Cyber Security / en George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults /news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams <span>George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-10-26T19:23:41-04:00" title="Sunday, October 26, 2025 - 19:23">Sun, 10/26/2025 - 19:23</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW33079067 BCX4" lang="EN-US"><span class="TextRun SCXW33079067 BCX4 NormalTextRun intro-text" lang="EN-US">The term “catfishing” entered mainstream use with the release of the eponymous 2010 documentary investigating the practice of creating fake online personas, frequently to scam someone. Today, AI is pushing this practice to a frightening new level, with the prospect of older adults falling for what are called “romance scams.”</span><span class="EOP SCXW33079067 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW33079067 BCX4"><a href="https://ist.gmu.edu/profiles/sdas35" title="Das"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Sanchari Das</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">, an assistant professor in 鶹Ƶ’s </span><a href="https://ist.gmu.edu" title="IST"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Department of Information Sciences and Technology</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">, and </span><a href="https://www.kcl.ac.uk/people/ruba-abu-salma" title="Abu-Salma"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Ruba Abu-Salma</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">, an associate professor in the </span><a href="https://www.kcl.ac.uk/study/undergraduate/courses/computer-science-bsc" title="CS King's College"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">department of computer science at King’s College London</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">, received a $100,000 </span><a href="https://research.google/programs-and-events/google-academic-research-awards/google-academic-research-award-program-recipients/" title="Google award"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Google Academic Research Award</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US"> to help keep older adults safe online. Their project, Scammed by Love: Toward Mitigating AI-Facilitated Romance Scams Against Older Adults Through Empirical and Cross-National Studies, will investigate the prevalence of such scams targeting older adults and will create educational tools to help them safely navigate dating apps. &nbsp;</span><span class="EOP SCXW33079067 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW33079067 BCX4" lang="EN-US"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">The researchers will conduct a multi-national study spanning 13 countries, including the United States and the United Kingdom. Das, who has published research on older adults and their online dating habits, said, “We think about older adults in terms of health care needs, but we don't think about dating and romance. I learned that </span><span class="TextRun SCXW33079067 BCX4 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">a majority of</span><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US"> older-adult scams come from scam dating, and the victims cannot even share that it happened with their support networks, like their children, because it would be such a taboo and embarrassing thing to share.” Das added that an estimated $3 billion is lost each year in the United States to romance scams across all age groups, based on reported figures. “And that’s only what’s being reported.” Das is concerned that while romance scams are among the most prevalent forms of fraud affecting older adults, this population remains understudied in this context.&nbsp;</span><span class="EOP SCXW33079067 BCX4">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-10/istock-1465210356.jpg?itok=S6VWvB76" width="560" height="315" alt="A cell phone shows a text from a romance scammer." loading="lazy"> </div> </div> <figcaption>AI is making romance scams even harder to detect. iStock photo.</figcaption> </figure> <p class="Paragraph SCXW33079067 BCX4"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">With roughly 12 percent of Americans over 70 having used a dating app or site, there is significant exposure for financial harm. Given the rapid advances in AI-generated images, video, audio, and simulated emotional expression, these attacks are increasing. </span><a class="Hyperlink SCXW33079067 BCX4" href="https://news.sky.com/story/romance-fraudster-who-conned-100-000-from-10-women-by-claiming-to-be-vietnam-war-veteran-and-us-fighter-pilot-is-jailed-for-11-years-13019447" target="_blank"><span class="TextRun Underlined SCXW33079067 BCX4 NormalTextRun" lang="EN-US">One news story</span></a><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US"> (of many) tells of a UK resident who scammed at least 10 female victims over 11 years out of 100,000 British pounds.</span><span class="LineBreakBlob BlobObject DragDrop SCXW33079067 BCX4">&nbsp;</span><br><span class="TextRun EmptyTextRun SCXW33079067 BCX4" lang="EN-US"></span><span class="LineBreakBlob BlobObject DragDrop SCXW33079067 BCX4">&nbsp;</span><br><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Abu-Salma, who has also published research on older adults and other at-risk groups, noted that according to a recent 2025 study by Lloyds Bank, “Individuals aged 55 to 64 are the most targeted age group, accounting for 20 percent of romance scam victims, followed by those aged 65 to 74, who represent18 percent of cases.”</span><span class="EOP SCXW33079067 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW33079067 BCX4"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">In response to these risks, Das and Abu-Salma’s project will proceed in three phases. First, they will analyze data from focus groups and surveys of older adults in countries with high dating-app adoption. Second, they will develop educational safety materials. Third, they will hold in-person community workshops in the United States and the UK, partnering with older adult communities to refine and disseminate these materials. The team will work with organizations worldwide to share their findings online.</span><span class="EOP SCXW33079067 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW33079067 BCX4"><span class="TextRun SCXW33079067 BCX4 NormalTextRun" lang="EN-US">Das said she is excited about this collaboration and grateful to receive such highly competitive Google Academic Research Award in the Trust, Safety, Security, and Privacy research domain, noting, “We all know about deepfakes, but the bigger issue is that scammers are no longer just swapping faces. They are creating entirely new personas that feel real, so you may not even question whether the person you are talking to exists.” She added, “Our goal is to equip older adults with simple tools and support so they can connect online with confidence.”