<?xml version="1.0"?>
<News hasArchived="true" page="1" pageCount="3" pageSize="10" timestamp="Mon, 20 Apr 2026 09:19:36 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=research">
<NewsItem contentIssues="true" id="129848" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129848">
<Title>Profs. Sherman and Oliva receive NSF award to study cybersecurity education&#160;</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>Professors Sherman and Oliva receive NSF award to study cybersecurity education</strong></h1><p>UMBC Professors <strong><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a></strong> (PI, CSEE) and <strong><a href="https://education.umbc.edu/faculty-list/linda-oliva/" rel="nofollow external" class="bo">Linda Oliva</a></strong> (CO-PI,  Education)  recently received more than $260,000 of a $500,000 grant from the National Science Foundation (NSF) to study and improve how cybersecurity is taught at the U.S. Naval Academy and U.S. Military Academy. </p><p>The project, <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2138921" rel="nofollow external" class="bo">Examining Pedagogy in Cybersecurity</a> (EPIC), is collaborative with the University of Illinois Urbana-Champaign and the University of Minnesota Duluth and is funded through NSF’s Secure and Trustworthy Computing (SaTC) program. Because the academies teach cybersecurity to all first-year students, EPIC offers a large-scale opportunity to investigate how simulation-based teaching and learning affects different student populations.</p><p>In the first phase of the research, Sherman and his collaborators—including computer science Ph.D. student <strong>Andrew Slack</strong>—will study how instructors at the academies structure and teach their cybersecurity courses. In the second phase, they will introduce active simulation-based learning exercises and pedagogies and assess their effectiveness. </p><p>UMBC’s championship-winning Cyberdawgs cyberdefense team will help adapt and improve learning materials. As one quantitative measure of the new pedagogy’s effectiveness, EPIC will assess students’ conceptual understanding using the <a href="https://par.nsf.gov/servlets/purl/10290864" rel="nofollow external" class="bo">Cybersecurity Concept Inventory</a> (CCI) developed by Sherman and his team. </p><p>Some material adapted from this <a href="https://umbc.edu/stories/umbc-advances-maryland-through-innovative-computing-partnership/" rel="nofollow external" class="bo">UMBC News article</a></p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/" rel="nofollow external" class="bo">Profs. Sherman and Oliva receive NSF award to study cybersecurity education </a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professors Sherman and Oliva receive NSF award to study cybersecurity education  UMBC Professors Alan T. Sherman (PI, CSEE) and Linda Oliva (CO-PI,  Education)  recently received more than...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129848/guest@my.umbc.edu/f7400269abb245d7d2f4112e2bfc65d8/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 05 Aug 2022 11:13:23 -0400</PostedAt>
<EditAt>Fri, 05 Aug 2022 11:13:23 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="126718" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/126718">
<Title>Profs. Sherman and Oliva receive NSF award to study cybersecurity education&#160;</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" rel="nofollow external" class="bo"><img width="1024" height="460" src="https://www.csee.umbc.edu/wp-content/uploads/2022/08/cyber_class.jpg" alt="" style="max-width: 100%; height: auto;"></a><h1><strong>Professors Sherman and Oliva receive NSF award to study cybersecurity education</strong></h1><p>UMBC Professors <strong><a href="https://cybersecurity.umbc.edu/alan-sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a></strong> (PI, CSEE) and <strong><a href="https://education.umbc.edu/faculty-list/linda-oliva/" rel="nofollow external" class="bo">Linda Oliva</a></strong> (CO-PI,  Education)  recently received more than $260,000 of a $500,000 grant from the National Science Foundation (NSF) to study and improve how cybersecurity is taught at the U.S. Naval Academy and U.S. Military Academy. </p><p>The project, <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2138921" rel="nofollow external" class="bo">Examining Pedagogy in Cybersecurity</a> (EPIC), is collaborative with the University of Illinois Urbana-Champaign and the University of Minnesota Duluth and is funded through NSF’s Secure and Trustworthy Computing (SaTC) program. Because the academies teach cybersecurity to all first-year students, EPIC offers a large-scale opportunity to investigate how simulation-based teaching and learning affects different student populations.