportunities Webinar   4-6 pm EDT Thursday, 9 September 2021, Online   Register Here   NSA will hold an  NSALive Adobe Webinar on Thursday, September 9,...</Summary>
<Website>https://www.csee.umbc.edu/2021/09/nsa-codebreaker-challenge-and-student-opportunities/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/112022/guest@my.umbc.edu/8e76470c1c9d4181a80a149d6fdf2ebe/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 04 Sep 2021 10:24:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="111960" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/111960">
<Title>UMBC&#8217;s Donna Ruginski and bwtech@UMBC finalists for CAMI&#8217;s Maryland Cybersecurity Awards</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/09/mdcyberaward.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/09/mdcyberaward-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>Donna Ruginski and bwtech@UMBC finalists for CAMI’s Maryland Cybersecurity Awards</strong></h2><hr><p>Congratulations to UMBC’s <a href="https://research.umbc.edu/ruginski/" rel="nofollow external" class="bo">Donna Ruginski</a> and <a href="https://bwtech.umbc.edu/" rel="nofollow external" class="bo">bwtech@UMBC Research and Technology Park</a> for their selection as finalists in the Cybersecurity Association of Maryland’s Fifth Annual <a href="https://www.mdcyber.com/2021_md_cybersecurity_awards_f.php" rel="nofollow external" class="bo">Maryland Cybersecurity Awards</a>. </p><p>Donna Ruginski is a finalist for the Cyber Warrior Woman Award, which honors a woman doing extraordinary or exemplary work in Maryland’s cybersecurity industry.  She is UMBC’s Executive Director for Cybersecurity Initiatives in the Office of the Vice President for Research. She is responsible for the strategic positioning and growth of UMBC’s cybersecurity partnerships, research, and programs.</p><p>The bwtech@UMBC Research and Technology Park is a finalist for the Cybersecurity Industry Resource Award, which celebrates a non-cybersecurity business, organization, academic institution, or government agency that has significantly contributed to Maryland’s cybersecurity industry through its products, services, or mission.</p><p>Finalists were selected by an independent panel of judges represented by leaders in a variety of fields. One winner from each category will be announced at the <a href="https://www.mdcyber.com/md_cybersecurity_awards.php" rel="nofollow external" class="bo">Maryland Cybersecurity Awards Celebration</a> on September 22, 2021, 5 PM – 8 PM at Maryland Live! Casino.</p><p>All finalists are automatically entered into the <strong><a href="https://docs.google.com/forms/d/e/1FAIpQLScHwwhsisSmy46EwJq2XX8yRWhXU9LlVxK-iCmBtCo6sDZ9fQ/viewform" rel="nofollow external" class="bo">People’s Choice Award</a></strong> category. The public is invited to vote online to determine who will receive the coveted Cybersecurity People’s Choice Award. The winner will be announced during the virtual Awards Celebration on September 22, 2021. <strong>Vote for your choice <a href="https://docs.google.com/forms/d/e/1FAIpQLScHwwhsisSmy46EwJq2XX8yRWhXU9LlVxK-iCmBtCo6sDZ9fQ/viewform" rel="nofollow external" class="bo">here</a>. </strong></p><p><a href="https://mdcyber.com/" rel="nofollow external" class="bo">The Cybersecurity Association of Maryland, Inc.</a> (CAMI) is a statewide nonprofit organization established in 2015. It is Maryland’s only organization dedicated 100% to the growth of Maryland’s cybersecurity industry. </p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/09/donna-ruginski-and-bwtechumbc-finalists-for-camis-maryland-cybersecurity-awards/" rel="nofollow external" class="bo">UMBC’s Donna Ruginski and bwtech@UMBC finalists for CAMI’s Maryland Cybersecurity Awards</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Donna Ruginski and bwtech@UMBC finalists for CAMI’s Maryland Cybersecurity Awards   Congratulations to UMBC’s Donna Ruginski and bwtech@UMBC Research and Technology Park for their selection as...</Summary>
<Website>https://www.csee.umbc.edu/2021/09/donna-ruginski-and-bwtechumbc-finalists-for-camis-maryland-cybersecurity-awards/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111960/guest@my.umbc.edu/a5629231e7d546e2d3b4661180a71d9a/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 02 Sep 2021 09:05:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="100998" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100998">
<Title>talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><hr><h4>T<em>he UMBC Cyber Defense Lab presents</em></h4><hr><h2><strong>Thinking Like an Attacker:<br>Towards a Definition and Non-Technical Assessment of Adversarial Thinking</strong></h2><hr><h3><strong>Prof. Peter A. H. Peterson<br>Department of Computer Science<br>University of Minnesota Duluth</strong></h3><hr><h3><strong>12:00–1:00 pm ET,  Friday, 30 April 2021<br>via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p><em>“Adversarial thinking” (AT)</em>, sometimes called the “security mindset” or described as the ability to “think like an attacker,” is widely accepted in the computer security community as an essential ability for successful cybersecurity practice. Supported by intuition and anecdotes, many in the community stress the importance of AT, and multiple projects have produced interventions explicitly intended to strengthen individual