Cyber Security / en Bluetooth blues? George 鶹Ƶ turns a bug into a big win /news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win <span>Bluetooth blues? George 鶹Ƶ turns a bug into a big win </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-08-20T21:28:32-04:00" title="Wednesday, August 20, 2025 - 21:28">Wed, 08/20/2025 - 21:28</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">鶹Ƶ College of Engineering and Computing faculty members made a significant impact at the </span><a class="Hyperlink SCXW100636426 BCX4" href="https://www.usenix.org/conference/usenixsecurity25" target="_blank"><span class="TextRun Underlined SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">2025 USENIX Security Conference</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun intro-text" lang="EN-US">, in Seattle, including winning the Distinguished Artifact Award.&nbsp;</span><span class="EOP SCXW100636426 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-08/screenshot_2025-08-21_at_9.31.34_am.png?itok=M6puaklc" width="350" height="346" loading="lazy"> </div> </div> <figcaption>Photo provided</figcaption> </figure> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">“Tracking You from a Thousand Miles Away! Turning a Bluetooth Device into an Apple </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AirTag</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Without Root Privileges,” a paper by the Department of Computer Science’s PhD student Junming Chen, PhD candidate </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Xiaoyue</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Ma, and Lannan Luo and Qiang Zeng, both associate professors, won the prestigious Distinguished Artifact Award, which was granted to only six of the 2,385 submitted papers.&nbsp;</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Their research demonstrated how to turn Bluetooth devices into a trackable "</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AirTags</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">" without requiring root privileges. The research revealed a vulnerability in Apple's Find My Network that can leverage more than a billion active Apple devices as unwitting finders. The high-quality artifact with its complete documentation and practical implementation provides researchers with an invaluable toolkit for evaluating tracking vulnerabilities in crowd-sourced location networks. Their work was previously reported </span><a class="Hyperlink SCXW100636426 BCX4" href="https://cec.gmu.edu/news/2025-02/find-my-hacker-how-apples-network-can-be-potential-tracking-tool" target="_blank"><span class="TextRun Underlined SCXW100636426 BCX4 NormalTextRun" lang="EN-US">by the university</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> and received media attention in </span><a href="https://cybernews.com/security/hackers-can-track-bluetooth-device-like-airtag/" title="cybernews"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">various</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> </span><a href="https://www.macworld.com/article/2622275/researchers-hack-apples-find-my-network-to-track-any-bluetooth-device.html" title="macworld"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">outlets</span></a><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">.&nbsp;</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-08/unisex_poster_session.jpg?itok=kqxG_tp6" width="350" height="219" loading="lazy"> </div> </div> <figcaption>A crowd gathers at the team's poster session. Photo provided. &nbsp;</figcaption> </figure> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">USENIX Security is one of the country’s premier cybersecurity conferences, and this year received 2,385 paper submissions with a 17% acceptance rate. The following </span><span class="TextRun Highlight SCXW100636426 BCX4 NormalTextRun" lang="EN-US">George 鶹Ƶ research papers were also accepted at USENIX this year. </span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/li-xiang" title="rowhammer"><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US"><strong>Rowhammer</strong></span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>-Based Trojan Injection: One Bit Flip Is Sufficient for Backdooring DNNs</strong></span></a><span class="EOP SCXW100636426 BCX4">&nbsp;</span><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Xiang Li, Ying Meng, Junming Chen, Lannan Luo, and Qiang Zeng, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/sun-shiyu" title="dispatch"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>DISPATCH: Unraveling Security Patches from Entangled Code Changes</strong></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></a><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Shiyu Sun and Yunlong Xing, 鶹Ƶ; Xinda Wang, University of Texas at Dallas; Shu Wang, Palo Alto Networks, Inc.; Qi Li, Tsinghua University; Kun Sun, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/chen-hung-mao" title="typepulse"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs</strong></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></a><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Hung-Mao Chen and Xu He, 鶹Ƶ; Shu Wang, 鶹Ƶ and Palo Alto Networks Inc.; </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Xiaokuan</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"> Zhang and Kun Sun, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/pasquini " title="LLMmap"><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US"><strong>LLMmap</strong></span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"><strong>: Fingerprinting for Large Language Models</strong></span></a><span class="EOP SCXW100636426 BCX4">&nbsp;</span><br><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">Dario Pasquini, RSAC Labs; Evgenios M. Kornaropoulos and Giuseppe </span><span class="TextRun SCXW100636426 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Ateniese</span><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US">, 鶹Ƶ</span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun EmptyTextRun SCXW100636426 BCX4" lang="EN-US"></span></p> <p class="Paragraph SCXW100636426 BCX4"><span class="TextRun SCXW100636426 BCX4 NormalTextRun" lang="EN-US"></span><span class="EOP SCXW100636426 