</span><span class="LineBreakBlob BlobObject DragDrop SCXW33079067 BCX4">&nbsp;</span><br><span class="TextRun EmptyTextRun SCXW33079067 BCX4" lang="EN-US"></span><span class="EOP SCXW33079067 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/sdas35" hreflang="en">Sanchari Das</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="2f8e031f-c490-400e-84f3-6c8f2cb720f9" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="bad971d2-6286-4e3f-b169-e1aebdf1c76d" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-27e58b822acaf3b5ff5fa71c14b0e2e78f95eba6ee755ba8d826785dce4429f2"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/3-million-national-institute-aging-grant-will-provide-much-needed-support-underserved" hreflang="en">$3 million National Institute on Aging grant will provide much-needed support to underserved dementia caregivers</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/resilient-robots-rough-terrain" hreflang="en">Resilient robots in rough terrain </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 14, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/ist-professors-unveil-human-ai-collaboration-tool-automate-cartoon-colorization" hreflang="en">IST professors unveil human-AI collaboration tool to automate cartoon colorization</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 10, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/15716" hreflang="en">Information Sciences and Technology Departmenat</a></div> <div class="field__item"><a href="/taxonomy/term/11991" hreflang="en">Older Adults</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/8551" hreflang="en">Google</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> </div> </div> </div> </div> </div> Sun, 26 Oct 2025 23:23:41 +0000 Nathan Kahl 343971 at Anonymity’s ARX nemesis /news/2025-10/anonymitys-arx-nemesis <span>Anonymity’s ARX nemesis</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-10-20T11:12:08-04:00" title="Monday, October 20, 2025 - 11:12">Mon, 10/20/2025 - 11:12</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of faculty and students from 鶹Ƶ recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the </span><a href="https://www.sigsac.org/ccs/CCS2025/" title="ACM CCS"><span class="intro-text">Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS)</span></a><span class="intro-text">, one of the world’s most prestigious computer security conferences, with a very low paper acceptance rate.</span></p> <p>The problem they discovered was with ARX, an open-source data anonymization tool, which provides what is referred to as <em>k</em>-anonymity. It is a commonly used tool in clinical settings to maintain data privacy. The discovery is particularly important at a time when more and more private data is being used in a variety settings and systems.</p> <p>Evgenios Kornaropoulos, an assistant professor in the <a href="https://cs.gmu.edu" title="Computer science">Department of Computer Science</a>, said, “Sometimes this type of microdata is very valuable. Tools like ARX anonymize the data so it’s compliant with HIPAA, and then that data can be shared with policymakers, engineers, scientists, and others who will make policy decisions and scientific studies based on this information.”&nbsp;</p> <p>While many people receiving medical care are comfortable with their information being included in larger data sets for purposes of medical discovery, they likely do not want personal, identifiable information released.</p> <div class="align-left"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-10/somiya_presenting.jpeg?itok=J1ansOsf" width="350" height="263" alt="Somiya Chhillar speaking at the ACCESS Academy" loading="lazy"> </div> </div> <p>“For patients, and especially those from more vulnerable or marginalized communities, data privacy is not an abstract concern, it’s deeply tied to trust in the health care system," said paper co-author Rebecca Sutter, a professor in the <a href="https://nursing.gmu.edu" title="Nursing">School of Nursing</a>, and director of the <a href="https://publichealth.gmu.edu/mapclinics" title="MAP">MAP Clinics</a>. "The integrity of tools like ARX matters because they underpin how we protect patient information while advancing public health research. When anonymization fails, it’s not only a technical vulnerability, it’s a human one."</p> <p>Computer science PhD student Somiya Chhillar, lead author on the paper, said that the ubiquity of ARX was a reason they chose to study it. “We wanted to see how ARX really operates and how the algorithm works. While we were doing that, we realized that a few of the steps that it takes are very opportunistic, and because of that, it leaks information that we shouldn't be finding out by just looking at the anonymized data.”</p> <p>Chhillar said that ARX follows a “greedy strategy,” explaining that there is a tension between privacy and utility. When data is shared, it should be useful without leaking information. The best metric for deciding the data usefulness is measured by information loss while the data is being made private. “The algorithm tries to minimize information loss while anonymizing the data, and ideally, we want the least possible information loss. And that's the greedy aspect of it; it's not always going for the most private, it’s just going for the most utilit<strong>y.”</strong></p> <p>This is what backfires, said Kornaropoulos, because experts (or attackers) can reverse engineer the anonymization steps the algorithm took throughout its execution to maximize utility and figure out properties of the data that were there before and after this anonymization step.</p> <p>Kornaropoulos praised his student’s dedication to the discovery, noting that Chhillar “worked on this project for a while, and this code base of ARX is an elaborate tool, with thousands of lines of code. She had to go through it to truly internalize understand everything that's going on there,” he said.</p> <p>The project was supported by a <a href="https://cyberinitiative.org" title="CCI">Commonwealth Cyber Initiative (CCI)</a> grant from the program, “Securing Interactions between Humans and Machines,” and as a requirement of the grant, the project crossed different parts of the university. The College of Engineering and Computing collaborated with 鶹Ƶ and Partners (MAP) Clinics, which provided <strong>the data.</strong></p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/evgenios" hreflang="en">Evgenios Kornaropoulos</a></div> <div class="field__item"><a href="/profiles/rsutter2" hreflang="und">Rebecca Sutter, DNP, APRN, BC-FNP</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="30b1167e-304a-45f9-88b5-13a68b5c60e5" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="8ef98303-35f1-4073-ae4d-1f1a562f856d"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/strengths/cybersecurity"> <p class="cta__title">Learn more about Cybersecurity at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="db1cdb29-2248-499d-a67a-b80231e75b6e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="b4a204af-9cf8-4501-8c96-e0ad82cc5004" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-afad1ce9e30cb578d2a8343102150a25ce0ebbe821e900e08f3367009782defa"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award" hreflang="en">Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 27, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/5846" hreflang="en">Data Mining in Health Care</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 20 Oct 2025 15:12:08 +0000 Nathan Kahl 343951 at Bluetooth blues? George 鶹Ƶ turns a bug into a big win /news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win <span>Bluetooth blues? George 鶹Ƶ turns a bug into a big win </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-08-20T21:28:32-04:00" title="Wednesday, August 20, 2025 - 21:28">Wed, 08/20/2025 - 21:28</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">鶹Ƶ College of Engineering and Computing faculty members made a significant impact at the </span><a class="Hyperlink SCXW100636426 BCX4" href="https://www.usenix.org/conference/usenixsecurity25" target="_blank"><span class="TextRun Underlined SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">2025 USENIX Security Conference</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">, in Seattle, including winning the Distinguished Artifact Award.&nbsp;</span><span class="EOP SCXW100636426 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-08/screenshot_2025-08-21_at_9.31.34_am.png?itok=M6puaklc" width="350" height="346" loading="lazy"> </div> </div> <figcaption>Photo provided</figcaption> </figure> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">“Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AirTag</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Without Root Privileges,” a paper by the Department of Computer Science’s PhD student Junming Chen, PhD candidate </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Xiaoyue</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Ma, and Lannan Luo and Qiang Zeng, both associate professors, won the prestigious Distinguished Artifact Award, which was granted to only six of the 2,385 submitted papers.