<?xml version="1.0"?>
<News hasArchived="true" page="1" pageCount="3" pageSize="10" timestamp="Sun, 19 Apr 2026 19:55:58 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?tag=students">
<NewsItem contentIssues="true" id="129853" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/129853">
<Title>Cybersecurity CTF competition starts 1pm Friday 4/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style <a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo">Capture The Flag</a> cybersecurity competition, online and in person for UMBC participants.</p><p>DawgCTF 2022 will be a Jeopardy-style CTF, so things are pretty simple.  Players register online, either in teams or alone. At 1300 EDT on April 29, 2022, the competition will open. Players will have access to a board of <em>challenges</em>, ranging from easy to nigh-impossible, and scored appropriately. Whoever earns the most points by solving challenges wins!  The in-person part of the event will take place in room 206 of the Public Policy Building.</p><p>The CTF will begin at <strong>1:00 PM EDT on Friday, April 29, 2022</strong>, and end at <strong>1:00 PM EDT on Sunday, May 1, 2022</strong>, for a total runtime of 48 hours. The maximum team size is <strong>four</strong>. There will be an in-person component <strong>for UMBC participants only</strong>.</p><p>At 8:00 PM on Friday, April 29<sup>th</sup> (7 hours after the start), we will give out some prizes to UMBC competitors, depending on their current position on the scoreboard at 8:00 PM. <strong>Only UMBC competitors will be eligible for these prizes.</strong> Don’t worry, they’ll be small prizes, mostly just for fun, and the clout and CTFtime credit will go to the “official” winners at competition closing time (1 pm on Sunday).</p><h2><strong>See the <a href="https://umbccd.net/" rel="nofollow external" class="bo">Dawg CTF 2022 site</a> to register, get more information, and  join the Discord server</strong>.</h2></div>
    <p>The post <a href="https://redirect.cs.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/" rel="nofollow external" class="bo">Cybersecurity CTF competition starts 1pm Friday 4/29</a> appeared first on <a href="https://redirect.cs.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style Capture The Flag cybersecurity competition, online and in person for UMBC participants.  DawgCTF 2022 will be a Jeopardy-style CTF, so things...</Summary>
<Website>https://redirect.cs.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/129853/guest@my.umbc.edu/0822de8c309dd82c5655432c00695220/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 26 Apr 2022 22:47:03 -0400</PostedAt>
<EditAt>Tue, 26 Apr 2022 22:47:03 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="118961" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/118961">
<Title>Cybersecurity CTF competition starts 1pm Friday 4/29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2022/04/justlogo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><p>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style <a href="https://en.wikipedia.org/wiki/Capture_the_flag_(cybersecurity)" rel="nofollow external" class="bo">Capture The Flag</a> cybersecurity competition, online and in person for UMBC participants.</p><p>DawgCTF 2022 will be a Jeopardy-style CTF, so things are pretty simple.  Players register online, either in teams or alone. At 1300 EDT on April 29, 2022, the competition will open. Players will have access to a board of <em>challenges</em>, ranging from easy to nigh-impossible, and scored appropriately. Whoever earns the most points by solving challenges wins!  The in-person part of the event will take place in room 206 of the Public Policy Building.</p><p>The CTF will begin at <strong>1:00 PM EDT on Friday, April 29, 2022</strong>, and end at <strong>1:00 PM EDT on Sunday, May 1, 2022</strong>, for a total runtime of 48 hours. The maximum team size is <strong>four</strong>. There will be an in-person component <strong>for UMBC participants only</strong>.</p><p>At 8:00 PM on Friday, April 29<sup>th</sup> (7 hours after the start), we will give out some prizes to UMBC competitors, depending on their current position on the scoreboard at 8:00 PM. <strong>Only UMBC competitors will be eligible for these prizes.</strong> Don’t worry, they’ll be small prizes, mostly just for fun, and the clout and CTFtime credit will go to the “official” winners at competition closing time (1 pm on Sunday).</p><h2><strong>See the <a href="https://umbccd.net/" rel="nofollow external" class="bo">Dawg CTF 2022 site</a> to register, get more information, and  join the Discord server</strong>.</h2></div>
    <p>The post <a href="https://www.csee.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/" rel="nofollow external" class="bo">Cybersecurity CTF competition starts 1pm Friday 4/29</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyberdawgs will host a 48-hour Jeopardy-style Capture The Flag cybersecurity competition, online and in person for UMBC participants.  DawgCTF 2022 will be a Jeopardy-style CTF, so things...</Summary>