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="9b99677b-4bad-446f-99f5-1ee30aaa7e7a"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Explore the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zeng" hreflang="en">Qiang Zeng</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="809d14ae-7b18-429d-86ca-4a00081cc446" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-4d0351e0b8e582fd4f0635c4cc8ac8cec76d25b7163e5a183914a1827316bd2c"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/ais-blind-spots-one-phd-students-clear-vision" hreflang="en">AI’s blind spots, one PhD student’s clear vision </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/barbara-snyder-honored-national-academic-advising-association-excellence-advising" hreflang="en">Barbara Snyder honored by National Academic Advising Association for excellence as an advising administrator</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 30, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/college-engineering-and-computing-mourns-passing-mark-pullen" hreflang="en">College of Engineering and Computing mourns the passing of Mark Pullen</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 15, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/7551" hreflang="en">Awards</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Thu, 21 Aug 2025 01:28:32 +0000 Nathan Kahl 342841 at One tiny flip that opens a backdoor in AI /news/2025-08/one-tiny-flip-opens-backdoor-ai <span>One tiny flip that opens a backdoor in AI</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-08-11T09:13:32-04:00" title="Monday, August 11, 2025 - 09:13">Mon, 08/11/2025 - 09:13</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun intro-text" lang="EN-US">A self-driving motor vehicle is cruising along, its numerous sensors and cameras telling it when to brake, change lanes, and make turns. The vehicle approaches a stop sign at a high rate of speed, but instead of stopping, it barrels through, causing an accident. The problem will probably never be found by investigators, but instead of reading the stop sign as a stop sign, the car had been hacked to see it instead as a speed limit sign.&nbsp;</span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">According to research by 鶹Ƶ’s </span><a href="/profiles/zeng" title="Zeng"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Qiang Zeng</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, an associate professor in the </span><a href="https://cs.gmu.edu" title="CS"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Department of Computer Science</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, and PhD student Xiang Li and colleagues, it is remarkably simple for a would-be hacker to pull off such a feat.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">“An attacker can selectively flip only one bit, and this changing of the bit from 0 to 1 allows an attacker to attach a patch onto any image and fool the AI system. Regardless of the original image input, that patched image will be interpreted as the attacker’s desired result,” said Zeng.&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">So</span><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, if the hacker wants an artificial intelligence (AI) system to see a stop sign as something else, or a cat as a dog, the effort is minimal. Consider a scene potentially pulled from a </span><em><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Mission: Impossible </span></em><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">movie, where a corporate spy can pass himself off as a CEO, gaining access to sensitive information.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Zeng and colleagues presented a </span><a href="https://www.usenix.org/conference/usenixsecurity25/presentation/li-xiang" title="oneflip paper"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">paper</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"> with the findings at </span><a class="Hyperlink SCXW265838489 BCX4" href="https://www.usenix.org/conference/usenixsecurity25" target="_blank"><span class="TextRun Underlined SCXW265838489 BCX4 NormalTextRun" lang="EN-US">USENIX Security 2025</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">, one of the nation’s premier cybersecurity conferences.</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">AI systems have what’s called a deep neural network (DNN) as a key component. DNNs let AI handle complex data and perform many different tasks. They work by using numerical values, called weights, each typically stored in 32 bits. There are hundreds of billions of bits in a DNN, so changing only one is particularly stealthy, according to Zeng.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">“Once the attacker knows the algorithm, then it can take literally only a couple minutes to make the change. And you won’t realize you’ve been attacked because the AI system will work as usual. Flipping one bit effectively sneaks a backdoor into AI, exploitable only by those who know the patch,” he said. &nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4" lang="EN-US"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">Prior work in this area typically added a patch tailored to the original image—for example, modifying a stop sign specifically so that it is misclassified as a 65 mph speed limit sign. This new research uses what’s called a uniform patch that works regardless of the original input; the hacker could cause the system to interpret various signs as a speed limit sign. This input-agnostic attack represents a newer and more dangerous threat.</span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4">&nbsp;</span><br><span class="TextRun EmptyTextRun SCXW265838489 BCX4" lang="EN-US"></span><span class="LineBreakBlob BlobObject DragDrop SCXW265838489 BCX4">&nbsp;</span><br><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">When they began the project the researchers wanted to learn the minimum level of effort needed to launch such an attack, recognizing that flipping hundreds of bits is impractical </span><span class="TextRun SCXW265838489 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">and gets</span><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"> exponentially difficult. “It turned out, we only needed to flip one,” Zeng said with a laugh. The team named their attacking system, appropriately, </span><a class="Hyperlink SCXW265838489 BCX4" href="https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Foneflipbackdoor.github.io%2F&amp;data=05%7C02%7Cnkahl%40gmu.edu%7Cf7a4d881ca1543cf163f08ddd525ea85%7C9e857255df574c47a0c00546460380cb%7C0%7C0%7C638901081004115421%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&amp;sdata=8qWXwwTlkfU9tea0qD6BHNMYDV%2BlcYSoVEM8RxukbNk%3D&amp;reserved=0" target="_blank"><span class="TextRun Underlined SCXW265838489 BCX4 NormalTextRun" lang="EN-US">OneFlip</span></a><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">.