&nbsp;</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Their research demonstrated how to turn Bluetooth devices into a trackable "</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AirTags</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">" without requiring root privileges. The research revealed a vulnerability in Apple's Find My Network that can leverage more than a billion active Apple devices as unwitting finders. The high-quality artifact with its complete documentation and practical implementation provides researchers with an invaluable toolkit for evaluating tracking vulnerabilities in crowd-sourced location networks. Their work was previously reported </span><a class="Hyperlink SCXW100636426 BCX4" href="https://cec.gmu.edu/news/2025-02/find-my-hacker-how-apples-network-can-be-potential-tracking-tool" target="_blank"><span class="TextRun Underlined SCXW100636426 BCX4 NormalTextRun" lang="EN-US">by the university</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> and received media attention in </span><a href="https://cybernews.com/security/hackers-can-track-bluetooth-device-like-airtag/" title="cybernews"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">various</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> </span><a href="https://www.macworld.com/article/2622275/researchers-hack-apples-find-my-network-to-track-any-bluetooth-device.html" title="macworld"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">outlets</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">.&nbsp;</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-08/unisex_poster_session.jpg?itok=kqxG_tp6" width="350" height="219" loading="lazy"> </div> </div> <figcaption>A crowd gathers at the team's poster session. Photo provided. &nbsp;</figcaption> </figure> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">USENIX Security is one of the country’s premier cybersecurity conferences, and this year received 2,385 paper submissions with a 17% acceptance rate. The following </span><span class="TextRun Highlight SCXW100636426 BCX4 NormalTextRun" lang="EN-US">George 鶹Ƶ research papers were also accepted at USENIX this year. </span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/li-xiang" title="rowhammer"><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US"><strong>Rowhammer</strong></span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs</strong></span></a><span class="EOP SCXW100636426 BCX4">&nbsp;</span><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Xiang Li, Ying Meng, Junming Chen, Lannan Luo, and Qiang Zeng, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/sun-shiyu" title="dispatch"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>DISPATCH: Unraveling Security Patches from Entangled Code Changes</strong></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></a><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Shiyu Sun and Yunlong Xing, 鶹Ƶ; Xinda Wang, University of Texas at Dallas; Shu Wang, Palo Alto Networks, Inc.; Qi Li, Tsinghua University; Kun Sun, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/chen-hung-mao" title="typepulse"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs</strong></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></a><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Hung-Mao Chen and Xu He, 鶹Ƶ; Shu Wang, 鶹Ƶ and Palo Alto Networks Inc.; </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Xiaokuan</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Zhang and Kun Sun, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/pasquini " title="LLMmap"><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US"><strong>LLMmap</strong></span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>: Fingerprinting for Large Language Models</strong></span></a><span class="EOP SCXW100636426 BCX4">&nbsp;</span><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Dario Pasquini, RSAC Labs; Evgenios M. Kornaropoulos and Giuseppe </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Ateniese</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="9b99677b-4bad-446f-99f5-1ee30aaa7e7a"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Explore the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zeng" hreflang="en">Qiang Zeng</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="809d14ae-7b18-429d-86ca-4a00081cc446" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-3e0e7d9ec44ddcaa8c5966a1150953c23aff2477c45406ff082f2f19be7cb045"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2023-09/cyber-cyclists-count-calories-adaptive-virtual-workouts" hreflang="en">Cyber cyclists count calories with adaptive virtual workouts </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 19, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/ais-blind-spots-one-phd-students-clear-vision" hreflang="en">AI’s blind spots, one PhD student’s clear vision </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/7551" hreflang="en">Awards</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Thu, 21 Aug 2025 01:28:32 +0000 Nathan Kahl 342841 at One tiny flip that opens a backdoor in AI /news/2025-08/one-tiny-flip-opens-backdoor-ai <span>One tiny flip that opens a backdoor in AI</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-08-11T09:13:32-04:00" title="Monday, August 11, 2025 - 09:13">Mon, 08/11/2025 - 09:13</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun intro-text" lang="EN-US">A self-driving motor vehicle is cruising along, its numerous sensors and cameras telling it when to brake, change lanes, and make turns. The vehicle approaches a stop sign at a high rate of speed, but instead of stopping, it barrels through, causing an accident. The problem will probably never be found by investigators, but instead of reading the stop sign as a stop sign, the car had been hacked to see it instead as a speed limit sign.&nbsp;</span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">According to research by 鶹Ƶ’s </span><a href="/profiles/zeng" title="Zeng"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Qiang Zeng</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, an associate professor in the </span><a href="https://cs.gmu.edu" title="CS"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Department of Computer Science</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, and PhD student Xiang Li and colleagues, it is remarkably simple for a would-be hacker to pull off such a feat.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">“An attacker can selectively flip only one bit, and this changing of the bit from 0 to 1 allows an attacker to attach a patch onto any image and fool the AI system. Regardless of the original image input, that patched image will be interpreted as the attacker’s desired result,” said Zeng.&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">So</span><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, if the hacker wants an artificial intelligence (AI) system to see a stop sign as something else, or a cat as a dog, the effort is minimal. Consider a scene potentially pulled from a </span><em><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Mission: Impossible </span></em><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">movie, where a corporate spy can pass himself off as a CEO, gaining access to sensitive information.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Zeng and colleagues presented a </span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/li-xiang" title="oneflip paper"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">paper</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"> with the findings at </span><a class="Hyperlink SCXW265838489 BCX4" href="https://www.usenix.org/conference/usenixsecurity25" target="_blank"><span class="TextRun Underlined SCXW265838489 BCX4 NormalTextRun" lang="EN-US">USENIX Security 2025</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, one of the nation’s premier cybersecurity conferences.