<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Mon, 20 Apr 2026 13:14:02 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=privacy">
<NewsItem contentIssues="false" id="150255" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/150255">
<Title>Governments continue losing efforts to gain backdoor access to secure communications</Title>
<Tagline>Richard Forno discusses the complex &amp; conflicting issues</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>CSEE professor <a href="https://coeit.umbc.edu/deans-office-team/person/ma34575/" rel="nofollow external" class="bo">Richard Forno</a> writes about the conflicting interests highlighted by reports that prominent American national security officials used freely available encrypted messaging apps Signal and WhatsApp, which prevent anyone, including the government and the app companies, from reading messages they intercept. He </span><span>explores the complex technical, political, and social issues underlying the topic. You can read the article online on the  </span><a href="https://umbc.edu/stories/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications/" rel="nofollow external" class="bo">UMBC Magazine</a> site and <span><a href="https://theconversation.com/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications-253016" rel="nofollow external" class="bo">The Conversation</a>.</span></p><p><br></p></span></div>
]]>
</Body>
<Summary>CSEE professor Richard Forno writes about the conflicting interests highlighted by reports that prominent American national security officials used freely available encrypted messaging apps Signal...</Summary>
<Website>https://umbc.edu/stories/governments-continue-losing-efforts-to-gain-backdoor-access-to-secure-communications/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/150255/guest@my.umbc.edu/fc95054da5552ebb8ad40dd35b753dee/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>encryption</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xxlarge.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xlarge.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/large.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/medium.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/small.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xsmall.jpg?1747488272</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/150/255/8aaa2dc139138f35653d9965cbf960bb/xxsmall.jpg?1747488272</ThumbnailUrl>
<ThumbnailAltText>Some apps, including Signal</ThumbnailAltText>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 17 May 2025 09:41:02 -0400</PostedAt>
<EditAt>Sat, 17 May 2025 09:46:57 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="148342" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/148342">
<Title>Talk: A Privacy and Security Analysis of myUMBC Answers, 3/28</Title>
<Tagline>12-1pm ET Friday, March 28, 2025 online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025</h3><div><br></div><h4><a href="https://damslabumbc.github.io/author/christian-badolato/" rel="nofollow external" class="bo">Christian Badolato<br></a>12–1pm Friday, March 28, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></h4><div><br></div><div><a href="https://en.wikipedia.org/wiki/Generative_artificial_intelligence" rel="nofollow external" class="bo"><strong>Generative AI</strong></a> has the potential to improve user search experiences by supporting natural language querying and providing more detailed and domain-specific responses. UMBC is seeking to provide this convenience to myUMBC users through the <a href="https://my3.my.umbc.edu/groups/doit/posts/147188" rel="nofollow external" class="bo"><strong>myUMBC Answers</strong></a> system, which enables users to access both personal and UMBC services information from the myUMBC search bar. In this talk, we investigate the resiliency of Answers against several common generative AI attacks that were performed by the UMBC Scholarship for Service (SFS) scholars in collaboration with other students and the UMBC Division of Information Technology (DoIT). We first provide an overview of the study and the myUMBC Answers system before discussing the types of attacks which were launched against the system. We then explore the behavior of the Answers system in response to these attacks. Finally, we outline the recommendations provided to DoIT by the study participants to improve the security and user experience of myUMBC Answers.</div><div><br></div><div><a href="null" rel="nofollow external" class="bo"><strong>Christian Badolato</strong></a> is a PhD student working with Professor <a href="https://robertoyus.com/" rel="nofollow external" class="bo"><strong>Roberto Yus</strong></a> focusing on data privacy in the Internet of Things at UMBC after having received his master’s degree from the same university. He has several years of experience as a software architect and is a Certified Information Systems Security Professional.</div><div><br></div><div>Support for this <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cyber Defense Lab</strong></a> event was provided in part by NSF under SFS grant DGE-1753681.</div><div><br></div></div>
]]>
</Body>