&nbsp;</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">The researchers are now only looking at the implication for images, as image classifiers are among the most popular AI systems, though they suspect this hacking technique could also work for things like speech recognition. Zeng said that their success rate during testing was near 100% and stressed that all DNN systems are likely to be subject to such hacking.</span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW265838489 BCX4"><span class="TextRun SCXW265838489 BCX4 NormalTextRun" lang="EN-US">This does not necessarily mean such hacking will run rampant. To launch the attack, Zeng said, there are two requirements: access to the exact weights (numerical values that the model learns during training of the AI system) and the ability to execute code on the machine hosting the model. For example, in cloud environments, attackers might exploit shared infrastructure where multiple tenants’ programs run on the same physical hardware.</span><span class="EOP SCXW265838489 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="2db60af7-2754-4993-b14a-972987ad430c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="10496547-917c-4bf1-8e1d-996aa300f64d"> <div class="cta"> <a class="cta__link" href="/AI"> <p class="cta__title">Learn about AI at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="e73004a4-7cfa-43a1-b758-8e72a61bd240" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="46e3a48d-4810-43dc-b695-c94e9f064457" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-4cd82f56de1b84676fbf417659506261a989c4e74280c1d5e8ffe9148c26923d"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/powered-ai" hreflang="en">Powered by AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 18, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/information-sciences-and-technology-instructor-patriot-through-and-through" hreflang="en">This information sciences and technology instructor is a Patriot through and through </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/dialing-new-9-1-1-training-ai" hreflang="en">Dialing up new 9-1-1 training with AI </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 9, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/mason-korea-hosts-young-innovators-summer-camp-local-youth" hreflang="en">鶹Ƶ Korea hosts Young Innovators Summer Camp for local youth</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3051" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/7361" hreflang="en">Autonomous Cars</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 11 Aug 2025 13:13:32 +0000 Nathan Kahl 314951 at Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award /news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award <span>Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-01-27T12:32:18-05:00" title="Monday, January 27, 2025 - 12:32">Mon, 01/27/2025 - 12:32</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p lang="EN-US"><span class="intro-text"><a href="https://cs.gmu.edu/~evgenios/" title=" Evgenios Kornaropoulo">Evgenios Kornaropoulos</a>, an assistant professor in 鶹Ƶ’s <a href="https://cs.gmu.edu" title="Computer Science">Computer Science</a> Department,&nbsp;focuses on computer security and applied cryptography, where he stays ahead of changes in the field. "The needs of everyday users have grown, and our technology's privacy expectations must advance accordingly,” he said. “We've moved beyond simply communicating sensitive data securely; now, we need technology capable of performing computations on sensitive data without compromising privacy.”&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-09/evgenios_kornaropoulos.jpg?itok=dvUt_y7M" width="350" height="350" alt="Kornaropoulos headshot" loading="lazy"> </div> </div> <figcaption>Evgenios Kornaropoulos. Photo provided</figcaption> </figure> <p>He recently received a <a href="https://www.nsf.gov" title="NSF">National Science Foundation (NSF)</a> <a href="https://new.nsf.gov/funding/opportunities/career-faculty-early-career-development-program" title="CAREER award">CAREER award</a> for $648,811 for his work on privacy and data security under the title “Encrypted Systems with Fine-Grained Leakage.”&nbsp;&nbsp;</p> <p>The tension between the privacy of sensitive data and the functionality that users demand from their data is the focus of the NSF CAREER funding, and it has been among Kornaropoulos’ research areas for several years. He said, “The new technology that we are developing allows the user to never expose any information in the clear to the cloud while maintaining functionality. You want the cloud to do interesting computations for you without decrypting your information. If you don't decrypt, the cloud never gets to see what you are processing.”&nbsp;</p> <p>When users store sensitive information, such as health records or financial data, with common cloud-based providers, the provider gains full access to the document's contents—essentially exposing the data in plain text to the cloud. A potential remedy is to encrypt the data before uploading it. However, this approach comes with a drawback: whenever users need to access or compute something from the encrypted data, they must download all the scrambled files locally and perform the computations on their own devices.&nbsp;</p> <p>So how can the user still process the information but know that the cloud didn’t learn anything? “We believe that the answer is the notion of ‘cryptographic leakage’, he said. “The cloud provider still sees some accesses on encrypted data, that is, the leakage, but these observations are confusing. Our designs scale to today’s needs and come with provable guarantees that these observations cannot be meaningfully stitched together by the cloud provider to infer the sensitive data.”