</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">AI systems have what’s called a deep neural network (DNN) as a key component. DNNs let AI handle complex data and perform many different tasks. They work by using numerical values, called weights, each typically stored in 32 bits. There are hundreds of billions of bits in a DNN, so changing only one is particularly stealthy, according to Zeng.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">“Once the attacker knows the algorithm, then it can take literally only a couple minutes to make the change. And you won’t realize you’ve been attacked because the AI system will work as usual. Flipping one bit effectively sneaks a backdoor into AI, exploitable only by those who know the patch,” he said. &nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Prior work in this area typically added a patch tailored to the original image—for example, modifying a stop sign specifically so that it is misclassified as a 65 mph speed limit sign. This new research uses what’s called a uniform patch that works regardless of the original input; the hacker could cause the system to interpret various signs as a speed limit sign. This input-agnostic attack represents a newer and more dangerous threat.</span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4">&nbsp;</span><br><span class="TextRun EmptyTextRun SCXW265838489 BCX4" lang="EN-US"></span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4">&nbsp;</span><br><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">When they began the project the researchers wanted to learn the minimum level of effort needed to launch such an attack, recognizing that flipping hundreds of bits is impractical </span><span class="TextRun SCXW265838489 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">and gets</span><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"> exponentially difficult. “It turned out, we only needed to flip one,” Zeng said with a laugh. The team named their attacking system, appropriately, </span><a class="Hyperlink SCXW265838489 BCX4" href="https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Foneflipbackdoor.github.io%2F&amp;data=05%7C02%7Cnkahl%40gmu.edu%7Cf7a4d881ca1543cf163f08ddd525ea85%7C9e857255df574c47a0c00546460380cb%7C0%7C0%7C638901081004115421%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=8qWXwwTlkfU9tea0qD6BHNMYDV%2BlcYSoVEM8RxukbNk%3D&amp;reserved=0" target="_blank"><span class="TextRun Underlined SCXW265838489 BCX4 NormalTextRun" lang="EN-US">OneFlip</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">The researchers are now only looking at the implication for images, as image classifiers are among the most popular AI systems, though they suspect this hacking technique could also work for things like speech recognition. Zeng said that their success rate during testing was near 100% and stressed that all DNN systems are likely to be subject to such hacking.</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">This does not necessarily mean such hacking will run rampant. To launch the attack, Zeng said, there are two requirements: access to the exact weights (numerical values that the model learns during training of the AI system) and the ability to execute code on the machine hosting the model. For example, in cloud environments, attackers might exploit shared infrastructure where multiple tenants’ programs run on the same physical hardware.</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="2db60af7-2754-4993-b14a-972987ad430c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="10496547-917c-4bf1-8e1d-996aa300f64d"> <div class="cta"> <a class="cta__link" href="/AI"> <p class="cta__title">Learn about AI at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="e73004a4-7cfa-43a1-b758-8e72a61bd240" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="46e3a48d-4810-43dc-b695-c94e9f064457" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-741971db371ec3e2394b96d5cb290255df9fe197346fca1d355743fcf3cc4dbb"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/3-million-national-institute-aging-grant-will-provide-much-needed-support-underserved" hreflang="en">$3 million National Institute on Aging grant will provide much-needed support to underserved dementia caregivers</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/resilient-robots-rough-terrain" hreflang="en">Resilient robots in rough terrain </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 14, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/ist-professors-unveil-human-ai-collaboration-tool-automate-cartoon-colorization" hreflang="en">IST professors unveil human-AI collaboration tool to automate cartoon colorization</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 10, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/one-woman-team-puts-many-eyes-skies" hreflang="en">A one-woman team puts many eyes in the skies </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 1, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/7361" hreflang="en">Autonomous Cars</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 11 Aug 2025 13:13:32 +0000 Nathan Kahl 314951 at Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award /news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award <span>Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-01-27T12:32:18-05:00" title="Monday, January 27, 2025 - 12:32">Mon, 01/27/2025 - 12:32</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p lang="EN-US"><span class="intro-text"><a href="https://cs.gmu.edu/~evgenios/" title=" Evgenios Kornaropoulo">Evgenios Kornaropoulos</a>, an assistant professor in 鶹Ƶ’s <a href="https://cs.gmu.edu" title="Computer Science">Computer Science</a> Department,&nbsp;focuses on computer security and applied cryptography, where he stays ahead of changes in the field. "The needs of everyday users have grown, and our technology's privacy expectations must advance accordingly,” he said. “We've moved beyond simply communicating sensitive data securely; now, we need technology capable of performing computations on sensitive data without compromising privacy.”&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-09/evgenios_kornaropoulos.jpg?itok=dvUt_y7M" width="350" height="350" alt="Kornaropoulos headshot" loading="lazy"> </div> </div> <figcaption>Evgenios Kornaropoulos. Photo provided</figcaption> </figure> <p>He recently received a <a href="https://www.nsf.gov" title="NSF">National Science Foundation (NSF)</a> <a href="https://new.nsf.gov/funding/opportunities/career-faculty-early-career-development-program" title="CAREER award">CAREER award</a> for $648,811 for his work on privacy and data security under the title “Encrypted Systems with Fine-Grained Leakage.”&nbsp;&nbsp;</p> <p>The tension between the privacy of sensitive data and the functionality that users demand from their data is the focus of the NSF CAREER funding, and it has been among Kornaropoulos’ research areas for several years. He said, “The new technology that we are developing allows the user to never expose any information in the clear to the cloud while maintaining functionality. You want the cloud to do interesting computations for you without decrypting your information. If you don't decrypt, the cloud never gets to see what you are processing.”&nbsp;</p> <p>When users store sensitive information, such as health records or financial data, with common cloud-based providers, the provider gains full access to the document's contents—essentially exposing the data in plain text to the cloud. A potential remedy is to encrypt the data before uploading it. However, this approach comes with a drawback: whenever users need to access or compute something from the encrypted data, they must download all the scrambled files locally and perform the computations on their own devices.