</p><p>In the first phase of the research, Sherman and his collaborators—including computer science Ph.D. student <strong>Andrew Slack</strong>—will study how instructors at the academies structure and teach their cybersecurity courses. In the second phase, they will introduce active simulation-based learning exercises and pedagogies and assess their effectiveness. </p><p>UMBC’s championship-winning Cyberdawgs cyberdefense team will help adapt and improve learning materials. As one quantitative measure of the new pedagogy’s effectiveness, EPIC will assess students’ conceptual understanding using the <a href="https://par.nsf.gov/servlets/purl/10290864" rel="nofollow external" class="bo">Cybersecurity Concept Inventory</a> (CCI) developed by Sherman and his team. </p><p>Some material adapted from this <a href="https://umbc.edu/stories/umbc-advances-maryland-through-innovative-computing-partnership/" rel="nofollow external" class="bo">UMBC News article</a></p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/" rel="nofollow external" class="bo">Profs. Sherman and Oliva receive NSF award to study cybersecurity education </a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professors Sherman and Oliva receive NSF award to study cybersecurity education  UMBC Professors Alan T. Sherman (PI, CSEE) and Linda Oliva (CO-PI,  Education)  recently received more than...</Summary>
<Website>https://www.csee.umbc.edu/2022/08/prof-sherman-receives-nsf-award-to-study-cybersecurity-education/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/126718/guest@my.umbc.edu/60eadf7f8eb894e9cf410645e5da7d57/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 05 Aug 2022 11:13:23 -0400</PostedAt>
<EditAt>Fri, 05 Aug 2022 11:13:23 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="129849" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129849">
<Title>UMBC faculty Karimi and Yus help team win 2nd place in Sandpit Challenge on Digital Trust</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/05/incs_coe.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/05/incs_coe-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>A research team that includes UMBC CSEE faculty <a href="https://www.csee.umbc.edu/~nkarimi/" rel="nofollow external" class="bo">Naghmeh Karimi</a> and <a href="https://robertoyus.com/" rel="nofollow external" class="bo">Roberto Yus</a> won the second place prize in the 2022 INCS-CoE Sandpit Challenge on Digital Trust. The <a href="https://incs-coe.org/" rel="nofollow external" class="bo">International Cyber Security Center of Excellence (INCS-CoE)</a> is an international collaboration of government, industry, and academic organizations that have partnered to explore pioneering efforts to address cybersecurity challenges created by a growing borderless digital society.  UMBC is a charter member of INCS-CoE.</p><p><br>The INCS-COE <a href="https://incs-coe.org/international-digital-trust-forum-at-northeastern-university/" rel="nofollow external" class="bo">Sandpit Challenge</a> invited self-assembled teams to compete for seed research funding prizes to pursue their work further. The UMBC faculty teamed up with researchers from <a href="https://www.royalholloway.ac.uk/" rel="nofollow external" class="bo">Royal Holloway</a> (UK) and <a href="https://www.keio.ac.jp/en/" rel="nofollow external" class="bo">Keio University</a> (Japan). They were awarded second prize for their proposal to deal with challenges associated with developing an International Digital Trust Framework. In particular, their project proposal focused on designing an ontology-based interoperability solution amongst the US, UK, and Japan for mutual recognition of trust, capturing private and public sector use cases with different assurance levels.</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/05/umbc-faculty-karimi-and-yus-help-team-win-2nd-place-in-sandpit-challenge-on-digital-trust/" rel="nofollow external" class="bo">UMBC faculty Karimi and Yus help team win 2nd place in Sandpit Challenge on Digital Trust</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>A research team that includes UMBC CSEE faculty Naghmeh Karimi and Roberto Yus won the second place prize in the 2022 INCS-CoE Sandpit Challenge on Digital Trust. The International Cyber Security...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/05/umbc-faculty-karimi-and-yus-help-team-win-2nd-place-in-sandpit-challenge-on-digital-trust/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129849/guest@my.umbc.edu/054141cebdddea3f80c53202e6f2fcca/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 11 May 2022 15:58:56 -0400</PostedAt>
<EditAt>Wed, 11 May 2022 15:58:56 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="119374" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/119374">