&nbsp;</p> <p>Kornaropoulos said, “Searching on encrypted data is one of the biggest functionalities and we have a research thrust in which we will collaborate with industry leaders and local organizations on this problem. Specifically, we have an active collaboration with the <a href="https://publichealth.gmu.edu/mapclinics" title="MAP clinics">鶹Ƶ and Partners Clinics</a> (interprofessional clinics which serve the uninsured and refugee community within Prince William and Fairfax counties in Northern Virginia) to explore the application scenarios of our technology to that setting.”&nbsp;<br><br> <br><br> "Privacy-preserving data storage and data use is an important problem in computer security that is of critical interest to organizations that must trust their sensitive data to third-party data storage facilities," said Computer Science department chair David Rosenblum. &nbsp; "Evgenios is an internationally renowned leader in addressing this problem, and his NSF CAREER award will afford him the opportunity to explore novel solutions that balance strong security guarantees against practical needs for efficiency."</p> <p>The NSF CAREER award is reserved for the nation’s most talented up-and-coming researchers. From the NSF website: “The Faculty Early Career Development (CAREER) Program offers NSF’s most prestigious award in support of early-career faculty who have the potential to serve as academic role models in research and education and to lead advances in the mission of their department or organization.”&nbsp;&nbsp;&nbsp;</p> <p>The award is the most-recent of several distinctions Kornaropoulos has earned. He was elevated to IEEE Senior Member in 2024, his paper was among the finalists for the “<a href="https://cec.gmu.edu/news/2024-09/computer-science-paper-nominated-pwnie-award-best-cryptographic-attack-category" target="_blank">Best Cryptographic Attack</a>” category at Pwnie Awards 2024, and his latest work at the intersection of AI and security has <a href="https://cec.gmu.edu/news/2024-11/evgenios-kornaropoulos-quoted-ai-and-large-language-models" target="_blank">gained significant media attention</a>.&nbsp;&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/evgenios" hreflang="en">Evgenios Kornaropoulos</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="46b947cc-9fad-44b5-8407-f725ea1fe557" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="3550358c-f469-484a-927f-b94b1a277085"> <div class="cta"> <a class="cta__link" href="https://cs.gmu.edu/"> <p class="cta__title">Connect with the Department of Computer Science <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="87a69010-1fd4-4adb-b0e0-d230a59d64fc" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="dc8a2233-9e53-4cc3-98ac-acd15cd628e4" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-5bee8eda17dadbf8b877c99ba7b5adda1d7aa1079c2901ff741b064100b41399"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/nsf-grant-supports-nanofabrication-workforce-training" hreflang="en">NSF grant supports nanofabrication workforce training</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 14, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/engineering-better-vision-george-mason-professors-lead-117m-nih-project" hreflang="en">Engineering better vision: George 鶹Ƶ professors lead $1.17M NIH project </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 30, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/i-corps-3d-streaming-toward-better-telehealth" hreflang="en">I-Corps in 3D: Streaming toward better telehealth </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 17, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/1161" hreflang="en">National Science Foundation</a></div> <div class="field__item"><a href="/taxonomy/term/6606" hreflang="en">鶹Ƶ and Partners (MAP)</a></div> </div> </div> </div> </div> </div> Mon, 27 Jan 2025 17:32:18 +0000 Nathan Kahl 115471 at Cyber savant hacks his way onto international team /news/2024-12/cyber-savant-hacks-his-way-international-team <span>Cyber savant hacks his way onto international team</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2024-12-03T11:48:51-05:00" title="Tuesday, December 3, 2024 - 11:48">Tue, 12/03/2024 - 11:48</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span><span><span><span class="intro-text">Dylan Victor Knoff is president of the <a href="https://competitivecyber.club" title="MCC">鶹Ƶ Competitive Cyber (MCC) club</a>, a computer science major, and the kind of self-motivated hacker you might see rummaging through Goodwill bins, in his free time looking for a $4 router that he can use to bolster his resume.</span> </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><strong>“</strong>I’ll pull it apart and take the firmware off the chip. It's good fun, responsibly and ethically doing stuff to it, of course, and then reporting vulnerabilities,” he said. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>The 鶹Ƶ junior likes to examine routers because they are more likely than other devices to have detectable problems. Once he finds a vulnerability, per industry practice, he reports it to the vendor and then <a href="https://www.mitre.org" title="MITRE">MITRE</a>, the nonprofit that that catalogs firmware and software problems. Getting a mention on their common vulnerabilities and exposures listing looks good professionally for young cyber sleuths. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>This ambition to make the cyber world a better, safer place is a theme in Knoff’s life. First, he started a Capture the Flag (CTF) team during high school, and then he attended a university cyber club while still a teen. When the Orlando native and first-gen college student could have chosen the local University of Central Florida, instead he left home for George 鶹Ƶ, recognizing the university’s prowess in the field and the benefit of being close to potential employers in the Washington, D.C., metropolitan region. Knowing that breaking into cybersecurity is no Mickey Mouse endeavor, shortly after arriving in Fairfax he networked with the <a href="https://www.battelle.org" title="Battelle">Battelle</a> intern coordinator and subsequently landed a paid, full-time co-op with the STEM giant. </span></span></span></span></span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-12/screen_shot_2024-12-03_at_11.56.00_am.png?itok=Fw9nYe6M" width="330" height="350" alt="Young man stands on a rocky trail" loading="lazy"> </div> </div> <figcaption>When he's not hacking routers, Knoff enjoys Shenandoah National Park</figcaption> </figure> <p><span><span><span><span><span><span><span>Knoff is on the U.S. Cyber Team and in October competed at the International Cybersecurity Challenge in Santiago, Chile. He said, “We competed against other countries’ teams in a two-day CTF, where one day was attack-and-defend, and the second day was on vulnerability assessment and exploit development.