<Summary>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025     Christian Badolato 12–1pm Friday, March 28, 2025 online     Generative AI has the potential to improve...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/148342/guest@my.umbc.edu/4d1af12d45ef4b1f267e575d72a7ef4b/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Tag>umbc</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>The UMBC Cyber Defense Lab</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxlarge.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xlarge.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/large.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/medium.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/small.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xsmall.jpg?1743014997</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxsmall.jpg?1743014997</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 26 Mar 2025 13:47:00 -0400</PostedAt>
<EditAt>Wed, 26 Mar 2025 15:24:07 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="147367" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147367">
<Title>Talk: Formal Methods or Usable Security: Why Not Both?</Title>
<Tagline>McKenna McCall, 11:45 ET, Monday, Feb 17, ITE325</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><h3><span>Formal Methods or Usable Security: Why Not Both?</span></h3><h4><span><strong>McKenna McCall, CMU</strong></span></h4><h4><span><strong>11:45-12:45 Monday, Feb 17, UMBC ITE 325 and <a href="https://my3.my.umbc.edu/groups/csee/events/140127/join_meeting" rel="nofollow external" class="bo">online</a></strong></span></h4><p><span><br></span></p><p><span>Formal methods research involves using mathematical techniques to specify and verify properties of software and hardware systems. In security and privacy research, formal methods can lead to strong, provable security guarantees—and typically leave questions about how humans might interact with these systems unanswered. Indeed, formal methods and usable security are traditionally distinct areas of research. In this talk, I will demonstrate how techniques from both research areas can be applied—or even combined—to create solutions that are simultaneously mathematically rigorous and usable. In one project, we revisit static analysis tools for home IoT users from a usable security lens and investigate the usability and utility of the workflow involved in using the tools. Later in the talk, I will describe a project with a formal methods focus where we propose a new technique for preventing undesirable information flows on the web. We argue that this approach is usable in more realistic scenarios than what is proposed by prior work—without sacrificing security.</span></p><p><span><a href="https://www.andrew.cmu.edu/user/mckennak/" rel="nofollow external" class="bo"><strong>McKenna McCall</strong></a> is a postdoctoral researcher in the Software and Societal Systems Department at Carnegie Mellon University supervised by Lorrie Cranor and Lujo Bauer. She received her PhD from Carnegie Mellon University in 2023, advised by Limin Jia. McKenna’s research spans fields from information flow control and programming languages to security and privacy for home IoT and confidential computing. She is particularly interested in research where formal methods and usable security intersect, and combines techniques from both research areas to produce results that incorporate mathematical rigor as well as usability.</span></p><div><span><br></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>Formal Methods or Usable Security: Why Not Both?  McKenna McCall, CMU  11:45-12:45 Monday, Feb 17, UMBC ITE 325 and online     Formal methods research involves using mathematical techniques to...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147367/guest@my.umbc.edu/b9d28ddf5b42e211bedf3d7df3706e07/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>iot</Tag>
<Tag>privacy</Tag>
<Tag>security</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xlarge.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/large.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/medium.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/small.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xsmall.jpg?1739714164</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxsmall.jpg?1739714164</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 16 Feb 2025 09:19:02 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:13:30 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="147334" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/147334">
<Title>Talk: Unveiling Privacy Risks in AI: Data, Models, and Systems</Title>
<Tagline>11:30-12:30 &#8203;Friday, February 14 in ITE325b and online&#8203;</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><div><span><strong><a href="https://www.cs.purdue.edu/homes/an93/" rel="nofollow external" class="bo">​Shengwei An</a> </strong>will give a talk on </span><strong>Unveiling Privacy Risks in AI: Data, Models, &amp; Systems</strong>, 11:30-12:30 <span>​Friday, February 14 in </span>ITE325b and <a href="https://my3.my.umbc.edu/groups/csee/events/140124/join_meeting" rel="nofollow external" class="bo">online</a><span>​.</span></div><div><br></div>Artificial Intelligence has become deeply integrated into diverse systems, transforming industries and reshaping our daily lives. However, this widespread adoption also introduces critical privacy risks across the training data, AI models, and AI-powered systems. This talk will explore privacy challenges through these three aspects. First, I will introduce the first high-fidelity attack that exposes the privacy vulnerabilities of training data in pre-trained models and commercial AI services. Next, I will present a novel physical impersonating attack that highlights the privacy risks inherent in AI-based authentication systems. Additionally, I will discuss the first data-free framework designed to eliminate trigger-based model watermarks in diffusion models that aim to protect their intellectual property. Finally, I will conclude with a forward-looking perspective on addressing privacy risks in emerging generative AI techniques, such as Large Language Models and Stable Diffusion Models.