<Title>UMBC faculty Karimi and Yus help team win 2nd place in Sandpit Challenge on Digital Trust</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/05/incs_coe.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/05/incs_coe-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>A research team that includes UMBC CSEE faculty <a href="https://www.csee.umbc.edu/~nkarimi/" rel="nofollow external" class="bo">Naghmeh Karimi</a> and <a href="https://robertoyus.com/" rel="nofollow external" class="bo">Roberto Yus</a> won the second place prize in the 2022 INCS-CoE Sandpit Challenge on Digital Trust. The <a href="https://incs-coe.org/" rel="nofollow external" class="bo">International Cyber Security Center of Excellence (INCS-CoE)</a> is an international collaboration of government, industry, and academic organizations that have partnered to explore pioneering efforts to address cybersecurity challenges created by a growing borderless digital society.  UMBC is a charter member of INCS-CoE.</p><p><br>The INCS-COE <a href="https://incs-coe.org/international-digital-trust-forum-at-northeastern-university/" rel="nofollow external" class="bo">Sandpit Challenge</a> invited self-assembled teams to compete for seed research funding prizes to pursue their work further. The UMBC faculty teamed up with researchers from <a href="https://www.royalholloway.ac.uk/" rel="nofollow external" class="bo">Royal Holloway</a> (UK) and <a href="https://www.keio.ac.jp/en/" rel="nofollow external" class="bo">Keio University</a> (Japan). They were awarded second prize for their proposal to deal with challenges associated with developing an International Digital Trust Framework. In particular, their project proposal focused on designing an ontology-based interoperability solution amongst the US, UK, and Japan for mutual recognition of trust, capturing private and public sector use cases with different assurance levels.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/05/umbc-faculty-karimi-and-yus-help-team-win-2nd-place-in-sandpit-challenge-on-digital-trust/" rel="nofollow external" class="bo">UMBC faculty Karimi and Yus help team win 2nd place in Sandpit Challenge on Digital Trust</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>A research team that includes UMBC CSEE faculty Naghmeh Karimi and Roberto Yus won the second place prize in the 2022 INCS-CoE Sandpit Challenge on Digital Trust. The International Cyber Security...</Summary>
<Website>https://www.csee.umbc.edu/2022/05/umbc-faculty-karimi-and-yus-help-team-win-2nd-place-in-sandpit-challenge-on-digital-trust/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/119374/guest@my.umbc.edu/eb26bcdf880a3fe5213800c1a4319984/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>faculty-and-staff</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Wed, 11 May 2022 15:58:56 -0400</PostedAt>
<EditAt>Wed, 11 May 2022 15:58:56 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="129852" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129852">
<Title>talk: Model Validation for DARPA DPRIVE</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/Two-Six-Technologies-Home-Cybersecurity@2x.jpeg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/Two-Six-Technologies-Home-Cybersecurity@2x-1024x512.jpeg" alt="" style="max-width: 100%; height: auto;"></a><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Model Validation for DARPA DPRIVE</strong></h2><h2><strong>Ian Blumenfeld<br>UMBC and Two Six Technologies</strong></h2><h4>(joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew Torrence, and Jared Ziegler)</h4><h2><strong>12–1 pm ET, Friday 6 May 2022, via <a rel="nofollow external" class="bo">WebEx</a></strong><br></h2><p>Commodity hardware description languages (HDLs) like VHDL and Verilog present a challenge from a high assurance point of view because they lack formalized semantics: when a team of hardware engineers produces a circuit design in a commodity HDL and claims that it correctly implements a pseudocode algorithm, on what basis can that claim be evaluated? A formalized model of the circuit design may be painstakingly created (e.g., in the logic of a theorem prover), but how are the accuracy and faithfulness of that model then established? The distance between the widely adopted commodity HDLs and formal models of hardware has been a well-recognized and persistent impediment to driving formal methods into hardware development.</p><p>This talk presents a technique developed at Two Six Technologies, called model validation, that formally connects hardware design and its formal model via a functional, high-level synthesis language called ReWire. Model validation introduces a “model” program to bridge the gap between the hardware design and algorithm by establishing 1) the equivalence of the algorithm to the model and 2) the equivalence of the model to the circuit design. Equivalence between the algorithm and the ReWire model is verified with a ReWire semantics formalized in Isabelle. Equivalence between the ReWire model and the circuit design is established by producing binary circuits from each (using commodity synthesis tools and the ReWire compiler rwc) and then applying an automated binary equivalence checker.