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff’s research focus is reverse engineering and vulnerability research. “I'll find something wrong with a specific device or framework and I'll find a ‘zero day,’ which is a vulnerability that is unknown to the vendor, and then I'll disclose it to them,” he said, indicating the standard industry practice. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>For next year’s <a href="https://www.districtcon.org" title="District Con">DistrictCon</a>, a hacker conference in Washington, D.C., in February, Knoff and two members of MCC participated in the Junkyard Contest, where participants find vulnerabilities in devices; they discovered a stunning eight zero days on one router. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Knoff is giving a separate talk at the conference, on return-oriented programming, a way that hackers can get into a system by reusing code that already exists in a program. “I made this tool that utilizes computer emulation to analyze and visualize the memory side effects of elements that make up a return-oriented attack. Using data aggregation, these elements are then sorted based on their exploitation effects and made easily searchable to an operator.” He made the<strong> </strong>tool open source, available to anyone on GitHub, and is releasing an updated version the day of the talk.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>On rare days when he’s not at a keyboard, Knoff enjoys getting outside, especially for a hike. “I love going to Shenandoah with my friends, doing Old Rag and White Oak,” he said, referencing two of the more popular—and challenging—Shenandoah National Park trails. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Currently he’s entertaining offers for two new co-ops, with the hopes of potentially spinning one of those into full-time employment. And whether scaling digital peaks or the rugged trails of Shenandoah, Knoff will find himself climbing…toward discovery and solutions in a safer cyber world.</span></span></span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/10431" hreflang="en">鶹Ƶ Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Tue, 03 Dec 2024 16:48:51 +0000 Nathan Kahl 115026 at Information technology students stepped up to secure Virginia’s elections  /news/2024-08/information-technology-students-stepped-secure-virginias-elections <span>Information technology students stepped up to secure Virginia’s elections&nbsp;</span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2024-08-28T10:19:47-04:00" title="Wednesday, August 28, 2024 - 10:19">Wed, 08/28/2024 - 10:19</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Secure elections are the cornerstone of democracy, and the </span><a href="https://csis.gmu.edu/VA-CNIP/" target="_blank"><span class="intro-text">Virginia Cyber Navigator Internship Program (VA-CNIP)</span></a><span class="intro-text"> has equipped students with the skills to strengthen the cybersecurity posture of election infrastructures. As an intern last summer, information technology (IT) major Duong Thuy Nguyen helped secure a rural county's technology for the upcoming presidential election alongside two other George 鶹Ƶ students, Maha Khan and Sophie Bates.&nbsp;&nbsp;</span></p> <p>Sponsored by the National Security Agency (NSA) and run by the University of Virginia (UVA) and five other Virginia universities including George 鶹Ƶ, VA-CNIP was developed to address the need for improved election security in localities that may not have the resources to implement necessary cybersecurity measures. In 2025, VA-CNIP received the Innovation Award from the <a href="https://electionverification.org/">Election Verification Network</a>.&nbsp;</p> <p>Nguyen, who is pursuing a dual concentration in database technology and programming and cyber security, traveled to Campbell County for a few days each week over the summer to support the county’s dedicated and hard-working IT staff in complying with the Locality Election Security Standards (LESS) required by the Commonwealth of Virginia. The LESS requirements are designed to ensure that all localities, regardless of size, have baseline cybersecurity measures in place, with further goals to achieve "preferred" or "premium" levels of security. The program thus not only prepared students for future careers but also left a lasting impact on the local governments they serve.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-2_3.png?itok=FGRYqmk3" width="350" height="350" alt="From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns." loading="lazy"> </div> </div> <figcaption>From left to right, Albanese, Hicks, and Nguyen with two other VA-CNIP interns. Photo provided.</figcaption> </figure> <p>George 鶹Ƶ Associate Professor <a href="https://ist.gmu.edu/profiles/malbanes" target="_blank">Max Albanese</a> helped lead VA-CNIP, designing a course in election security that was a prerequisite for all interns. In addition to the course, a two-day boot camp at UVA provided interns with training, including hands-on activities and talks from high profile industry experts and election officials. This year United States Election Assistance Commissioner <a href="https://www.eac.gov/about/commissioner-thomas-hicks" target="_blank">Thomas Hicks</a> spoke at the boot camp. &nbsp;</p> <p>“Especially this year, the focus was on trying to send interns to localities that were in most need of upgrading their security posture,” said Albanese, “and that means the more rural or less technologically advanced counties.”