AT skills to improve security in general. However, there is no agreed-upon definition of “adversarial thinking” or its components, and accordingly, no test for it. Because of this absence, it is impossible to meaningfully quantify AT in subjects, AT’s importance for cybersecurity practitioners, or the effectiveness of interventions designed to improve AT. Working towards the goal of a characterization of AT in cybersecurity and a non-technical test for AT that anyone can take, I will discuss existing conceptions of AT from the security community, as well as ideas about AT in other fields with adversarial aspects including war, politics, law, critical thinking, and games. I will also describe some of the unique difficulties of creating a non-technical test for AT, compare and contrast this effort to our work on the CATS and Security Misconceptions projects, and describe some potential solutions. I will explore potential uses for such an instrument, including measuring a student’s change in AT over time, measuring the effectiveness of interventions meant to improve AT, comparing AT in different populations (e.g., security professionals vs. software engineers), and identifying individuals from all walks of life with strong AT skills—people who might help meet our world’s pressing need for skilled and insightful security professionals and researchers. Along the way, I will give some sample non-technical adversarial thinking challenges and describe how they might be graded and validated.</p><hr><p><a href="https://www.google.com/url?q=https://www.d.umn.edu/~pahp/&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw2KbY0Y-8OtY454pn3qRo0E" rel="nofollow external" class="bo"> Peter A. H. Peterson</a> is an assistant professor of computer science at the University of Minnesota Duluth, where he teaches and directs the <em>Laboratory for Advanced Research in Systems (LARS)</em>, a group dedicated to research in operating systems and security, with a special focus on research and development to make security education more effective and accessible. He is an active member of the <em>Cybersecurity Assessment Tools (CATS)</em> project working to create and validate two concept inventories for cybersecurity, is working on an NSF-funded grant to identify and remediate commonsense misconceptions about cybersecurity, and is also the author of several hands-on security exercises for Deterlab that have been used at many institutions around the world. He earned his Ph.D. from the University of California, Los Angeles for work on <em>“adaptive compression”</em>—systems that make compression decisions dynamically to improve efficiency. He can be reached at *protected email*.</p><hr><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant </em><em>DGE-1753681</em><em>. </em><em>The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. </em><strong>Upcoming CDL Meetings: </strong>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/" rel="nofollow external" class="bo">talk: Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking, 12-1pm ET 4/30</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Thinking Like an Attacker: Towards a Definition and Non-Technical Assessment of Adversarial Thinking   Prof. Peter A. H. Peterson Department of Computer...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-thinking-like-an-attacker-towards-a-definition-and-non-technical-assessment-of-adversarial-thinking-1-2pm-et-4-23/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100998/guest@my.umbc.edu/b9eb41315e9af41ec2b20963321b76ce/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 16 Apr 2021 22:05:06 -0400</PostedAt>
<EditAt>Fri, 16 Apr 2021 22:05:06 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100551" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100551">
<Title>talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary.png" rel="nofollow external" class="bo"><img width="1024" height="256" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/adversary-1024x256.png" alt="" style="max-width: 100%; height: auto;"></a><h5><em>The UMBC Cyber Defense Lab presents</em></h5><hr><h2><strong>MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game</strong></h2><hr><h3><strong>Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink<br>UMBC Cyber Defense Lab</strong></h3><h4><strong>joint work with Alan Sherman, Marc Olano, Linda Oliva, Edward Zieglar, and Enis Golazewski</strong></h4><h3><strong>12:00 noon–1 pm ET, Friday, 9 April 2021<br>online via <a href="https://www.google.com/url?q=http://umbc.webex.com/meet/sherman&amp;sa=D&amp;source=calendar&amp;usd=2&amp;usg=AOvVaw0NzFbKL9rpMeiZq08wCs5u" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We present our progress and plans in developing <em>MeetingMayhem</em>, a new web-based educational exercise that helps students learn adversarial thinking in communication networks. The goal of the exercise is to arrange a meeting time and place by sending and receiving messages through an insecure network that is under the control of a malicious adversary.  Players can assume the role of participants or an adversary.  The adversary can disrupt the efforts of the participants by intercepting, modifying, blocking, replaying, and injecting messages.  