</p><p>This talk describes our experience applying model validation as part of the DARPA Data Protection in Virtual Environments (DPRIVE) program. DPRIVE aims to develop a novel hardware accelerator to ease computational challenges preventing widespread use of fully homomorphic encryption (FHE) that began with Gentry’s discovery and was improved upon in the PROCEED program. To this end, DPRIVE’s purpose is to design hardware accelerators to improve upon the existing algorithmic gains to FHE. Model validation through ReWire moves formal methods into the practical world, empowering hardware designers to reason about the correctness, safety, and security properties of their designs. In addition, we expect our pipeline to protect hardware supply chains by allowing for a full formal analysis of RTL implementations before tape out.</p><p><a href="https://www.linkedin.com/in/ian-blumenfeld-2bb68793/" rel="nofollow external" class="bo">Ian Blumenfeld</a> is the Research Director for Mathematics at Two Six Technologies.  In that role, he is a principal investigator on multiple DARPA programs, spanning the areas of formal methods, modern cryptography, and applied category theory.  Prior to his work at Two Six, Ian was a formal verification engineer at Apple, where he verified cryptographic properties of the iPhone secure enclave processor.  Ian has worked in roles in and around the federal research space for more than a decade, including five years as an applied research mathematician at the National Security Agency.  Ian is currently enrolled as a part-time Ph.D. student in the UMBC computer science department, working with Dr. Alan Sherman and Dr. Don Engel. Email: <a href="mailto:itblumenfeld@umbc.edu" rel="nofollow external" class="bo">itblumenfeld@umbc.edu</a></p><p>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu" rel="nofollow external" class="bo">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL Meeting: May 13, Enka Blanchard (Digitrust Loria, France)</p></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/talk-model-validation-for-darpa-dprive/" rel="nofollow external" class="bo">talk: Model Validation for DARPA DPRIVE</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Model Validation for DARPA DPRIVE  Ian Blumenfeld UMBC and Two Six Technologies  (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/talk-model-validation-for-darpa-dprive/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129852/guest@my.umbc.edu/7704c7d104dc778066f2ef8af899762e/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 28 Apr 2022 09:57:22 -0400</PostedAt>
<EditAt>Thu, 28 Apr 2022 09:57:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118993" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118993">
<Title>talk: Model Validation for DARPA DPRIVE</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/*protected%20email*" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/*protected%20email*" alt="" style="max-width: 100%; height: auto;"></a><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><h2><strong>Model Validation for DARPA DPRIVE</strong></h2><h2><strong>Ian Blumenfeld<br>UMBC and Two Six Technologies</strong></h2><h4>(joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew Torrence, and Jared Ziegler)</h4><h2><strong>12–1 pm ET, Friday 6 May 2022, via <a rel="nofollow external" class="bo">WebEx</a></strong><br></h2><p>Commodity hardware description languages (HDLs) like VHDL and Verilog present a challenge from a high assurance point of view because they lack formalized semantics: when a team of hardware engineers produces a circuit design in a commodity HDL and claims that it correctly implements a pseudocode algorithm, on what basis can that claim be evaluated? A formalized model of the circuit design may be painstakingly created (e.g., in the logic of a theorem prover), but how are the accuracy and faithfulness of that model then established? The distance between the widely adopted commodity HDLs and formal models of hardware has been a well-recognized and persistent impediment to driving formal methods into hardware development.</p><p>This talk presents a technique developed at Two Six Technologies, called model validation, that formally connects hardware design and its formal model via a functional, high-level synthesis language called ReWire. Model validation introduces a “model” program to bridge the gap between the hardware design and algorithm by establishing 1) the equivalence of the algorithm to the model and 2) the equivalence of the model to the circuit design. Equivalence between the algorithm and the ReWire model is verified with a ReWire semantics formalized in Isabelle. Equivalence between the ReWire model and the circuit design is established by producing binary circuits from each (using commodity synthesis tools and the ReWire compiler rwc) and then applying an automated binary equivalence checker.