&nbsp;</p> <p>Each week, students worked remotely for part of their assignments but also traveled to their assigned localities for on-site work. Due to the often-rural nature of the counties involved, VA-CNIP provided a $3,000 travel allowance to each intern in addition to their $9,000 stipend. This allowed students to travel long distances and, when necessary, stay overnight in nearby towns to avoid lengthy commutes. The George 鶹Ƶ interns this year traveled about four hours one way to reach Campbell County.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/untitled-1.png?itok=OQCyhNux" width="350" height="350" alt="Duong Thuy Nguyen" loading="lazy"> </div> </div> <figcaption>Nguyen in Campbell County. Photo provided.&nbsp;</figcaption> </figure> <p lang="EN-US">Nguyen noted how rewarding it was to work in-person with the local IT department. Her tasks included developing security policies, conducting research on cybersecurity tools, and even designing tabletop exercises to prepare local officials for possible cyber incidents on election day. Nguyen raved about her internship, which was her first. Even though she had to travel a lot, she said, she would not change her experience.&nbsp;&nbsp;</p> <p>“They were all very welcoming, and they gave us all the support that we needed,” she said.&nbsp;</p> <p>VA-CNIP exemplifies the power of academia, government, and students working together to tackle one of the most pressing challenges of our time—ensuring the security and integrity of democratic processes. While funding for VA-CNIP ends this year, there are ongoing discussions about sustaining the program going forward.&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="3df8860a-6498-4223-88d1-386b0e2e9e72" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="e4d0e643-b2ab-481a-a23f-e92a9de56b2b" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="b8646372-316e-4ee0-9df4-a32355a38510" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="6c5500e8-38fb-4db8-b451-e1a408d00e4a" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="210da48f-6e9f-4aad-afe4-d779990806bf"> <div class="cta"> <a class="cta__link" href="https://careers.gmu.edu/"> <p class="cta__title">Explore career options at University Career Services <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="1f69ae4e-2d53-4eb5-aba0-6afcc3c8723c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="30b02d2b-11e9-4339-a964-804f8fa22d87" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a7d8fa7e-ca73-4633-8a98-b8b0715fe7d3" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="5f3af51a-1528-4759-bdfe-7f8ff7c799db" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-73f7f7bcd152fe08b9fc3e6aaf55909b2e38372634a857e1328c09ed46472b26"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/field-career-dreams-grad-student-spends-summer-identifying-and-protecting-native" hreflang="en">Field of career dreams: Grad student spends summer identifying and protecting native plants</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 2, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/george-mason-student-finds-his-voice-through-dream-internship" hreflang="en">George 鶹Ƶ student finds his voice through dream internship  </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 27, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/biomedical-internship-yielded-lively-experience" hreflang="en">Biomedical internship yielded lively experience</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/george-mason-interns-make-difference-biotech-start-ups" hreflang="en">George 鶹Ƶ interns make a difference at biotech start-ups</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 19, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4c6b27b6-a672-498e-8bf0-5580252d233c" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef35a6ca-7194-4900-a001-515fc9db772e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="a53faa93-425a-4277-b02c-6c50c35d77d2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/1961" hreflang="en">information technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/19266" hreflang="en">Elections</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/20416" hreflang="en">CEC high impact stories</a></div> <div class="field__item"><a href="/taxonomy/term/20536" hreflang="en">CEC internships</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Wed, 28 Aug 2024 14:19:47 +0000 Teresa Donnellan 113761 at Cybersecurity Honors College student ready to hit the ground running /news/2024-08/cybersecurity-honors-college-student-ready-hit-ground-running <span>Cybersecurity Honors College student ready to hit the ground running</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2024-08-12T13:59:19-04:00" title="Monday, August 12, 2024 - 13:59">Mon, 08/12/2024 - 13:59</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Jose Perez starts at 鶹Ƶ this fall, majoring in </span><a href="https://catalog.gmu.edu/colleges-schools/engineering-computing/engineering/cyber-security-engineering/cyber-security-engineering-bs/" title="Cyber security engineering"><span class="intro-text">Cyber Security Engineering</span></a><span class="intro-text"> and participating in the </span><a href="https://honorscollege.gmu.edu/"><span class="intro-text">Honors College</span></a><span class="intro-text">. But the Falls Church, Virginia native feels like he’s already a student, in a way.</span></p> <p><span>“I’m familiar with so many of the faculty at this point because I participated in the </span><a href="https://eip.gmu.edu/"><span>Early Identification Program</span></a><span>—I’ve been coming here for summer events since as early as 8th grade,” he said. “I’ve already formed a sense of community here. And as an International Baccalaureate student, I had college-level work for two years and so have decent academic preparation.”</span></p> <p><span>He describes himself as a “STEM kid from the get-go,” and participated in cybersecurity-related extracurriculars in high school. “For me, it’s the best cross between raw engineering and computer science.” Being part of Meridian High School’s Cyber Patriots team exposed him to the challenges and opportunities in computer science.</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-08/jose_perez_at_first_0.jpeg?itok=_sf7oUCF" width="350" height="263" alt="A high school student holds a name badge for a FIRST Robotics competition" loading="lazy"> </div> </div> <figcaption>Perez took part in the First Robotics Competition in high school. Photo provided</figcaption> </figure> <p><span>He burnished his high school resume with a lot of extracurriculars: He was the lead engineer on a Science Olympiad team, participated in George 鶹Ƶ’s </span><a href="https://cssr.gmu.edu/initiatives/yrc" title="Youth Research Council"><span>Youth Research Council</span></a><span>, volunteered for Habitat for Humanity, and was a four-year participant in the urban farm project&nbsp;at his school.