<Website>https://www.csee.umbc.edu/2022/04/cybersecurity-ctf-competition-starts-1pm-friday-4-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/118961/guest@my.umbc.edu/d778738d7a814069f2cb98ffc80417c0/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Tue, 26 Apr 2022 22:47:03 -0400</PostedAt>
<EditAt>Tue, 26 Apr 2022 22:47:03 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="111553" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/111553">
<Title>2021 NSA Codebreaker Challenge Now Open</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/08/codebreaker_slider.png" rel="nofollow external" class="bo"><img width="1024" height="461" src="https://www.csee.umbc.edu/wp-content/uploads/2021/08/codebreaker_slider-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a>“The Codebreaker Challenge closely mirrors the real-world scenarios we deal with every day at NSA,” said challenge creator Eric Bryant. “It gives students the opportunity to test their knowledge, build new skills, and develop experience in areas typically not covered by course curricula in cybersecurity.”<hr><h2>NSA Codebreaker Challenge 2021 Now Open</h2><hr><p>NSA’s annual <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">Codebreaker Challenge</a> offers students a closer look at the type of work done at NSA and provides the opportunity to develop skills needed to achieve the Agency’s national security mission. The problems touch on skills like software reverse engineering, cryptanalysis, exploit development, blockchain analysis, and more. It gives students a hands-on opportunity to develop their reverse-engineering/low-level code analysis skills while working on a realistic problem set centered around the NSA’s mission.</p><p>The Challenge is open now and will run until a date late in December. Anyone with an email address from a recognized U.S. school or university may participate. While the challenge is intended for students, faculty are encouraged to participate as well. Furthermore, the site was designed to make it easy for those faculty interested in incorporating the challenge into their courses to do so (see the additional FAQ entries below.)</p><p>The <a href="https://nsa-codebreaker.org/home" rel="nofollow external" class="bo">2021 Codebreaker Challenge</a> consists of a series of tasks that are worth a varying amount of points based upon their difficulty. Schools will be ranked according to the total number of points accumulated by their students with the current ranking shown on a <a href="https://nsa-codebreaker.org/leaderboard" rel="nofollow external" class="bo">leaderboard</a>. Solutions may be submitted at any time for the duration of the Challenge.  </p><p>While not required, it is recommend that you solve tasks in order, since they flow with the storyline. Later tasks may rely on artifacts / inputs from earlier tasks. Each task in the 2021 challenge will require a range of skills. You will need to call upon all of your technical expertise, your intuition, and your common sense.</p><p>NSA provides some <a href="https://nsa-codebreaker.org/resources" rel="nofollow external" class="bo">helpful resources</a> to get you on the right track with the 2021 Challenge. The list as a starting point. It’s not exhaustive, and you’ll definitely need to do additional research on your own. There are things in this list that aren’t actually part of this year’s challenge.  Once you register, you will be able to join the Community of Practice Discord server for the 2021 Codebreaker Challenge.  NSA will also hold two technical talks this Fall, giving you a chance to hear from some of NSA’s experts.</p><div>
    <div class="embed-container"><iframe src="https://www.youtube.com/embed/xJ7LJK7ak-I?feature=oembed" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div>
    </div></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/08/2010-nsa-codebreaker-challenge-now-open/" rel="nofollow external" class="bo">2021 NSA Codebreaker Challenge Now Open</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>“The Codebreaker Challenge closely mirrors the real-world scenarios we deal with every day at NSA,” said challenge creator Eric Bryant. “It gives students the opportunity to test their knowledge,...</Summary>
<Website>https://www.csee.umbc.edu/2021/08/2010-nsa-codebreaker-challenge-now-open/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/111553/guest@my.umbc.edu/25f07029a0a15396ab509af2bc16f860/api/pixel</TrackingUrl>
<Tag>cyberscholars</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 15 Aug 2021 22:15:22 -0400</PostedAt>
<EditAt>Sun, 15 Aug 2021 22:15:22 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="100543" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/100543">