Through this engaging authentic challenge, students learn the dangers of the network, and in particular, the Dolev-Yao network intruder model. They also learn the value and subtleties of using cryptography (including encryption, digital signatures, and hashing), and protocols to mitigate these dangers.  Our team is developing the exercise in spring 2021 and will evaluate its educational effectiveness.</p><hr><p><em>Akriti Anand </em>(*protected email*) is an MS student in computer science working with Alan Sherman.  She is the lead software engineer and focuses on the web frontend. <em>Richard Baldwin </em>(*protected email*) is a BS student in computer science, a member of Cyberdawgs, and lab manager for the Cyber Defense Lab. <em>Sudha Kosuri </em>(*protected email*) is a MS student in computer science.  She is working on the frontend (using React and Flask) and its integration with the backend. <em>Julie Nau </em>(*protected email*) is a BS student in computer science.  She is working on the backend and on visualizations. <em>Ryan Wunk-Fink </em>(*protected email*) is a PhD student in computer science working with Alan Sherman. He is developing the backend.</p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email* </a><em>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.</em></p><p> Upcoming CDL Meetings: April 23, Peter Peterson (Univ. of Minnesota Duluth), Adversarial thinking; May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/" rel="nofollow external" class="bo">talk: MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game, 12-1 ET 4/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   MeetingMayhem:  Teaching Adversarial Thinking through a Web-Based Game   Akriti Anand, Richard Baldwin, Sudha, Kosuri, Julie Nau, and Ryan Wunk-Fink UMBC...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/talk-meetingmayhem-teaching-adversarial-thinking-through-a-web-based-game/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100551/guest@my.umbc.edu/bd9a50f5089d5fb7803fb276e43742af/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 04 Apr 2021 20:20:01 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="100543" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100543">
<Title>UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-scaled.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><em>  Photo by Marlayna Demond ’11 for UMBC</em><hr><p>Congratulation to the UMBC <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyber Dawgs</a> team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s team was one of eight teams out of an initial 23 that qualified for the final competition.  UMBC’s Cyber Dawgs will move on to compete in the National Collegiate Cyber Defense Competition (NCCDC), which will be held April 23-25, 2021.</p><p>The <a href="https://maccdc.org/competition/#regional-final" rel="nofollow external" class="bo">2021 MACCDC regional final</a> took place online April 1-3 and had teams fighting to protect their networks efficiently and effectively from simulated cyber threats and attacks using a scenario based on the COVID-19 global pandemic for its competition events. </p><blockquote> <p>The National Emergency Response Division (N.E.R.D.) is a data science-focused group within the Big Time Health Organization (BTHO), a multinational entity headquartered in Bethesda, Maryland. N.E.R.D. employees have been exceptionally busy dealing with the global health pandemic. As such, they have had to not only shift to work from home, but also expand the number of employees to support the inordinate amounts of data that is flooding each of its eight geographic locations throughout the U.S. Protecting the integrity of the data is critical, but when the data affects the delivery of health services to the public, the job of N.E.R.D. becomes even more mission critical.</p><p>The student teams will stand on the front lines of technology, alongside various healthcare providers. The main task at hand will be to ensure that pandemic-related data from state departments of health are accurate and delivered quickly. Information on outbreak locations, promising interventions, efficacy of testing, mortality rates, and other related statistics are critical so physicians, public health officials, and government entities can make informed decisions about resource allocations. Loss or inaccurate information can lead to tragic consequences. Vigilance is a must – be smart, be strong, be safe.</p></blockquote><p>These regional and national competitions attract leading collegiate cybersecurity teams from across the nation. They put teams in situations that mimic scenarios they might encounter working to secure and protect online systems for government agencies and companies.  Throughout each challenge, teammates work together to protect their systems from hackers and cyber attacks. At the same time, they keep their networks accessible to the users relying on them. </p><p>The UMBC Cyber Dawgs team won the MACCDC regionals last year and were national champions in 2017. In this year’s MACCDC, George Mason placed second and Liberty University third. Good luck to the Cyber Dawgs as they compete with the winners of nine other regional competitions in the <a href="https://www.nationalccdc.org/" rel="nofollow external" class="bo">National Collegiate Cyber Defense Competition</a> later this month.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Photo by Marlayna Demond ’11 for UMBC  Congratulation to the UMBC Cyber Dawgs team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100543/guest@my.umbc.edu/ffe2780cdfd7eea3e6ba57291000831f/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 03 Apr 2021 22:52:33 -0400</PostedAt>