</span></p> <p><span>Perez is the child of immigrants from the Philippines—both his parents are nurses—and he recognizes that opportunities presented here at George 鶹Ƶ will allow him a great path toward upward mobility that he might not have at other institutions, especially being able to save money while living at home. “I knew I would be happy here and get what I need, especially because I feel like I've already formed a sense of community here.”</span></p> <p><span>He’s ready and excited for what new changes are in place. “I’m aware of the new amount of freedom and responsibility I’ll have as a college student. I’ll just be prepared to take that on. I’m trying to push myself to do a lot this first semester and I’m part of the </span><a href="https://studyabroad.gmu.edu/gateway/index.html"><span>Global Gateway</span></a><span> and will be going to Korea in my second semester. It will be a great way to throw myself in there.”</span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/661" hreflang="en">Early Identification Program (EIP)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Mon, 12 Aug 2024 17:59:19 +0000 Nathan Kahl 113891 at 鶹Ƶ redesignated as a National Center of Academic Excellence /news/2023-12/george-mason-university-redesignated-national-center-academic-excellence <span>鶹Ƶ redesignated as a National Center of Academic Excellence</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2023-12-05T10:42:36-05:00" title="Tuesday, December 5, 2023 - 10:42">Tue, 12/05/2023 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">鶹Ƶ was recently redesignated by the National Security Agency (NSA) as a National Center of Academic Excellence (NCAE) in Cybersecurity. This recognition continues a designation that has been in place since 1999 and makes 鶹Ƶ’s College of Engineering and Computing eligible for special funding opportunities.&nbsp;</span></p> <p><span><span><span><span><span><span><span>鶹Ƶ was redesignated in two categories: Cyber Defense (CAE-CD), valid through 2027, and Research (CAE-R), valid through 2028. 鶹Ƶ is one of only seven schools that received a designation with the original cohort in 1999. The CAE in Cyber Defense is the longest-running designation of any program in the country. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>NSA has curriculum requirements that a program must meet, involving a rigorous, peer-reviewed, multi-step application. Massimiliano (Max) Albanese, an associate professor and associate chair for research in the Department of <a href="https://ist.gmu.edu">Information Sciences and Technology</a> and the associate director of the Center for Secure Information Systems, helps lead 鶹Ƶ’s efforts in securing the designation. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>According to the CAE Community website, “The CAE in Cyber Research designation indicates that (an) institution increases the understanding of robust cyber defense technology, policy, and practices that will enable our Nation to prevent and respond to a catastrophic event. The CAE in Cyber Defense designation indicates that (an) institution is helping reduce threats to our national infrastructure by promoting higher education and research in cyber defense as well as provide the nation with a pipeline of qualified cybersecurity professionals.”</span></span></span></span></span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2023-12/nsa_designation.jpg?itok=NMkOLUZF" width="350" height="197" alt="Three government representatives stand with a 鶹Ƶ professor, who is holding a plaque" loading="lazy"> </div> </div> <figcaption>Max Albanese&nbsp;(with plaque) with representatives from the FBI, NSA, and CISA</figcaption> </figure> <p><span><span><span><span><span><span><span>Albanese said, “To become eligible for the Cyber Defense designation, which is the education component of the NCAE program, a school has to have a validated program of study meeting NSA curriculum requirements; the one that allowed us to be eligible for the designation is our bachelor’s in information technology, with a concentration in cybersecurity.” To be eligible for the Research designation, a school must have a PhD program preparing students for research in cybersecurity, which at 鶹Ƶ is the PhD in information technology. Albanese added that the university is currently preparing an application to also validate the college’s master’s in applied information technology. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“In addition to the prestige,” Albanese said, “an advantage of the designation is that we have access to exclusive funding opportunities. We’ve been receiving funds for the Cyber Security Scholarship Program (<a href="https://csis.gmu.edu/CySP/">CySP</a>) for many years, for example, which covers tuition, health insurance for doctoral students, laptops, a stipend, and more.” The program brings roughly $150-$200k annually for 鶹Ƶ students. NSA funding that 鶹Ƶ receives for other cyber-based projects is also contingent on the school having the CAE designation. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Albanese said, “鶹Ƶ’s NCAE designation isn’t just a badge of honor, it’s a testament to our commitment to excellence in cybersecurity education and research. Beyond the obvious financial benefits, being part of the CAE community is a catalyst for innovation and collaboration. The innovative Virginia Cyber Navigator Internship Program (<a href="https://csis.gmu.edu/VA-CNIP/">VA-CNIP</a>), managed by a coalition of NCAE-designated Virginia universities, is a prime example&nbsp;of how being part of this community translates into impactful initiatives and real-world experiences for our students.”