<Title>UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-scaled.jpg" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/04/keyboard-1024x512.jpg" alt="" style="max-width: 100%; height: auto;"></a><em>  Photo by Marlayna Demond ’11 for UMBC</em><hr><p>Congratulation to the UMBC <a href="https://umbccd.umbc.edu/" rel="nofollow external" class="bo">Cyber Dawgs</a> team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s team was one of eight teams out of an initial 23 that qualified for the final competition.  UMBC’s Cyber Dawgs will move on to compete in the National Collegiate Cyber Defense Competition (NCCDC), which will be held April 23-25, 2021.</p><p>The <a href="https://maccdc.org/competition/#regional-final" rel="nofollow external" class="bo">2021 MACCDC regional final</a> took place online April 1-3 and had teams fighting to protect their networks efficiently and effectively from simulated cyber threats and attacks using a scenario based on the COVID-19 global pandemic for its competition events. </p><blockquote> <p>The National Emergency Response Division (N.E.R.D.) is a data science-focused group within the Big Time Health Organization (BTHO), a multinational entity headquartered in Bethesda, Maryland. N.E.R.D. employees have been exceptionally busy dealing with the global health pandemic. As such, they have had to not only shift to work from home, but also expand the number of employees to support the inordinate amounts of data that is flooding each of its eight geographic locations throughout the U.S. Protecting the integrity of the data is critical, but when the data affects the delivery of health services to the public, the job of N.E.R.D. becomes even more mission critical.</p><p>The student teams will stand on the front lines of technology, alongside various healthcare providers. The main task at hand will be to ensure that pandemic-related data from state departments of health are accurate and delivered quickly. Information on outbreak locations, promising interventions, efficacy of testing, mortality rates, and other related statistics are critical so physicians, public health officials, and government entities can make informed decisions about resource allocations. Loss or inaccurate information can lead to tragic consequences. Vigilance is a must – be smart, be strong, be safe.</p></blockquote><p>These regional and national competitions attract leading collegiate cybersecurity teams from across the nation. They put teams in situations that mimic scenarios they might encounter working to secure and protect online systems for government agencies and companies.  Throughout each challenge, teammates work together to protect their systems from hackers and cyber attacks. At the same time, they keep their networks accessible to the users relying on them. </p><p>The UMBC Cyber Dawgs team won the MACCDC regionals last year and were national champions in 2017. In this year’s MACCDC, George Mason placed second and Liberty University third. Good luck to the Cyber Dawgs as they compete with the winners of nine other regional competitions in the <a href="https://www.nationalccdc.org/" rel="nofollow external" class="bo">National Collegiate Cyber Defense Competition</a> later this month.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">UMBC Cyber Dawgs win 2021 Mid-Atlantic Collegiate Cyber Defense Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Photo by Marlayna Demond ’11 for UMBC  Congratulation to the UMBC Cyber Dawgs team, which took first place in the 2021 Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) finals. UMBC’s...</Summary>
<Website>https://www.csee.umbc.edu/2021/04/umbc-cyber-dawgs-win-2021-mid-atlantic-collegiate-cyber-defense-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/100543/guest@my.umbc.edu/ffe2780cdfd7eea3e6ba57291000831f/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 03 Apr 2021 22:52:33 -0400</PostedAt>
<EditAt>Sat, 03 Apr 2021 22:52:33 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="99829" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/99829">
<Title>talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</Title>
<Body>
<![CDATA[
    <div class="html-content"><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png.png" rel="nofollow external" class="bo"><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2021/03/BFT2png-1024x512.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h4><strong>The UMBC Cyber Defense Lab presents</strong></h4><hr><h2><strong>EIPC: Efficient Asynchronous BFT with Adaptive Security</strong></h2><hr><h3><strong>Chao Liu, CSEE, UMBC</strong></h3><h3>12:00–1:00 pm ET, Friday, 12 March 2021<br>via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p>We present EPIC, a novel and efficient asynchronous <em><a href="https://www.geeksforgeeks.org/practical-byzantine-fault-tolerancepbft/" rel="nofollow external" class="bo">Byzantine fault-tolerant (BFT)</a></em> protocol with <em>adaptive security</em>. We characterize efficient BFT protocols using adaptive vs. static corruptions corruption models. EPIC takes a new approach to adaptively secure asynchronous BFT. It uses the adaptively secure threshold <em>pseudorandom function (PRF)</em> scheme for coin tossing and uses the Cobalt asynchronous binary agreement (ABA) protocol, which resolves the liveness issue of HoneyBadgerBFT and BEAT. As our new protocol modifies almost all building blocks for asynchronous BFT (including ABA, threshold PRF, and threshold encryption but not Byzantine reliable broadcast (RBC)), evaluating which component dominates the performance bottleneck is a difficult task. We mix and match different building blocks to implement four asynchronous BFT protocols and evaluate their performance. Via a five-continent deployment on Amazon EC2, we show that EPIC is slightly slower for small and medium-sized networks than the most efficient asynchronous BFT protocols with static security. We also find when the number of replicas less than 46, EPIC’s throughput is stable, achieving a peak throughput of 8,000–12,500 tx/sec using t2.medium VMs. When the network size grows larger, EPIC is not as efficient as those with static security, with a throughput of 4,000–6,300 tx/sec.