&nbsp;</p> <p>So how can the user still process the information but know that the cloud didn’t learn anything? “We believe that the answer is the notion of ‘cryptographic leakage’, he said. “The cloud provider still sees some accesses on encrypted data, that is, the leakage, but these observations are confusing. Our designs scale to today’s needs and come with provable guarantees that these observations cannot be meaningfully stitched together by the cloud provider to infer the sensitive data.”&nbsp;</p> <p>Kornaropoulos said, “Searching on encrypted data is one of the biggest functionalities and we have a research thrust in which we will collaborate with industry leaders and local organizations on this problem. Specifically, we have an active collaboration with the <a href="https://publichealth.gmu.edu/mapclinics" title="MAP clinics">鶹Ƶ and Partners Clinics</a> (interprofessional clinics which serve the uninsured and refugee community within Prince William and Fairfax counties in Northern Virginia) to explore the application scenarios of our technology to that setting.”&nbsp;<br><br> <br><br> "Privacy-preserving data storage and data use is an important problem in computer security that is of critical interest to organizations that must trust their sensitive data to third-party data storage facilities," said Computer Science department chair David Rosenblum. &nbsp; "Evgenios is an internationally renowned leader in addressing this problem, and his NSF CAREER award will afford him the opportunity to explore novel solutions that balance strong security guarantees against practical needs for efficiency."</p> <p>The NSF CAREER award is reserved for the nation’s most talented up-and-coming researchers. From the NSF website: “The Faculty Early Career Development (CAREER) Program offers NSF’s most prestigious award in support of early-career faculty who have the potential to serve as academic role models in research and education and to lead advances in the mission of their department or organization.”&nbsp;&nbsp;&nbsp;</p> <p>The award is the most-recent of several distinctions Kornaropoulos has earned. He was elevated to IEEE Senior Member in 2024, his paper was among the finalists for the “<a href="https://cec.gmu.edu/news/2024-09/computer-science-paper-nominated-pwnie-award-best-cryptographic-attack-category" target="_blank">Best Cryptographic Attack</a>” category at Pwnie Awards 2024, and his latest work at the intersection of AI and security has <a href="https://cec.gmu.edu/news/2024-11/evgenios-kornaropoulos-quoted-ai-and-large-language-models" target="_blank">gained significant media attention</a>.&nbsp;&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/evgenios" hreflang="en">Evgenios Kornaropoulos</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="46b947cc-9fad-44b5-8407-f725ea1fe557" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="3550358c-f469-484a-927f-b94b1a277085"> <div class="cta"> <a class="cta__link" href="https://cs.gmu.edu/"> <p class="cta__title">Connect with the Department of Computer Science <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="87a69010-1fd4-4adb-b0e0-d230a59d64fc" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="dc8a2233-9e53-4cc3-98ac-acd15cd628e4" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-e8352cc14ec1675dd390c7c7157660e2f4f2435a5691800cd6d5e4019059d858"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/new-smithsonian-mason-opportunity-offers-students-pathway-conservation-science" hreflang="en">New Smithsonian-鶹Ƶ opportunity offers students a pathway to conservation science</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/arctic-resilience-nsf-george-mason-university-and-collaborators-seek-solutions-future" hreflang="en">Arctic Resilience: NSF, 鶹Ƶ, and collaborators seek solutions for the future </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 7, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/helping-older-adults-embrace-ai-and-emerging-technologies-national-science-foundation" hreflang="en">Helping older adults embrace AI and emerging technologies with a National Science Foundation grant</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 26, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/1161" hreflang="en">National Science Foundation</a></div> <div class="field__item"><a href="/taxonomy/term/6606" hreflang="en">鶹Ƶ and Partners (MAP)</a></div> </div> </div> </div> </div> </div> Mon, 27 Jan 2025 17:32:18 +0000 Nathan Kahl 115471 at Cyber savant hacks his way onto international team /news/2024-12/cyber-savant-hacks-his-way-international-team <span>Cyber savant hacks his way onto international team</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2024-12-03T11:48:51-05:00" title="Tuesday, December 3, 2024 - 11:48">Tue, 12/03/2024 - 11:48</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span><span><span><span class="intro-text">Dylan Victor Knoff is president of the <a href="https://competitivecyber.club" title="MCC">鶹Ƶ Competitive Cyber (MCC) club</a>, a computer science major, and the kind of self-motivated hacker you might see rummaging through Goodwill bins, in his free time looking for a $4 router that he can use to bolster his resume.</span> </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><strong>“</strong>I’ll pull it apart and take the firmware off the chip. It's good fun, responsibly and ethically doing stuff to it, of course, and then reporting vulnerabilities,” he said. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>The 鶹Ƶ junior likes to examine routers because they are more likely than other devices to have detectable problems. Once he finds a vulnerability, per industry practice, he reports it to the vendor and then <a href="https://www.mitre.org" title="MITRE">MITRE</a>, the nonprofit that that catalogs firmware and software problems. Getting a mention on their common vulnerabilities and exposures listing looks good professionally for young cyber sleuths. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>This ambition to make the cyber world a better, safer place is a theme in Knoff’s life. First, he started a Capture the Flag (CTF) team during high school, and then he attended a university cyber club while still a teen. When the Orlando native and first-gen college student could have chosen the local University of Central Florida, instead he left home for George 鶹Ƶ, recognizing the university’s prowess in the field and the benefit of being close to potential employers in the Washington, D.C., metropolitan region. Knowing that breaking into cybersecurity is no Mickey Mouse endeavor, shortly after arriving in Fairfax he networked with the <a href="https://www.battelle.org" title="Battelle">Battelle</a> intern coordinator and subsequently landed a paid, full-time co-op with the STEM giant. </span></span></span></span></span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-12/screen_shot_2024-12-03_at_11.56.00_am.png?itok=Fw9nYe6M" width="330" height="350" alt="Young man stands on a rocky trail" loading="lazy"> </div> </div> <figcaption>When he's not hacking routers, Knoff enjoys Shenandoah National Park</figcaption> </figure> <p><span><span><span><span><span><span><span>Knoff is on the U.S. Cyber Team and in October competed at the International Cybersecurity Challenge in Santiago, Chile. He said, “We competed against other countries’ teams in a two-day CTF, where one day was attack-and-defend, and the second day was on vulnerability assessment and exploit development.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff’s research focus is reverse engineering and vulnerability research. “I'll find something wrong with a specific device or framework and I'll find a ‘zero day,’ which is a vulnerability that is unknown to the vendor, and then I'll disclose it to them,” he said, indicating the standard industry practice. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>For next year’s <a href="https://www.districtcon.org" title="District Con">DistrictCon</a>, a hacker conference in Washington, D.C., in February, Knoff and two members of MCC participated in the Junkyard Contest, where participants find vulnerabilities in devices; they discovered a stunning eight zero days on one router. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff is giving a separate talk at the conference, on return-oriented programming, a way that hackers can get into a system by reusing code that already exists in a program. “I made this tool that utilizes computer emulation to analyze and visualize the memory side effects of elements that make up a return-oriented attack. Using data aggregation, these elements are then sorted based on their exploitation effects and made easily searchable to an operator.” He made the<strong> </strong>tool open source, available to anyone on GitHub, and is releasing an updated version the day of the talk.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>On rare days when he’s not at a keyboard, Knoff enjoys getting outside, especially for a hike. “I love going to Shenandoah with my friends, doing Old Rag and White Oak,” he said, referencing two of the more popular—and challenging—Shenandoah National Park trails. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Currently he’s entertaining offers for two new co-ops, with the hopes of potentially spinning one of those into full-time employment. And whether scaling digital peaks or the rugged trails of Shenandoah, Knoff will find himself climbing…toward discovery and solutions in a safer cyber world.</span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/10431" hreflang="en">鶹Ƶ Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Tue, 03 Dec 2024 16:48:51 +0000 Nathan Kahl 115026 at Information technology students stepped up to secure Virginia’s elections  /news/2024-08/information-technology-students-stepped-secure-virginias-elections <span>Information technology students stepped up to secure Virginia’s elections&nbsp;</span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2024-08-28T10:19:47-04:00" title="Wednesday, August 28, 2024 - 10:19">Wed, 08/28/2024 - 10:19</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Secure elections are the cornerstone of democracy, and the </span><a href="https://csis.gmu.edu/VA-CNIP/" target="_blank"><span class="intro-text">Virginia Cyber Navigator Internship Program (VA-CNIP)</span></a><span class="intro-text"> has equipped students with the skills to strengthen the cybersecurity posture of election infrastructures. As an intern last summer, information technology (IT) major Duong Thuy Nguyen helped secure a rural county's technology for the upcoming presidential election alongside two other George 鶹Ƶ students, Maha Khan and Sophie Bates.&nbsp;&nbsp;</span></p> <p>Sponsored by the National Security Agency (NSA) and run by the University of Virginia (UVA) and five other Virginia universities including George 鶹Ƶ, VA-CNIP was developed to address the need for improved election security in localities that may not have the resources to implement necessary cybersecurity measures. In 2025, VA-CNIP received the Innovation Award from the <a href="https://electionverification.org/">Election Verification Network</a>.&nbsp;</p> <p>Nguyen, who is pursuing a dual concentration in database technology and programming and cyber security, traveled to Campbell County for a few days each week over the summer to support the county’s dedicated and hard-working IT staff in complying with the Locality Election Security Standards (LESS) required by the Commonwealth of Virginia. The LESS requirements are designed to ensure that all localities, regardless of size, have baseline cybersecurity measures in place, with further goals to achieve "preferred" or "premium" levels of security. The program thus not only prepared students for future careers but also left a lasting impact on the local governments they serve.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-2_3.png?itok=FGRYqmk3" width="350" height="350" alt="From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns." loading="lazy"> </div> </div> <figcaption>From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns. Photo provided.</figcaption> </figure> <p>George 鶹Ƶ Associate Professor <a href="https://ist.gmu.edu/profiles/malbanes" target="_blank">Max Albanese</a> helped lead VA-CNIP, designing a course in election security that was a prerequisite for all interns. In addition to the course, a two-day boot camp at UVA provided interns with training, including hands-on activities and talks from high profile industry experts and election officials. This year United States Election Assistance Commissioner <a href="https://www.eac.gov/about/commissioner-thomas-hicks" target="_blank">Thomas Hicks</a> spoke at the boot camp. &nbsp;</p> <p>“Especially this year, the focus was on trying to send interns to localities that were in most need of upgrading their security posture,” said Albanese, “and that means the more rural or less technologically advanced counties.”&nbsp;</p> <p>Each week, students worked remotely for part of their assignments but also traveled to their assigned localities for on-site work. Due to the often-rural nature of the counties involved, VA-CNIP provided a $3,000 travel allowance to each intern in addition to their $9,000 stipend. This allowed students to travel long distances and, when necessary, stay overnight in nearby towns to avoid lengthy commutes. The George 鶹Ƶ interns this year traveled about four hours one way to reach Campbell County.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-1.png?itok=OQCyhNux" width="350" height="350" alt="Duong Thuy Nguyen" loading="lazy"> </div> </div> <figcaption>Nguyen in Campbell County. Photo provided.&nbsp;</figcaption> </figure> <p lang="EN-US">Nguyen noted how rewarding it was to work in-person with the local IT department. Her tasks included developing security policies, conducting research on cybersecurity tools, and even designing tabletop exercises to prepare local officials for possible cyber incidents on election day. Nguyen raved about her internship, which was her first. Even though she had to travel a lot, she said, she would not change her experience.&nbsp;&nbsp;</p> <p>“They were all very welcoming, and they gave us all the support that we needed,” she said.&nbsp;</p> <p>VA-CNIP exemplifies the power of academia, government, and students working together to tackle one of the most pressing challenges of our time—ensuring the security and integrity of democratic processes. While funding for VA-CNIP ends this year, there are ongoing discussions about sustaining the program going forward.