Category: Cybersecurity
-
UMBC Cyber Dawgs are named CyberForce national champions
UMBC Cyber Dawgs are named CyberForce national champions UMBC’s Cyber Defense Team, known as the Cyber Dawgs, has emerged the national champion team in the U.S. Department of Energy’s fifth annual CyberForce Competition. The Cyber Dawgs earned first place overall out of more than 100 teams from universities across the country. Ten national laboratories hosted…
-
UMBC Cyberdawgs win first place in the 2019 DOE CyberForce Competition
UMBC’s CyberDawgs win first place in the 2019 DOE Cyberforce Competition Cyberdawgs place first out of 105 teams in DOE’s 5th CyberForce Competition Congratulations to the UMBC CyberDawgs team for their first place finish in a field of 105 collegiate teams in the U.S. Department of Energy’s Fifth Annual CyberForce Competition. The distributed event was held…
-
TALK: Reasoning About Time in a Crypto Protocol Analysis Tool
-
Dr. Forno discusses the Baltimore Ransomware attack on Maryland Public TV program
Maryland Public Television’s Charles Robinson reports on how Baltimore continues to recover after city computers were infected with ransomware in the May 2019 Baltimore ransomware attack and interviews Dr. Rick Forno, associate director of the UMBC Center for Cybersecurity and graduate director of UMBC’s Cybersecurity MPS degree program. From Wikipedia: On May 7th 2019, most…
-
talk: Analysis of the Secure Remote Password (SRP) Protocol Using CPSA
The UMBC Cyber Defense Lab presents Analysis of the Secure Remote Password (SRP) Protocol Using CPSA Erin Lanus, UMBC Cyber Defense Lab 12:00–1:00pm, Friday, 6 September 2019, ITE 227, UMBC Joint work with Alan Sherman, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus Bonyadi, Mario Costa, Moses Liskov, and Edward Zieglar Secure Remote Password (SRP) is…
-
CSEE faculty Ben Shariati co-author of NIST guide on mobile device security and privacy
Dr. Ben Shariati co-author of NIST guide on mobile device security and privacy Dr. Behnam Shariati, Assistant Director of the UMBC Graduate Cybersecurity Program, is one of the authors of a new NIST Cybersecurity Practice Guide guide on how organizations can use standards-based, commercially available products to help meet their mobile device security and privacy…
-
UMBC partners with five universities in the US, UK, and Japan to launch International Cybersecurity Center of Excellence
image: Representatives from the partnering institutions at UMBC. Photo by Marlayna Demond ’11 for UMBC. UMBC partners with five universities in the US, UK, and Japan to launch International Cybersecurity Center of Excellence UMBC has partnered to create a global university network dedicated to securing critical systems against cyber threats: the International Cybersecurity Center of…
-
talk: Security for Smart Cyber-Physical Systems, 12-1 5/3, ITE 227
UMBC Cyber Defense Lab Security for Smart Cyber-Physical Systems Prof. Anupam Joshi, UMBC 12:00–1:00pm, Friday, 3 May 2019, ITE 227 Smart Cyber-Physical Systems (CPS) are increasingly embedded in our everyday life. Security incidents involving them are often high-profile because of their ability to control critical infrastructure. Stuxnet and the Ukrainian power-grid attack are some notorious…
-
talk: The Evolution of Mobile Authentication, 1pm 4/30, ITE325, UMBC
The Evolution of Mobile Authentication Prof. Keith Mayes, Royal Holloway University of London 1:00pm Tuesday 30 April 2019, ITE325, UMBC Mobile communication is an essential part or modern life, however it is dependent on some fundamental security technologies. Critical amongst these technologies, is mobile authentication, the ability to identify valid users (and networks) and enable…
-
talk: Using CPSA to Analyze Force-Latency Protocols, 12-1 4/19
UMBC Cyber Defense Lab Using CPSA to Analyze Force-Latency Protocols Dr. Edward Zieglar, National Security Agency 12-1 Friday, 19 April 19, ITE 227 Several cryptographic protocols have been proposed to address the Man-in-the-Middle attack without the prior exchange of keys. This talk will describe a formal analysis of one such protocol proposed by Zooko Wilcox-O’Hearn,…