</p><p>BFT state machine replication is the only known software solution for masking arbitrary failures and malicious attacks. BFT has been regarded as the model for building <a href="https://www.investopedia.com/terms/p/permissioned-blockchains.asp" rel="nofollow external" class="bo">permissioned blockchains</a>, where the distributed ledgers (i.e., replicas) know each other’s identities but may not trust each other.</p><p>Asynchronous protocols are inherently more robust against timing and <em>denial-of-service (DoS)</em> attacks. Two recent asynchronous BFT systems—<em>HoneyBadgerBFT</em> proposed by Miller et al. in CCS’16 and <em>BEAT</em> by Duan et al. in CCS’18—have comparable performance as partially synchronous BFT protocols and can scale to 100 replicas. The protocols, however, achieve static security, where the adversary needs to choose the set of corrupted replicas before protocol execution. This security property is weaker than that for many existing BFT protocols (e.g., <em>PBFT</em>), which achieve adaptive security, where the adversary can choose to corrupt replicas at any moment during the execution of the protocol.</p><p>Chao Liu is a Ph.D. candidate in computer science at UMBC, working with Alan Sherman. His research interests focus on cryptography, cybersecurity, and distributed systems.</p><hr><p>Host: Alan T. Sherman, *protected email* Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings include Mar 26, Jeremy Clark (Concordia); April 9, (UMBC), MeetingMayhem: A network adversarial thinking game; April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking; and May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</p>
    <p>The post <a href="https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/" rel="nofollow external" class="bo">talk: EIPC: Efficient Asynchronous BFT with Adaptive Security, 12-1 Fri 3/12</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   EIPC: Efficient Asynchronous BFT with Adaptive Security   Chao Liu, CSEE, UMBC  12:00–1:00 pm ET, Friday, 12 March 2021 via WebEx    We present EPIC, a novel...</Summary>
<Website>https://www.csee.umbc.edu/2021/03/talk-eipc-efficient-asynchronous-bft-with-adaptive-security-12-1-fri-3-12/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/99829/guest@my.umbc.edu/84382550ee5147b2c2a3c3aa7b60ce2b/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 06 Mar 2021 21:07:51 -0500</PostedAt>
<EditAt>Sat, 06 Mar 2021 21:07:51 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="98823" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/98823">
<Title>talk: 2021 SFS Research Study: Vulnerabilities in UMBC&#8217;s Incident Management System, 12-1 Jan. 29</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><a href="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2.png" rel="nofollow external" class="bo"><img width="1024" height="432" src="https://www.csee.umbc.edu/wp-content/uploads/2021/01/sfs2-1024x432.png" alt="" style="max-width: 100%; height: auto;"></a><hr><h2><strong>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System</strong></h2><h3><strong>Cyrus Bonyadi and Enis Golaszewski</strong><br>CSEE Department, UMBC</h3><h3>12:00noon–1pm Friday, 29 January 2021</h3><h3>remotely via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a> </h3><hr><p><strong> </strong>January 11–15, 2020, UMBC scholars in the CyberCorps: Scholarship for Service (SFS) and the DoD Cybersecurity Scholarship (CySP) programs collaboratively analyzed the security of UMBC’s Incident Management System (IMS). Students found numerous serious issues, including race conditions, code-injection, and cross-site scripting attacks, improper API implementation, and denial-of-service attacks. We present findings, recommendations, and details of these vulnerabilities.</p><p>UMBC’s Incident Management System (IMS) is a web application under development by UMBC’s DoIT to supplement their RequestTracker (RT). IMS allows DoIT security staff to supplement the information in RT by linking IMS incidents to RT tickets. IMS incidents store additional information and files regarding existing and potential security campaigns. Using the information in IMS and RT, DoIT generates executive reports, which can influence decisions related to budget, training, and other security concerns. Our study is helping to improve the architecture and implementation of IMS.</p><p>Participants comprised BS, MS, MPS, and Ph.D. students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College (MC) and Prince George’s Community College (PGCC) to complete their four-year degrees at UMBC.