&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="3df8860a-6498-4223-88d1-386b0e2e9e72" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="e4d0e643-b2ab-481a-a23f-e92a9de56b2b" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="b8646372-316e-4ee0-9df4-a32355a38510" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="6c5500e8-38fb-4db8-b451-e1a408d00e4a" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="210da48f-6e9f-4aad-afe4-d779990806bf"> <div class="cta"> <a class="cta__link" href="https://careers.gmu.edu/"> <p class="cta__title">Explore career options at University Career Services <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="1f69ae4e-2d53-4eb5-aba0-6afcc3c8723c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="30b02d2b-11e9-4339-a964-804f8fa22d87" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a7d8fa7e-ca73-4633-8a98-b8b0715fe7d3" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="5f3af51a-1528-4759-bdfe-7f8ff7c799db" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-0bed9fb2bba72570d1e7d8bbd818481fe1e5c7c33fdac1365e307b4ea8773b7c"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/confidence-meets-opportunity-fall-2025-career-fair" hreflang="en">Confidence meets opportunity at Fall 2025 Career Fair </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/skills-learned-jurisprudence-learning-community-help-student-land-full-time-position" hreflang="en">Skills Learned in Jurisprudence Learning Community Help Student Land Full-Time Position</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/environmental-science-major-lands-internship-us-geological-survey" hreflang="en">Environmental science major lands internship with U.S. Geological Survey </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/field-career-dreams-grad-student-spends-summer-identifying-and-protecting-native" hreflang="en">Field of career dreams: Grad student spends summer identifying and protecting native plants</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 2, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4c6b27b6-a672-498e-8bf0-5580252d233c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef35a6ca-7194-4900-a001-515fc9db772e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a53faa93-425a-4277-b02c-6c50c35d77d2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/1961" hreflang="en">information technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/19266" hreflang="en">Elections</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/20416" hreflang="en">CEC high impact stories</a></div> <div class="field__item"><a href="/taxonomy/term/20536" hreflang="en">CEC internships</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Wed, 28 Aug 2024 14:19:47 +0000 Teresa Donnellan 113761 at Cybersecurity Honors College student ready to hit the ground running /news/2024-08/cybersecurity-honors-college-student-ready-hit-ground-running <span>Cybersecurity Honors College student ready to hit the ground running</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2024-08-12T13:59:19-04:00" title="Monday, August 12, 2024 - 13:59">Mon, 08/12/2024 - 13:59</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Jose Perez starts at 鶹Ƶ this fall, majoring in </span><a href="https://catalog.gmu.edu/colleges-schools/engineering-computing/engineering/cyber-security-engineering/cyber-security-engineering-bs/" title="Cyber security engineering"><span class="intro-text">Cyber Security Engineering</span></a><span class="intro-text"> and participating in the </span><a href="https://honorscollege.gmu.edu/"><span class="intro-text">Honors College</span></a><span class="intro-text">. But the Falls Church, Virginia native feels like he’s already a student, in a way.</span></p> <p><span>“I’m familiar with so many of the faculty at this point because I participated in the </span><a href="https://eip.gmu.edu/"><span>Early Identification Program</span></a><span>—I’ve been coming here for summer events since as early as 8th grade,” he said. “I’ve already formed a sense of community here. And as an International Baccalaureate student, I had college-level work for two years and so have decent academic preparation.”</span></p> <p><span>He describes himself as a “STEM kid from the get-go,” and participated in cybersecurity-related extracurriculars in high school. “For me, it’s the best cross between raw engineering and computer science.” Being part of Meridian High School’s Cyber Patriots team exposed him to the challenges and opportunities in computer science.</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/jose_perez_at_first_0.jpeg?itok=_sf7oUCF" width="350" height="263" alt="A high school student holds a name badge for a FIRST Robotics competition" loading="lazy"> </div> </div> <figcaption>Perez took part in the First Robotics Competition in high school. Photo provided</figcaption> </figure> <p><span>He burnished his high school resume with a lot of extracurriculars: He was the lead engineer on a Science Olympiad team, participated in George 鶹Ƶ’s </span><a href="https://cssr.gmu.edu/initiatives/yrc" title="Youth Research Council"><span>Youth Research Council</span></a><span>, volunteered for Habitat for Humanity, and was a four-year participant in the urban farm project&nbsp;at his school.</span></p> <p><span>Perez is the child of immigrants from the Philippines—both his parents are nurses—and he recognizes that opportunities presented here at George 鶹Ƶ will allow him a great path toward upward mobility that he might not have at other institutions, especially being able to save money while living at home. “I knew I would be happy here and get what I need, especially because I feel like I've already formed a sense of community here.”</span></p> <p><span>He’s ready and excited for what new changes are in place. “I’m aware of the new amount of freedom and responsibility I’ll have as a college student. I’ll just be prepared to take that on. I’m trying to push myself to do a lot this first semester and I’m part of the </span><a href="https://studyabroad.gmu.edu/gateway/index.html"><span>Global Gateway</span></a><span> and will be going to Korea in my second semester. It will be a great way to throw myself in there.”</span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/661" hreflang="en">Early Identification Program (EIP)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Mon, 12 Aug 2024 17:59:19 +0000 Nathan Kahl 113891 at 鶹Ƶ redesignated as a National Center of Academic Excellence /news/2023-12/george-mason-university-redesignated-national-center-academic-excellence <span>鶹Ƶ redesignated as a National Center of Academic Excellence</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2023-12-05T10:42:36-05:00" title="Tuesday, December 5, 2023 - 10:42">Tue, 12/05/2023 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">鶹Ƶ was recently redesignated by the National Security Agency (NSA) as a National Center of Academic Excellence (NCAE) in Cybersecurity. This recognition continues a designation that has been in place since 1999 and makes 鶹Ƶ’s College of Engineering and Computing eligible for special funding opportunities.&nbsp;</span></p> <p><span><span><span><span><span><span><span>鶹Ƶ was redesignated in two categories: Cyber Defense (CAE-CD), valid through 2027, and Research (CAE-R), valid through 2028. 鶹Ƶ is one of only seven schools that received a designation with the original cohort in 1999. The CAE in Cyber Defense is the longest-running designation of any program in the country. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>NSA has curriculum requirements that a program must meet, involving a rigorous, peer-reviewed, multi-step application. Massimiliano (Max) Albanese, an associate professor and associate chair for research in the Department of <a href="https://ist.gmu.edu">Information Sciences and Technology</a> and the associate director of the Center for Secure Information Systems, helps lead 鶹Ƶ’s efforts in securing the designation. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>According to the CAE Community website, “The CAE in Cyber Research designation indicates that (an) institution increases the understanding of robust cyber defense technology, policy, and practices that will enable our Nation to prevent and respond to a catastrophic event. The CAE in Cyber Defense designation indicates that (an) institution is helping reduce threats to our national infrastructure by promoting higher education and research in cyber defense as well as provide the nation with a pipeline of qualified cybersecurity professionals.”