<EditAt>Sat, 03 Apr 2021 22:52:33 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100066" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100066">
<Title>talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning.png" rel="nofollow external" class="bo"><img width="1024" height="451" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/frontrunning-1024x451.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Transparent Dishonesty: Front-Running Attacks on Blockchain</strong></h2><hr><h3><strong>Professor Jeremy Clark<br>Concordia Institute for Information Systems Engineering<br>Concordia University, Montreal, Canada</strong></h3><hr><h3><strong>12–1 pm ET Friday, March 26, 2021<br>online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h3><hr><p>We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchain’s decentralized and transparent nature. I will discuss our “systemization of knowledge” paper which draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain. Additionally, we carry out a detailed analysis of Status.im initial coin offering (ICO) and show evidence of abnormal miner’s behavior indicative of front-running token purchases. Finally, we map the proposed solutions to front-running into useful categories.</p><hr><p><a href="https://users.encs.concordia.ca/~clark/" rel="nofollow external" class="bo">Jeremy Clark</a> is an associate professor at the Concordia Institute for Information Systems Engineering. At Concordia, he holds the NSERC/Raymond Chabot Grant Thornton/Catallaxy Industrial Research Chair in Blockchain Technologies. He earned his Ph.D. from the University of Waterloo, where his gold medal dissertation was on designing and deploying secure voting systems including Scantegrity—the first cryptographically verifiable system used in a public sector election. He wrote one of the earliest academic papers on Bitcoin, completed several research projects in the area, and contributed to the first textbook. Beyond research, he has worked with several municipalities on voting technology and testified to both the Canadian Senate and House finance committees on Bitcoin. email: *protected email*</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings: April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking;<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/" rel="nofollow external" class="bo">talk: Transparent Dishonesty: Front-Running Attacks on Blockchain, 12-1 pm ET 3/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Transparent Dishonesty: Front-Running Attacks on Blockchain   Professor Jeremy Clark Concordia Institute for Information Systems Engineering Concordia...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-transparent-dishonesty-front-running-attacks-on-blockchain-12-1-pm-et-3-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100066/guest@my.umbc.edu/d4bc2ab5111c08f1abdbdbda8c5ad757/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Mar 2021 16:56:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="99829" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99829">
<Title>talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><hr><h2><strong>EIPC: Efficient Asynchronous BFT with Adaptive Security</strong></h2><hr><h3><strong>Chao Liu, CSEE, UMBC</strong></h3><h3>12:00–1:00 pm ET, Friday, 12 March 2021<br>via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p>We present EPIC, a novel and efficient asynchronous <em><a href="https://www.geeksforgeeks.org/practical-byzantine-fault-tolerancepbft/" rel="nofollow external" class="bo">Byzantine fault-tolerant (BFT)</a></em> protocol with <em>adaptive security</em>. We characterize efficient BFT protocols using adaptive vs. static corruptions corruption models. EPIC takes a new approach to adaptively secure asynchronous BFT. It uses the adaptively secure threshold <em>pseudorandom function (PRF)</em> scheme for coin tossing and uses the Cobalt asynchronous binary agreement (ABA) protocol, which resolves the liveness issue of HoneyBadgerBFT and BEAT. As our new protocol modifies almost all building blocks for asynchronous BFT (including ABA, threshold PRF, and threshold encryption but not Byzantine reliable broadcast (RBC)), evaluating which component dominates the performance bottleneck is a difficult task. We mix and match different building blocks to implement four asynchronous BFT protocols and evaluate their performance. Via a five-continent deployment on Amazon EC2, we show that EPIC is slightly slower for small and medium-sized networks than the most efficient asynchronous BFT protocols with static security. We also find when the number of replicas less than 46, EPIC’s throughput is stable, achieving a peak throughput of 8,000–12,500 tx/sec using t2.medium VMs. When the network size grows larger, EPIC is not as efficient as those with static security, with a throughput of 4,000–6,300 tx/sec.</p><p>BFT state machine replication is the only known software solution for masking arbitrary failures and malicious attacks. BFT has been regarded as the model for building <a href="https://www.investopedia.com/terms/p/permissioned-blockchains.asp" rel="nofollow external" class="bo">permissioned blockchains</a>, where the distributed ledgers (i.e., replicas) know each other’s identities but may not trust each other.