</p><p>About the Speakers. <em>Cyrus Jian Bonyadi</em> is a Ph.D. Student at UMBC working on distributed computing consensus theory. He is an alumnus of the varsity CyberDawgs team. email: *protected email*  Enis Golaszewski is a Ph.D. Student at UMBC working on protocol analysis. He is a leading member of the Protocol Analysis Lab under Dr. Sherman. email: *protected email*, </p><hr><p>Host: Alan T. Sherman, <a rel="nofollow external" class="bo">*protected email*</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1 pm.  All meetings are open to the public. Upcoming CDL Meetings:</p><ul><li>Feb 12, Richard Carback (xxnetwork), Startup lessons learned</li><li>Feb 26, Vahid Heydari (Rowan University)</li><li>Mar 12, Chao Liu (UMBC), Efficient asynchronous BFT with adaptive security</li><li>Mar 26, Jeremy Clark (Concordia)</li><li>April 9, (UMBC), MeetingMayhem: A network adversarial thinking game</li><li>April 23, Peter Peterson (University of Minnesota Duluth), Adversarial thinking</li><li>May 7, Farid Javani (UMBC), Anonymization by oblivious transfer</li></ul></div>
    <p>The post <a href="https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/" rel="nofollow external" class="bo">talk: 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System, 12-1 Jan. 29</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The 2021 SFS Research Study: Vulnerabilities in UMBC’s Incident Management System  Cyrus Bonyadi and Enis Golaszewski CSEE Department, UMBC  12:00noon–1pm Friday, 29 January 2021  remotely via...</Summary>
<Website>https://www.csee.umbc.edu/2021/01/talk-2021-sfs-research-study-vulnerabilities-in-umbcs-incident-management-system-12-1-jan-29/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/98823/guest@my.umbc.edu/e1c770981082bf24494dd3e617b48316/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 29 Jan 2021 09:30:31 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="98052" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/98052">
<Title>event: UMBC INSuRE Research Projects from Fall 2020, 12-1:30 ET 12/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><div><img width="1024" height="512" src="https://www.csee.umbc.edu/wp-content/uploads/2020/12/insure_logo3-1024x512.png" alt="" style="max-width: 100%; height: auto;"><hr><h4><strong>UMBC’s Cyber Defense Lab presents</strong></h4><hr><h2><strong>Presentations of the UMBC INSuRE Research Projects from Fall 2020</strong></h2><hr><h3><strong>12:00noon–1:30pm, Friday, 18 December 2020</strong></h3><h3>via <a href="http://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></h3><hr><p>The <a href="https://arxiv.org/pdf/1703.08859.pdf" rel="nofollow external" class="bo">Information Security Research and Education</a> (INSuRE) research collaborative is a network of National Centers of Academic Excellence in Cyber Defense Research (CAE-Rs) universities that cooperate to engage students in solving applied cybersecurity research problems. Since fall 2012, INSuRE has fielded a multi-institutional cybersecurity research course in which BS, MS, and Ph.D. students work in small groups to solve unclassified problems proposed by the National Security Agency (NSA) and by other government and private organizations and laboratories.</p><p><strong>Schedule</strong><br>12:00-12:15pm poster presentations<br>12:15-12:40pm Detecting Web-Based Cryptomining Malware by Mining Open-Source Repositories<br>12:40-1:05pm Meeting Mayhem: A Network Adversary Game<br>1:05-1:30pm Analysis of the 5G AKA protocol with Comparison to 4G AKA</p><p><strong>Detecting Web-Based Cryptomining Malware by Mining Open-Source Repositories</strong><br>Naomi Albert, Elias Enamorado, Benjamin Padgette, Anshika Patel<br>Technical Director: William J. La Cholter (APL)<br>UMBC Expert: Charles Nicholas</p><p>With the ever-increasing popularity of browser-based cryptomining it is now more important than ever to detect malicious cryptojacking code. This paper serves to identify reliable indicators of injected cryptomining code in open-source repositories using static source code analysis techniques. We analyze static source code features of a curated set of cryptomining projects and innocuous codebases that are available as open-source projects on GitHub. Through this analysis we show that a novel Normalized Halstead Difficulty metric can be an important indicator of the presence of cryptomining software. Specifically, the Normalized Halstead complexity is significantly higher for cryptomining source code files as compared to the sampled non-miners. Using this newfound knowledge of the complexity of browser-based JavaScript cryptominers, supply-chain cryptojacking injection attacks in open-source repositories may be easier to identify through automated code review techniques.</p><p><strong>Meeting Mayhem: A Network Adversary Game</strong><br>Richard Baldwin, Trenton Foster<br>Technical Director: Edward Zieglar (NSA)<br>UMBC Experts: Marc Olano, Linda Oliva</p><p>Meeting Mayhem, a web-based educational game, teaches adversarial thinking through the Dolev-Yao security model. Meeting Mayhem is based on the paper-and-pencil “Protocol Analysis Game,” introduced by Edward Zieglar and adapted by UMBC PhD student Enis Golaszewski. Two or more users try to arrange a meeting time and place by sending messages through an insecure network controlled by an adversary. Through self discovery, players learn the dangers of network communications and the value of sound protocols supported by encryption, hashing, and digital signatures.