<div><br><div><div><span><p><a href="https://www.cs.purdue.edu/homes/an93/" rel="nofollow external" class="bo"> Shengwei An</a> is a Ph.D. candidate in the Department of Computer Science at Purdue University, advised by Prof. Xiangyu Zhang. His research focuses on AI security and privacy, with an emphasis on designing state-of-the-art tools to investigate and mitigate privacy vulnerabilities in real-world AI systems. His work has been published in top-tier conferences, including S&amp;P, USENIX Security, NDSS, and AAAI. He is the recipient of the Ross Fellowship from Purdue University and the Best Paper Award in the ECCV 2022 AROW Workshop.<br></p><p><br></p></span></div></div></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
</Body>
<Summary>​Shengwei An will give a talk on Unveiling Privacy Risks in AI: Data, Models, &amp; Systems, 11:30-12:30 ​Friday, February 14 in ITE325b and online​.    Artificial Intelligence has become deeply...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/147334/guest@my.umbc.edu/843715b46ccd321b4da77b4ef49ddaa4/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>privacy</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Cybersecurity Institute</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 14 Feb 2025 09:36:43 -0500</PostedAt>
<EditAt>Thu, 13 Mar 2025 17:14:24 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="145965" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/145965">
<Title>Talk: Privacy-Preserving Data Sharing in Intrusion Detection Systems, 12/6 online</Title>
<Tagline>12&#8211;1pm EST Friday, December 6, 2024, online</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><span><h5><span><strong>UMBC Cyber Defense Lab presents</strong></span><span> </span></h5><h4><span>Privacy-Preserving Data Sharing in Intrusion Detection Systems</span></h4><h5><span><strong>Zhiyuan Chen<br></strong></span><span><strong>Professor and Chair, UMBC Information Systems Department</strong></span></h5><h5><strong><span>12:00–1pm, Friday, December 6, 2024, </span><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><span>online</span></a></strong></h5><div><br></div><p><span>Intrusion detection systems increasingly use machine learning methods, which require large volumes of data to be effective. Sharing such data sets will benefit the research community and industry. One obstacle to sharing such data is data privacy because network trace data or server log data often contains sensitive information, such as IP addresses. Even if IP addresses are encrypted, adversaries may still inject packets with unique patterns (e.g., with a certain packet sizes) such that they can use these packets to infer encrypted information. Another challenge arises when multiple intrusion detection systems from multiple organizations need to correlate their detected alerts to identify a larger threat, but the information they exchange may contain sensitive information such as network topology and traffic. This talk covers two approaches to address this problem. First, we propose a data anonymization approach that de-identifies network trace data. Compared to existing approaches, this approach provides stronger privacy protection and is robust to injection attacks. Second, we propose two privacy-preserving distributed alert correlation methods, one using additive secret sharing and the other using differential privacy. We also investigate tradeoffs between these two methods.</span></p><p><a href="https://userpages.umbc.edu/~zhchen/" rel="nofollow external" class="bo"><span><strong>Dr. Zhiyuan Chen</strong></span></a><span> is a Professor in the Department of Information Systems at UMBC. He received a BS and a MS from Fudan University, China, and a PhD in Computer Science from Cornell University. His research covers the areas of data science, big data, privacy preserving data mining and data management, data exploration and navigation, and semantic-based search and data integration using semantic networks, adversarial learning and its applications in cybersecurity. He has published extensively in these areas and has received funding from NSF, Department of Energy, IBM, Office of Naval Research, MITRE, and Department of Education.</span></p><p><span>Host: <a href="https://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a>. Support for this event was provided in part by NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public.</span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab presents   Privacy-Preserving Data Sharing in Intrusion Detection Systems  Zhiyuan Chen Professor and Chair, UMBC Information Systems Department  12:00–1pm, Friday, December...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/145965/guest@my.umbc.edu/e0574ed2de8fc798b31101e61e796b54/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>cybersecurity</Tag>
<Tag>privacy</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xxlarge.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xlarge.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/large.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/medium.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/small.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xsmall.jpg?1732912896</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/145/965/b9e9567763877786d428f0d3f7731e97/xxsmall.jpg?1732912896</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 29 Nov 2024 17:28:15 -0500</PostedAt>
</NewsItem>

</News>