</p><p>This talk describes our experience applying model validation as part of the DARPA Data Protection in Virtual Environments (DPRIVE) program. DPRIVE aims to develop a novel hardware accelerator to ease computational challenges preventing widespread use of fully homomorphic encryption (FHE) that began with Gentry’s discovery and was improved upon in the PROCEED program. To this end, DPRIVE’s purpose is to design hardware accelerators to improve upon the existing algorithmic gains to FHE. Model validation through ReWire moves formal methods into the practical world, empowering hardware designers to reason about the correctness, safety, and security properties of their designs. In addition, we expect our pipeline to protect hardware supply chains by allowing for a full formal analysis of RTL implementations before tape out.</p><p><a href="https://www.linkedin.com/in/ian-blumenfeld-2bb68793/" rel="nofollow external" class="bo">Ian Blumenfeld</a> is the Research Director for Mathematics at Two Six Technologies.  In that role, he is a principal investigator on multiple DARPA programs, spanning the areas of formal methods, modern cryptography, and applied category theory.  Prior to his work at Two Six, Ian was a formal verification engineer at Apple, where he verified cryptographic properties of the iPhone secure enclave processor.  Ian has worked in roles in and around the federal research space for more than a decade, including five years as an applied research mathematician at the National Security Agency.  Ian is currently enrolled as a part-time Ph.D. student in the UMBC computer science department, working with Dr. Alan Sherman and Dr. Don Engel. Email: *protected email*</p><p>Host: Alan T. Sherman, *protected email*. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL Meeting: May 13, Enka Blanchard (Digitrust Loria, France)</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/talk-model-validation-for-darpa-dprive/" rel="nofollow external" class="bo">talk: Model Validation for DARPA DPRIVE</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Model Validation for DARPA DPRIVE  Ian Blumenfeld UMBC and Two Six Technologies  (joint work with Eric Bond, William Harrison, Chris Hathhorn, Paul Li, Matthew...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/talk-model-validation-for-darpa-dprive/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118993/guest@my.umbc.edu/a7bd1c976eabecaca996cf3cbe7c7efc/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 28 Apr 2022 09:57:22 -0400</PostedAt>
<EditAt>Thu, 28 Apr 2022 09:57:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="117336" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/117336">
<Title>talk: Ted Selker on Voting Technology, 12-1, Fri 3/4</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/03/vote.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/03/vote-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><h4>The UMBC Cyber Defense Lab presents</h4><h1><strong>Voting Technology</strong></h1><h2><strong>Ted Selker</strong></h2><h3>Research Professor<br>UMBC CSEE Department</h3><h3>12–1 ET Friday, 4 March 2022 via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><p>Traditionally most votes are lost in registration, voting ballot design problems, and polling place operations, causing long lines and possibly mail-in ballot fraud. This talk will describe voting-process problems and technological problems, and some possible solutions for voting improvement. Voting disenfranchisement is much higher for people with perceptual, physical, and cognitive disabilities. More than 14% of registered voters are in danger of increased errors due to dyslexia, and more than 6.5% due to short-term memory problems. We will describe and demonstrate technologies we are making that help disabled people and improve voting universally as well.</p><p><a href="http://ted.selker.com/" rel="nofollow external" class="bo">Dr. Ted Selker</a> is an entrepreneur inventor who also mentors innovation. Ted spent five years as director of Considerate Systems research at Carnegie Mellon University Silicon Valley and in developing the campus’s research mission. Prior to that, Ted spent ten years as an associate professor at the MIT Media Laboratory, where he created the Context Aware Computing group, co-directed the Caltech/MIT Voting Technology Project, and directed the Industrial Design Intelligence future for product design project. Prior to that, his successes at targeted product creation and enhancement at IBM earned him the role of IBM Fellow. Ted’s work birthed successful products ranging from notebook computers to operating systems. It accumulated numerous awards, patents, and papers and has often been featured in the press. Ted is co-recipient of the Computer Science Policy Leader Award for Scientific American 50, the American Association for People with Disabilities Thomas Paine Award for his work on voting technology, and the Telluride Tech Fest Award.</p><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL Meetings: March 18, Nilanjan Banerjee (UMBC); April 1, Kirellos Elsaad (UMBC); April 15, Edward Zieglar (NSA); April 29, Ian Blumenfeld (UMBC); May 13, Enka Blanchard (Digitrust Loria, France)</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/03/talk-ted-selker-on-voting-technology-12-1-fri-3-4/" rel="nofollow external" class="bo">talk: Ted Selker on Voting Technology, 12-1, Fri 3/4</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents  Voting Technology  Ted Selker  Research Professor UMBC CSEE Department  12–1 ET Friday, 4 March 2022 via WebEx  Traditionally most votes are lost in...</Summary>