</p><p><strong>Formal Methods Analysis of the 5G AKA protocol, with Comparison to 4G AKA</strong><br>Prajna Bhandary, Ryan Jahnige, Jason Schneck<br>Technical Director: Edward Zieglar (NSA)</p><p>We analyze the Fifth Generation (5G) Authentication and Key Agreement (AKA) protocol and the Fourth Generation (4G) Evolved Packet System Authentication and Key Agreement (EPS-AKA) protocol for possible structural faults using the Cryptographic Protocol Shapes Analyzer (CPSA). It is fundamental to provide authentication and key management in the security of cellular networks. 5G AKA provides mutual authentication between subscribers and the network, by providing the keys to protect both signaling and user plane data. 4G defines an authentication method, EPS-AKA, whereas 5G offers several different authentication techniques: 5G AKA, 5G EAP-AKA, and 5G EAP-TLS. In addition to our formal method analysis of 5G AKA and 4G EPS-AKA, we also analyze the differences in security properties between the 4G EPS-AKA protocol, and 5G AKA protocol. We verify that the upgrades made to 4G EPS-AKA improves control of the Home Network (HN) in 5G AKA. Additionally, we found that the ambiguous nature of the documentation regarding the channel between Serving Network (SN) and HN results in authentication concerns and we propose a solution.</p><p>Course Instructor: Alan T. Sherman</p><p>Support for this event is provided in part by the NSF under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm. All meetings are open to the public. Upcoming CDL meetings:</p><p>Biweekly CDL talks will resume in the spring 2021 semester.<br>The 2021 UMBC SFS/CySP Research Study will take place remotely in January (likely January 11-15).</p></div>
    <p>The post <a href="https://www.csee.umbc.edu/2020/12/event-umbc-insure-research-projects-from-fall-2020-12-130-et-12-18/" rel="nofollow external" class="bo">event: UMBC INSuRE Research Projects from Fall 2020, 12-1:30 ET 12/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Cyber Defense Lab presents   Presentations of the UMBC INSuRE Research Projects from Fall 2020   12:00noon–1:30pm, Friday, 18 December 2020  via WebEx   The Information Security Research...</Summary>
<Website>https://www.csee.umbc.edu/2020/12/event-umbc-insure-research-projects-from-fall-2020-12-130-et-12-18/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/98052/guest@my.umbc.edu/a7f293a2362640ad181a5fa3ae035606/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>education</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 12 Dec 2020 10:11:12 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="93018" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/93018">
<Title>CyberCorps SFS Spring  Meeting at UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><img src="https://www.csee.umbc.edu/wp-content/uploads/2020/05/cybercorps-logo.jpg" alt="Scholarship for Service" style="max-width: 100%; height: auto;">The Scholarship for Service (SFS) Program is designed to recruit and train the next generation of cybersecurity professionals to meet the needs of Federal, State, local, and tribal government.<hr><h1><strong>CyberCorps SFS Spring Meeting at UMBC</strong></h1><p>   </p><p><strong>10:00am-2:00pm Friday, 22 May 2020<br>Open to the public<br>via: <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">https://umbc.webex.com/meet/sherman</a></strong></p><p>   </p><p>UMBC’s Spring CyberCorps Scholarship for Service meeting will take place from 10 am to 2 pm on Friday, 22 May 2020. It will feature a discussion with Dr. Dan Guernsey (NSA) on Ghidra, Software Reverse Engineering, and Cybersecurity Careers at NSA, presentations by SFS students, and a hands-on Capture the Flag exercise.</p><p><strong><span>10:00-10:30 Student presentations</span><br></strong>Scholarship for Service (SFS) students from UMBC, Montgomery College (MC), and Prince George’s Community College (PGCC) will present their results solving IT security problems for their universities, county governments, and local companies. This activity is part of a pioneering program centered at UMBC to extend SFS scholarships to community college students. In January 2020, all SFS scholars at UMBC, PGCC, and MC worked collaboratively to analyze the security of a custom shadow-IT software application to query research grant information</p><p><span><strong>10:30-11:30</strong> <strong>Discussion with Dr. Dan Guernsey (NSA)</strong></span><br>Learn about <a href="https://www.nsa.gov/resources/everyone/ghidra/" rel="nofollow external" class="bo">Ghidra</a>, software reverse engineering, and cybersecurity careers at NSA. Ghidra is a software reverse engineering framework developed by NSA’s Research Directorate for NSA’s cybersecurity mission. It helps analyze malicious code and malware like viruses, and can give cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems (<a href="https://github.com/NationalSecurityAgency/ghidra" rel="nofollow external" class="bo">GitHub</a>).