</span></span></span></span></span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2023-12/nsa_designation.jpg?itok=NMkOLUZF" width="350" height="197" alt="Three government representatives stand with a 鶹Ƶ professor, who is holding a plaque" loading="lazy"> </div> </div> <figcaption>Max Albanese&nbsp;(with plaque) with representatives from the FBI, NSA, and CISA</figcaption> </figure> <p><span><span><span><span><span><span><span>Albanese said, “To become eligible for the Cyber Defense designation, which is the education component of the NCAE program, a school has to have a validated program of study meeting NSA curriculum requirements; the one that allowed us to be eligible for the designation is our bachelor’s in information technology, with a concentration in cybersecurity.” To be eligible for the Research designation, a school must have a PhD program preparing students for research in cybersecurity, which at 鶹Ƶ is the PhD in information technology. Albanese added that the university is currently preparing an application to also validate the college’s master’s in applied information technology. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“In addition to the prestige,” Albanese said, “an advantage of the designation is that we have access to exclusive funding opportunities. We’ve been receiving funds for the Cyber Security Scholarship Program (<a href="https://csis.gmu.edu/CySP/">CySP</a>) for many years, for example, which covers tuition, health insurance for doctoral students, laptops, a stipend, and more.” The program brings roughly $150-$200k annually for 鶹Ƶ students. NSA funding that 鶹Ƶ receives for other cyber-based projects is also contingent on the school having the CAE designation. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Albanese said, “鶹Ƶ’s NCAE designation isn’t just a badge of honor, it’s a testament to our commitment to excellence in cybersecurity education and research. Beyond the obvious financial benefits, being part of the CAE community is a catalyst for innovation and collaboration. The innovative Virginia Cyber Navigator Internship Program (<a href="https://csis.gmu.edu/VA-CNIP/">VA-CNIP</a>), managed by a coalition of NCAE-designated Virginia universities, is a prime example&nbsp;of how being part of this community translates into impactful initiatives and real-world experiences for our students.”</span></span></span></span></span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="99fb9cb3-8a3e-4715-b0da-8682c8e06429"> <div class="cta"> <a class="cta__link" href="https://ist.gmu.edu/research"> <p class="cta__title">Learn 鶹Ƶ IST Research <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"> <div class="field field--name-field-cta-icon field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div> <div class="field field--name-field-media-font-awesome-icon field--type-fontawesome-icon field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div class="fontawesome-icons"> <div class="fontawesome-icon"> <i class="fas fa-desktop" data-fa-transform data-fa-mask style="--fa-primary-color: #000000; --fa-secondary-color: #000000;"></i> </div> </div> </div> </div> </div> </div> </div> </span> </a> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/18916" hreflang="en">cyber defense</a></div> <div class="field__item"><a href="/taxonomy/term/11351" hreflang="en">National Security</a></div> <div class="field__item"><a href="/taxonomy/term/18911" hreflang="en">National Center of Academic Excellence</a></div> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> </div> </div> </div> </div> </div> Tue, 05 Dec 2023 15:42:36 +0000 Nathan Kahl 110086 at CSIRTs protect cybersecurity; expand job opportunities /news/2022-03/csirts-protect-cybersecurity-expand-job-opportunities <span>CSIRTs protect cybersecurity; expand job opportunities </span> <span><span>Rena Malai</span></span> <span><time datetime="2022-03-11T15:05:11-05:00" title="Friday, March 11, 2022 - 15:05">Fri, 03/11/2022 - 15:05</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/shashem6" hreflang="en">Sherif Hashem</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Cybersecurity is a growing concern for anyone using technology—which is pretty much everyone. It’s an area that has seen tremendous research since the first global attacks surfaced in the late 1980s and early 1990s.&nbsp;</p> <p>Low-income countries can have challenges with getting appropriate cybersecurity protective measures in place and developing much-needed cybersecurity talents. To address this concern, <a href="https://ist.gmu.edu/" target="_blank">George 鶹Ƶ Information Sciences and Technology</a> professor <a href="https://ist.gmu.edu/profiles/shashem6" target="_blank" title="Sherif Hashem profile">Sherif Hashem</a> was part of a team that produced a report ‘Cyber Incident Management in Low-Income Countries.’ The report was funded by <a href="https://www.google.com/search?q=global+affairs+canada&amp;client=safari&amp;channel=mac_bm&amp;source=hp&amp;ei=PjsmYsC6EuqlytMP9eyUqA4&amp;iflsig=AHkkrS4AAAAAYiZJTranFkpWk77_zhn9mZ_Ai1t09bhS&amp;gs_ssp=eJzj4tTP1TcwzIk3z1FgNGB0YPASTc_JT0rMUUhMS0vMLCpWSE7MS0xJBADJiguE&amp;oq=global+affai&amp;gs_lcp=Cgdnd3Mtd2l6EAEYADILCC4QgAQQxwEQ0QMyBQguEIAEMggIABCABBDJAzIFCAAQgAQyBQgAEIAEMgUIABCABDIFCAAQgAQyCwguEIAEEMcBEK8BMgUIABCABDIFCAAQgAQ6DgguEIAEELEDEMcBEKMCOggIABCABBCxAzoRCC4QgAQQsQMQgwEQxwEQ0QM6CwgAEIAEELEDEIMBOggIABCxAxCDAToECAAQQzoHCAAQsQMQQzoQCC4QsQMQxwEQ0QMQ1AIQQzoRCC4QgAQQsQMQxwEQowIQ1AI6CwguEMcBENEDEJECOgUIABCRAjoKCC4QxwEQowIQQzoKCAAQsQMQgwEQQzoOCC4QgAQQsQMQxwEQ0QM6CwgAELEDEIMBEJECUABYgA9g5RpoAHAAeACAAXeIAZwGkgEEMTEuMZgBAKABAQ&amp;sclient=gws-wiz" target="_blank">Global Affairs Canada</a>, and presented last month in an international webinar by the <a href="https://thegfce.org/" target="_blank">Global Forum on Cyber Expertise.</a>&nbsp;</p> <p>According to Hashem, having Computer Security Incidence Response Teams (CSIRTs) in place can greatly help in handling and preventing cyber attacks. He says Computer Incidence Response is a term that popped up globally about 30 years ago, and it is associated with professionals who respond to the threats made over computer systems and networks.&nbsp;&nbsp;</p> <p>“Established CSIRTs can help detect a cyber attack when it happens, and greatly minimize its impact,” Hashem says. “Cyber attacks against critical national infrastructure can be some of the most impactful as they can potentially affect everyone in society.”&nbsp;</p> <p>One recent example is the Colonial Pipeline ransomware attack in 2021, the largest cyber attack on an oil infrastructure target in U.S. history, says Hashem.&nbsp;</p> <p>“CSIRTs across the globe work together to mitigate such cyber attacks and help bring the criminals to justice,” he says. “Without CSIRTs in situations like this, the aftermath of a cyber attack can be devastating. It’s better to be prepared and minimize any losses; recover quickly.”&nbsp;&nbsp;</p> <p>The ‘Cyber Incident Management in Low-Income Countries’ report showcases CSIRT models and structures that are workable within limited budgets. The report also provides guidance on developing technical skills within CSIRTs and highlights a wide range of training programs and tools.&nbsp;</p> <p>“Our research findings can be used holistically by any entity looking to establish CSIRTs, whether there is a limited budget or not,” says Hashem.&nbsp;</p> <p>The first CSIRT was created by Carnegie Mellon University over thirty years ago, says Hashem. Since then, the cybersecurity space has become an area rich with job opportunities. An estimated 400,000 open cybersecurity jobs are available today in the United States alone.&nbsp;</p> <p>“I hope this motivates students to consider information security as a part of their education and career plan,” says Hashem. “The opportunities are endless.”&nbsp;</p> <p>The <a href="https://youtu.be/B0XX3Qavf9w" target="_blank">full webinar is available to view on You Tube.</a>&nbsp; <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf" target="_blank">Part 1</a> and <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf" target="_blank">part 2</a> of the report are also available to view.&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> </div> </div> </div> </div> </div> Fri, 11 Mar 2022 20:05:11 +0000 Rena Malai 66866 at