<Website>https://www.csee.umbc.edu/2022/03/talk-ted-selker-on-voting-technology-12-1-fri-3-4/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/117336/guest@my.umbc.edu/fb281d4e792d98468bd4ac5c35399e68/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 01 Mar 2022 12:47:04 -0500</PostedAt>
<EditAt>Tue, 01 Mar 2022 12:47:04 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="115623" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/115623">
<Title>talk: Building Resilience against Cyberattacks, 12pm ET, Dec 15</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/12/drone.png" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2021/12/drone-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h5><strong><a href="http://artiamas.umd.edu/" rel="nofollow external" class="bo">ArtIAMAS</a> Seminar Series, Co-organized by UMBC, UMCP, and the Army Research Lab</strong></h5><hr><h2><strong>Building Resilience against Cyberattacks</strong></h2><h2><strong>Aryya Gangopadhyay, UMBC</strong></h2><hr><h4><strong>12-1 PM ET Wednesday, 15 December 15, 2021<br>Online via <a href="https://umbc.webex.com/meet/nroy" rel="nofollow external" class="bo">webex</a> </strong></h4><hr><p>In this talk, we will address the issue of building resilient systems in the face of cyberattacks. We will present a defense mechanism for cyberattacks using a three-tier architecture that can be used to secure army assets and tactical information. The top tier represents the front-end where autonomous sensing and inferencing through AI models take place by UAVs, UGVs, etc. We will illustrate how models can be defended against data poisoning attacks. In the middle tier, we focus on building cyber defense against attacks in federated learning environments, where models are trained on a large corpus of decentralized data without transferring raw data over a communication channel. The bottom tier represents back-end servers that train deep learning models with large amounts of data that can subsequently be pushed to the edge for inferencing. We will demonstrate how adaptive models can be developed for detecting and preventing various types of attacks at this level.</p><p><a href="https://sites.google.com/site/homearyya/" rel="nofollow external" class="bo">Dr. Aryya Gangopadhyay</a> is a Professor in the Information Systems department at the University of Maryland, Baltimore County. Dr. Gangopadhyay has a courtesy appointment as a Professor in Computer Science and Electrical Engineering at UMBC. He is also the Director of the <a href="https://cards.umbc.edu/" rel="nofollow external" class="bo">Center for Real-time Sensing and Autonomy</a> (CARDS) at UMBC. His research interests include adversarial machine learning at the edge, cybersecurity, and smart cities. He has graduated 16 Ph.D. students and is currently mentoring several others at UMBC. He has published over 125 peer-reviewed research articles and has received extramural support from ARL, NSF, NIST, the Department of Education, and IBM.</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/12/talk-building-resilience-against-cyberattacks-12pm-et-dec-15/" rel="nofollow external" class="bo">talk: Building Resilience against Cyberattacks, 12pm ET, Dec 15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>ArtIAMAS Seminar Series, Co-organized by UMBC, UMCP, and the Army Research Lab   Building Resilience against Cyberattacks  Aryya Gangopadhyay, UMBC   12-1 PM ET Wednesday, 15 December 15, 2021...</Summary>
<Website>https://www.csee.umbc.edu/2021/12/talk-building-resilience-against-cyberattacks-12pm-et-dec-15/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/115623/guest@my.umbc.edu/aa1b72aa3f32f6e87007a518014d42f9/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Thu, 09 Dec 2021 16:05:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="115283" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/115283">