</p><p><strong><span>11:30-12:30 Lunch and discussion among attendees</span></strong></p><p><strong><span>12:30-2:00 Hands-on cyber defense exercise</span></strong><br>Sharpen your cybersecurity skills by participating in a hands-on Capture the Flag exercise developed by the UMBC Cyber Dawgs and Cyrus Bonyadi, an SFS scholar and a member of the Cyber Dawgs, whose cyberdefense team won first place at the Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC) in April 2020 and is competing in the National Collegiate Cyber Defense Competition (NCCDC).</p><p>   </p><hr><p>   </p><h3><strong>Participants and organizers</strong></h3><p><strong>Dr. Dan Guernsey</strong> earned the Ph.D in Computer Science from the University of Tulsa. Since 2011, he worked at the Department of Defense as a Computer Scientist and Architectures Researcher. During his studies at Tulsa, Dr. Guernsey contracted with the DoD Office of the Inspector General, the U.S. Secret Service, and local law firms. He performed reverse engineering and authored software analysis tools for product evaluation and digital forensics. His work helped solve criminal cases and helped resolve civil disputes involving software copyrights. Dr. Guernsey is an Adjunct Instructor at UMBC in the graduate Cybersecurity Program.</p><p>Host <strong>Alan T. Sherman</strong> (*protected email*) is a professor of computer science and Director of the UMBC <a href="https://www.cisa.umbc.edu" rel="nofollow external" class="bo">Center for Information Security and Assurance</a>, which center is responsible for UMBC’s designation as a National Center of Academic Excellence in Cyber Defense Education and Cyber Defense Research.</p><p><strong>Richard Forno</strong> is a senior lecturer, Director of the UMBC Graduate Cybersecurity Program, and Assistant Director of the UMBC Center for Cybersecurity.</p><p><strong>Casey W. O’Brien</strong> is Executive Director and Principal Investigator of the National CyberWatch Center, Prince George’s Community College.</p><p><strong>Joe Roundy</strong> is the Cybersecurity Program Manager at Montgomery College, Germantown.</p><p>Support for this event is provided in part by the National Science Foundation under SFS grant DGE-1753681 and by the Department of Defense under CySP grant H98230-19-1-0308.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/05/cybercorps-sfs-spring-meeting-at-umbc/" rel="nofollow external" class="bo">CyberCorps SFS Spring  Meeting at UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Scholarship for Service (SFS) Program is designed to recruit and train the next generation of cybersecurity professionals to meet the needs of Federal, State, local, and tribal government....</Summary>
<Website>https://www.csee.umbc.edu/2020/05/cybercorps-sfs-spring-meeting-at-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/93018/guest@my.umbc.edu/bb27d6581cff14ea903a83ad23c21eb5/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sat, 09 May 2020 14:52:08 -0400</PostedAt>
<EditAt>Sat, 09 May 2020 14:52:08 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="92572" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92572">
<Title>UMBC Cyber Dawgs rank #1 among university teams at annual Capture the Flag event</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="1024" height="536" src="https://www.csee.umbc.edu/wp-content/uploads/2020/04/Cyberdawgs2020_fb-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"><p>   </p><h2><strong>UMBC Cyber Dawgs #1 among university</strong><br><strong>teams at annual Capture the Flag event</strong></h2><p>   </p><p>The UMBC Cyber Dawgs ranked #1 among university teams in a challenging cybersecurity competition hosted virtually by the University of Maryland, College Park on April 18. </p><p>The <a href="https://umdctf.io/" rel="nofollow external" class="bo">Capture the Flag event</a> was designed to test teams’ abilities to solve a variety of realistic cybersecurity problems. UMBC went head to head with more than <a href="https://umdctf.io/scoreboard" rel="nofollow external" class="bo">300 teams</a> from both colleges and industry, placing third overall and #1 among the universities.</p><p><strong>Charles Nicholas</strong>, professor of computer science and electrical engineering and a Cyber Dawgs faculty advisor, says that the team’s win shows how well-prepared UMBC students are for careers in cybersecurity, and how committed they are to excelling in intercollegiate competition. “It speaks volumes about our students, their enthusiasm, and their character,” he says.</p><p>Reflecting on the Cyber Dawgs’ #3 overall finish, Nicholas shares, “The teams that beat us are made up of experienced cyber professionals, who do this sort of work for a living.” To end the competition as the leading university team and trailing just two professional teams was quite a feat, he notes, saying, “Our faculty and our university are very proud of these students.”</p><p>The <a href="https://news.umbc.edu/umbc-cyber-dawgs-win-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">Cyber Dawgs recently won the Mid-Atlantic Collegiate Cyber Defense Competition</a>. They are preparing for the National Collegiate Cyber Defense Competition, which will be held virtually in May.</p><p><em>Adapted from a <a href="https://news.umbc.edu/umbc-cyber-dawgs-rank-1-among-university-teams-at-annual-capture-the-flag-event/" rel="nofollow external" class="bo">UMBC News article</a> written by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>.