</p><p>Asynchronous protocols are inherently more robust against timing and <em>denial-of-service (DoS)</em> attacks. Two recent asynchronous BFT systems—<em>HoneyBadgerBFT</em> proposed by Miller et al. in CCS’16 and <em>BEAT</em> by Duan et al. in CCS’18—have comparable performance as partially synchronous BFT protocols and can scale to 100 replicas. The protocols, however, achieve static security, where the adversary needs to choose the set of corrupted replicas before protocol execution. This security property is weaker than that for many existing BFT protocols (e.g., <em>PBFT</em>), which achieve adaptive security, where the adversary can choose to corrupt replicas at any moment during the execution of the protocol.</p><p>Chao Liu is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests focus on cryptography, cybersecurity, and distributed systems.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings include Mar 26, Jeremy Clark (Concordia); April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking; and May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/" rel="nofollow external" class="bo">talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   EIPC: Efficient Asynchronous BFT with Adaptive Security   Chao Liu, CSEE, UMBC  12:00–1:00 pm ET, Friday, 12 March 2021 via WebEx    We present EPIC, a novel...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99829/guest@my.umbc.edu/84382550ee5147b2c2a3c3aa7b60ce2b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 06 Mar 2021 21:07:51 -0500</PostedAt>
<EditAt>Sat, 06 Mar 2021 21:07:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99477" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99477">
<Title>talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/02/mt_tweet-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><em>The UMBC Cyber Defense Lab presents</em></h4><h2><strong>Moving Target Mobile IPv6 Defense</strong></h2><h3><strong>Prof.</strong> <strong>Vahid Heydari<br>Computer Science, Rowan University</strong></h3><h4><strong>12:00–1 pm ET, Friday, 26 February 26, 2021</strong></h4><h4>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx  </a></h4><hr><p>Remote cyberattacks can be started from an unlimited distance through the Internet. These attacks include particular actions that allow attackers to compromise systems remotely. Address-based Distributed Denial-of-Service (DDoS) attacks and remote exploits are two main categories of these attacks. A remote exploit takes advantage of a bug or vulnerability to view or steal data or gain unauthorized access to a vulnerable system. Current security solutions in IPv6 such as IPsec, firewall, and Intrusion Detection and Prevention System (IDPS) can prevent remote attacks against known vulnerability exploits. However, zero-day exploits can defeat the best firewalls and IDPSs due to using undisclosed and uncorrected computer application vulnerability. Therefore, a new solution is needed to prevent these attacks. This talk discusses a Moving Target Mobile IPv6 Defense (MTM6D) that randomly and dynamically changes the IP addresses to prevent remote attacks in the reconnaissance step. The talk briefly covers the wide range of applications of MTM6D including critical infrastructure networks, virtual private networks, web servers, Internet-controlled robots, and anti-censorship.</p><p><a href="https://csm.rowan.edu/departments/cs/facultystaff/compsci_full_part/heydari.html" rel="nofollow external" class="bo"> Vahid Heydari</a> received the M.S. degree in Cybersecurity and the Ph.D. degree in Electrical and Computer Engineering from the University of Alabama in Huntsville. He is currently an Associate Professor of Computer Science and the Director of the Center for Cybersecurity Education and Research at Rowan University, Glassboro, NJ. He is also a co-founder of a cybersecurity startup ObtegoCyber. His research interests include moving target defenses, mobile ad-hoc, sensor, and vehicular network security. He is a member of ACM, IEEE Computer Society and Communications Society. </p><p><strong>Host:</strong> Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*, </a>Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public. Upcoming CDL Meetings:</p><p>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security<br>Mar 26, Jeremy Clark (Concordia)<br>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game<br>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking<br>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/" rel="nofollow external" class="bo">talk: Moving Target Mobile IPv6 Defense, 12-1 Fri 2/26</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Moving Target Mobile IPv6 Defense  Prof. Vahid Heydari Computer Science, Rowan University  12:00–1 pm ET, Friday, 26 February 26, 2021  remotely via WebEx  ...</Summary>
<Website>https://www.csee.umbc.edu/2021/02/talk-moving-target-mobile-ipv6-defense-12-1-fri-2-26/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99477/guest@my.umbc.edu/b263066653caa243e383338d141a32f9/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 21 Feb 2021 19:44:51 -0500</PostedAt>
<EditAt>Sun, 21 Feb 2021 19:44:51 -0500</EditAt>
</NewsItem>

</News>