<Title>talk: Shadow IT in Higher Ed: Survey &amp; Case Study for Cybersecurity, 12-1 Fri 12-3</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/11/shadow-it-tweet-1.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/11/shadow-it-tweet-1-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a>Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval.<hr><h4>The UMBC Cyber Defense Lab presents</h4><h3><strong>Shadow IT in Higher Education: Survey and Case Study for Cybersecurity</strong></h3><h4>Selma Gomez Orr, Cyrus Jian Bonyadi, Enis Golaszewski, and Alan T. Sherman<br>UMBC Cyber Defense Lab</h4><h4>Joint work with Peter A. H. Peterson (University of Minnesota Duluth), Richard Forno, Sydney Johns, and Jimmy Rodriguez</h4><h4>12-1:00 pm, Friday, 3 December 2021, online via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h4><hr><p>We explore shadow information technology (IT) at institutions of higher education through a two-tiered approach involving a detailed case study and comprehensive survey of IT professionals. In its many forms, shadow IT is the software or hardware present in a computer system or network that lies outside the typical review process of the responsible IT unit. We carry out a case study of an internally built legacy grants management system at the University of Maryland, Baltimore County that exemplifies the vulnerabilities, including cross-site scripting and SQL injection, typical of such unauthorized and ad-hoc software. We also conduct a survey of IT professionals at universities, colleges, and community colleges that reveals new and actionable information regarding the prevalence, usage patterns, types, benefits, and risks of shadow IT at their respective institutions.</p><p>Further, we propose a security-based profile of shadow IT, involving a subset of elements from existing shadow IT taxonomies, that categorizes shadow IT from a security perspective. Based on this profile, survey respondents identified the predominant form of shadow IT at their institutions, revealing close similarities to findings from our case study.</p><p>Through this work, we are the first to identify possible susceptibility factors associated with the occurrence of shadow IT-related security incidents within academic institutions. Correlations of significance include the presence of certain graduate schools, the level of decentralization of the IT department, the types of shadow IT present, the percentage of security violations related to shadow IT, and the institution’s overall attitude toward shadow IT. The combined elements of our case study, profile, and survey provide the first comprehensive view of shadow IT security at academic institutions, highlighting the tension between its risks and benefits, and suggesting strategies for managing it successfully.</p><hr><p>Dr. Selma Gomez Orr (*protected email* ) received her Ph.D. from Harvard University in the field of decision sciences. She also holds Masters degrees in applied mathematics, engineering sciences, and business administration, also from Harvard. She has worked in the private sector in the fields of cybersecurity and data analytics. Most recently, as a CyberCorps Scholarship for Service (SFS) Scholar, Dr. Orr completed a Master’s of Professional Studies in both cybersecurity and data science at UMBC.</p><p>Cyrus Jian Bonyadi (*protected email* ) is a computer science Ph.D. student and former SFS scholar studying consensus theory at UMBC under the direction of Alan T. Sherman, Sisi Duan, and Haibin Zhang.</p><p>Enis Golaszewski (*protected email* ) is a Ph.D. student at UMBC under Alan T. Sherman where he studies, researches, and teaches cryptographic protocol analysis. A former SFS scholar, Golaszewski helps lead annual research studies that analyze and break software at UMBC.</p><p>Dr. Alan T. Sherman (*protected email*) is a professor of computer science, director of CDL, and associate director of UMBC’s Cybersecurity Center. His main research interest is high-integrity voting systems. Sherman earned the Ph.D. degree in computer science at MIT in 1987 studying under Ronald L. Rivest.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm. All meetings are open to the public. Upcoming CDL Meetings: Feb 4, Filipo Sharevski</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/11/talk-shadow-it-in-higher-ed-survey-case-study-for-cybersecurity-12-1-fri-12-3/" rel="nofollow external" class="bo">talk: Shadow IT in Higher Ed: Survey &amp; Case Study for Cybersecurity, 12-1 Fri 12-3</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval.  The UMBC Cyber Defense Lab presents  Shadow IT in...</Summary>
<Website>https://www.csee.umbc.edu/2021/11/talk-shadow-it-in-higher-ed-survey-case-study-for-cybersecurity-12-1-fri-12-3/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/115283/guest@my.umbc.edu/39d95801f3853f6884030ec740dcbf93/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 28 Nov 2021 21:06:07 -0500</PostedAt>
<EditAt>Sun, 28 Nov 2021 21:06:07 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="111686" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/111686">