</em>  <em>Banner image: A person typing on a computer. Photo by Marlayna Demond ’11 for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/umbc-cyber-dawgs-rank-1-among-university-teams-at-annual-capture-the-flag-event/" rel="nofollow external" class="bo">UMBC Cyber Dawgs rank #1 among university teams at annual Capture the Flag event</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC Cyber Dawgs #1 among university teams at annual Capture the Flag event       The UMBC Cyber Dawgs ranked #1 among university teams in a challenging cybersecurity competition hosted...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/umbc-cyber-dawgs-rank-1-among-university-teams-at-annual-capture-the-flag-event/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92572/guest@my.umbc.edu/12762cf8000fbec29e409aa47a78ad34/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Fri, 24 Apr 2020 16:00:35 -0400</PostedAt>
<EditAt>Fri, 24 Apr 2020 16:00:35 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="92108" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/92108">
<Title>UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition</Title>
<Body>
<![CDATA[
    <div class="html-content"><img width="1024" height="410" src="https://www.csee.umbc.edu/wp-content/uploads/2020/04/Cyberdawgs19-1812-1920x768-1.jpg" alt="" style="max-width: 100%; height: auto;"><p> <br></p><h2><strong>UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition</strong></h2><p> <br></p><p>Last weekend, the UMBC Cyber Dawgs took first place in the Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC), which was held virtually. UMBC’s team was one of eight that participated in the competition, fighting to protect their networks efficiently and effectively from simulated cyber threats and attacks. The team topped Penn State; the University of Maryland, College Park; and University of Virginia, which won the national championship for the past two years.</p><p>UMBC’s Cyber Dawgs will move on to compete in the National Collegiate Cyber Defense Competition (NCCDC). Due to COVID-19, the competition will be held remotely this year.</p><h3><strong>How does the competition work?</strong></h3><p>These regional and national competitions attract leading collegiate cybersecurity teams from across the nation. They put teams in situations that mimic scenarios they might encounter working to secure and protect online systems for government agencies and companies.  Throughout each challenge, teammates work together to protect their systems from hackers and cyber attacks. At the same time, they keep their networks accessible to the users relying on them. </p><h3><strong>Meet the team</strong></h3><p>The MACCDC was about 14 hours long, and was held over two days. During the competition, the teams were not permitted to interact with their coaches <strong>Charles Nicholas</strong>, professor of computer science and electrical engineering (CSEE), and <strong>Rick Forno</strong>, senior lecturer in CSEE.</p><p>The winning UMBC team included <strong>Anna Staats</strong> ‘20, computer science; <strong>RJ Joyce</strong> ‘18, M.S. ‘20, computer science; <strong>Cyrus Bonyadi</strong>, Ph.D. ‘23, computer science; <strong>Drew Barrett</strong> ‘20, computer science; <strong>Seamus Burke</strong> ‘20, computer science; <strong>Henry Budris </strong>‘22, computer science; <strong>Chris Skane</strong> ‘21, computer science; and <strong>Nikola Bura </strong>‘21, computer science. </p><p>“We are so proud of our team, and their ability to work together as a team under such extraordinary conditions,” says Nicholas.</p><p>This is the third time in six years that the Cyber Dawgs have won the MACCDC. The UMBC team won the <a href="https://news.umbc.edu/umbc-cyber-dawgs-top-2017-national-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">national championship in 2017</a>.</p><hr><p><em>Adapted from a <a href="https://news.umbc.edu/umbc-cyber-dawgs-win-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">UMBC News article</a> by <a href="https://news.umbc.edu/author/meganhanks/" rel="nofollow external" class="bo">Megan Hanks</a>.</em>  <em>Banner image: Student using a computer. Photo by <a href="https://oia.umbc.edu/about-us/our-team/person/tc07289/" rel="nofollow external" class="bo">Marlayna Demond</a> ’11 for UMBC.  <br></em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2020/04/umbc-cyber-dawgs-win-mid-atlantic-collegiate-cyber-defense-competition/" rel="nofollow external" class="bo">UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition      Last weekend, the UMBC Cyber Dawgs took first place in the Mid-Atlantic Collegiate Cyber Defense Competition...</Summary>
<Website>https://www.csee.umbc.edu/2020/04/umbc-cyber-dawgs-win-mid-atlantic-collegiate-cyber-defense-competition/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/92108/guest@my.umbc.edu/485f14121c68bc1bebb82c903f4cfa33/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>false</CommentsAllowed>
<PostedAt>Sun, 12 Apr 2020 16:33:39 -0400</PostedAt>
<EditAt>Sun, 12 Apr 2020 16:33:39 -0400</EditAt>
</NewsItem>

</News>