<Title>UMBC redesignated a National Center of Academic Excellence in Cyber Defense</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/08/Cae_logo-Badge-1.png" rel="nofollow external" class="bo"><img width="1024" height="511" src="https://www.csee.umbc.edu/wp-content/uploads/2021/08/Cae_logo-Badge-1-1024x511.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>UMBC redesignated a National Center of Academic Excellence in Cyber Defense</strong></h2><hr><p>UMBC has been redesignated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) through the academic year 2028.</p><p>The CAE-CD designation indicates that UMBC is helping reduce threats to our national infrastructure by promoting higher education and research in cyber defense and providing the nation with a pipeline of qualified cybersecurity professionals. UMBC is also designated as a Center of Academic Excellence in Cyber Research (CAE-R), which signifies that UMBC increases the understanding of robust cyber defense technology, policy, and practices that will enable our Nation to prevent and respond to a catastrophic event.</p><p>The<a href="https://www.caecommunity.org/" rel="nofollow external" class="bo"> National Centers of Academic Excellence in Cybersecurity</a> (NCAE-C) program is managed by the National Cryptologic School at the National Security Agency. Federal Partners include the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Institute of Standards and Technology (NIST)/National Initiative on Cybersecurity Education (NICE), the National Science Foundation (NSF), the Department of Defense Office of the Chief Information Officer (DoD-CIO), and US Cyber Command (CYBERCOM).</p><p>The NCAE-C program’s  mission is to create and manage a collaborative cybersecurity educational program with community colleges, colleges, and universities that</p><ul><li>Establishes standards for cybersecurity curriculum and academic excellence,</li><li>Includes competency development among students and faculty,</li><li>Values community outreach and leadership in professional development, </li><li>Integrates cybersecurity practice within the institution across academic disciplines,</li><li>Actively engages in solutions to challenges facing cybersecurity education.</li></ul><p>UMBC offers courses, a <a href="https://www.csee.umbc.edu/undergraduate/cmsc-cybersecurity-track/" rel="nofollow external" class="bo">track</a>, and concentrations focused on cybersecurity in its Computer Science and Information Systems programs at the undergraduate and graduate levels. In addition, UMBC has several major <a href="https://cybersecurity.umbc.edu/scholarships/" rel="nofollow external" class="bo">cybersecurity-oriented scholarship programs</a> to prepare the next generation of cybersecurity professionals in an increasingly digital age, focusing on increasing the participation of women and other underrepresented groups in this fast-growing field. These include the UMBC Cyber Scholars program, CyberCorps: Scholarships For Service (SFS) program, and DOD Cyber Scholarship Program (CySP). Applications for SFS cybersecurity scholarships to begin in Fall 2022  are due via<a href="https://scholarships.umbc.edu/retriever/" rel="nofollow external" class="bo"> Scholarship Retriever</a> by 12noon November 15, 2021.</p><p>UMBC also has professional cybersecurity programs that include certificate programs as well as a Master’s of Professional Studies (MPS) degree at its campuses in Catonsville (UMBC main campus) and Rockville (UMBC at the Universities at Shady Grove).  <a href="https://www.umbctraining.com/training-centers/for-individuals/cybersecurity/" rel="nofollow external" class="bo">UMBC Training Centers</a> offers cybersecurity courses for both individuals and organizations.</p><p>Cybersecurity research at UMBC occurs in many of its laboratories and in the <a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo">UMBC Center for Cybersecurity</a> (UCYBR), which recently merged with UMBC’s original cybersecurity center, the UMBC Center for Information Security and Assurance (CISA).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/08/umbc-redesignated-a-national-center-of-academic-excellence-in-cyber-defense/" rel="nofollow external" class="bo">UMBC redesignated a National Center of Academic Excellence in Cyber Defense</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC redesignated a National Center of Academic Excellence in Cyber Defense   UMBC has been redesignated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) through the academic...</Summary>
<Website>https://www.csee.umbc.edu/2021/08/umbc-redesignated-a-national-center-of-academic-excellence-in-cyber-defense/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111686/guest@my.umbc.edu/b8874785ca9f862a6e3868a7b1c08931/api/pixel</TrackingUrl>
<Tag>coeit</Tag>
<Tag>csee</Tag>
<Tag>cyberscholars</Tag>
<Tag>cybersecurity</Tag>
<Tag>education</Tag>
<Tag>information-systems</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 20 Aug 2021 17:18:35 -0400</PostedAt>
<EditAt>Fri, 20 Aug 2021 17:18:35 -0400</EditAt>
</NewsItem>

</News>