</span></span></span></span></span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="99fb9cb3-8a3e-4715-b0da-8682c8e06429"> <div class="cta"> <a class="cta__link" href="https://ist.gmu.edu/research"> <p class="cta__title">Learn 鶹Ƶ IST Research <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"> <div class="field field--name-field-cta-icon field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div> <div class="field field--name-field-media-font-awesome-icon field--type-fontawesome-icon field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div class="fontawesome-icons"> <div class="fontawesome-icon"> <i class="fas fa-desktop" data-fa-transform data-fa-mask style="--fa-primary-color: #000000; --fa-secondary-color: #000000;"></i> </div> </div> </div> </div> </div> </div> </div> </span> </a> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/18916" hreflang="en">cyber defense</a></div> <div class="field__item"><a href="/taxonomy/term/11351" hreflang="en">National Security</a></div> <div class="field__item"><a href="/taxonomy/term/18911" hreflang="en">National Center of Academic Excellence</a></div> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> </div> </div> </div> </div> </div> Tue, 05 Dec 2023 15:42:36 +0000 Nathan Kahl 110086 at CSIRTs protect cybersecurity; expand job opportunities /news/2022-03/csirts-protect-cybersecurity-expand-job-opportunities <span>CSIRTs protect cybersecurity; expand job opportunities </span> <span><span>Rena Malai</span></span> <span><time datetime="2022-03-11T15:05:11-05:00" title="Friday, March 11, 2022 - 15:05">Fri, 03/11/2022 - 15:05</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/shashem6" hreflang="en">Sherif Hashem</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Cybersecurity is a growing concern for anyone using technology—which is pretty much everyone. It’s an area that has seen tremendous research since the first global attacks surfaced in the late 1980s and early 1990s.&nbsp;</p> <p>Low-income countries can have challenges with getting appropriate cybersecurity protective measures in place and developing much-needed cybersecurity talents. To address this concern, <a href="https://ist.gmu.edu/" target="_blank">George 鶹Ƶ Information Sciences and Technology</a> professor <a href="https://ist.gmu.edu/profiles/shashem6" target="_blank" title="Sherif Hashem profile">Sherif Hashem</a> was part of a team that produced a report ‘Cyber Incident Management in Low-Income Countries.’ The report was funded by <a href="https://www.google.com/search?q=global+affairs+canada&amp;client=safari&amp;channel=mac_bm&amp;source=hp&amp;ei=PjsmYsC6EuqlytMP9eyUqA4&amp;iflsig=AHkkrS4AAAAAYiZJTranFkpWk77_zhn9mZ_Ai1t09bhS&amp;gs_ssp=eJzj4tTP1TcwzIk3z1FgNGB0YPASTc_JT0rMUUhMS0vMLCpWSE7MS0xJBADJiguE&amp;oq=global+affai&amp;gs_lcp=Cgdnd3Mtd2l6EAEYADILCC4QgAQQxwEQ0QMyBQguEIAEMggIABCABBDJAzIFCAAQgAQyBQgAEIAEMgUIABCABDIFCAAQgAQyCwguEIAEEMcBEK8BMgUIABCABDIFCAAQgAQ6DgguEIAEELEDEMcBEKMCOggIABCABBCxAzoRCC4QgAQQsQMQgwEQxwEQ0QM6CwgAEIAEELEDEIMBOggIABCxAxCDAToECAAQQzoHCAAQsQMQQzoQCC4QsQMQxwEQ0QMQ1AIQQzoRCC4QgAQQsQMQxwEQowIQ1AI6CwguEMcBENEDEJECOgUIABCRAjoKCC4QxwEQowIQQzoKCAAQsQMQgwEQQzoOCC4QgAQQsQMQxwEQ0QM6CwgAELEDEIMBEJECUABYgA9g5RpoAHAAeACAAXeIAZwGkgEEMTEuMZgBAKABAQ&amp;sclient=gws-wiz" target="_blank">Global Affairs Canada</a>, and presented last month in an international webinar by the <a href="https://thegfce.org/" target="_blank">Global Forum on Cyber Expertise.</a>&nbsp;</p> <p>According to Hashem, having Computer Security Incidence Response Teams (CSIRTs) in place can greatly help in handling and preventing cyber attacks. He says Computer Incidence Response is a term that popped up globally about 30 years ago, and it is associated with professionals who respond to the threats made over computer systems and networks.&nbsp;&nbsp;</p> <p>“Established CSIRTs can help detect a cyber attack when it happens, and greatly minimize its impact,” Hashem says. “Cyber attacks against critical national infrastructure can be some of the most impactful as they can potentially affect everyone in society.”&nbsp;</p> <p>One recent example is the Colonial Pipeline ransomware attack in 2021, the largest cyber attack on an oil infrastructure target in U.S. history, says Hashem.&nbsp;</p> <p>“CSIRTs across the globe work together to mitigate such cyber attacks and help bring the criminals to justice,” he says. “Without CSIRTs in situations like this, the aftermath of a cyber attack can be devastating. It’s better to be prepared and minimize any losses; recover quickly.”&nbsp;&nbsp;</p> <p>The ‘Cyber Incident Management in Low-Income Countries’ report showcases CSIRT models and structures that are workable within limited budgets. The report also provides guidance on developing technical skills within CSIRTs and highlights a wide range of training programs and tools.&nbsp;</p> <p>“Our research findings can be used holistically by any entity looking to establish CSIRTs, whether there is a limited budget or not,” says Hashem.&nbsp;</p> <p>The first CSIRT was created by Carnegie Mellon University over thirty years ago, says Hashem. Since then, the cybersecurity space has become an area rich with job opportunities. An estimated 400,000 open cybersecurity jobs are available today in the United States alone.&nbsp;</p> <p>“I hope this motivates students to consider information security as a part of their education and career plan,” says Hashem. “The opportunities are endless.”&nbsp;</p> <p>The <a href="https://youtu.be/B0XX3Qavf9w" target="_blank">full webinar is available to view on You Tube.</a>&nbsp; <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-1-v16.pdf" target="_blank">Part 1</a> and <a href="https://cybilportal.org/wp-content/uploads/2022/01/CSIRTs-In-Low-Income-Countries-Final-Report-part-2-v16.pdf" target="_blank">part 2</a> of the report are also available to view.&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/7686" hreflang="en">information sciences and technology</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> </div> </div> </div> </div> </div> Fri, 11 Mar 2022 20:05:11 +0000 Rena Malai 66866 at 鶹Ƶ wins VMI Cyber Fusion event /news/2022-03/mason-wins-vmi-cyber-fusion-event <span>鶹Ƶ wins VMI Cyber Fusion event </span> <span><span>Rena Malai</span></span> <span><time datetime="2022-03-02T10:23:45-05:00" title="Wednesday, March 2, 2022 - 10:23">Wed, 03/02/2022 - 10:23</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/jjonesu" hreflang="und">Jim Jones</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-03/Cyber%20Fusion.jpg?itok=ELTBQqA5" width="350" height="233" alt="Cyber Fusion" loading="lazy"> </div> </div> <figcaption>The 鶹Ƶ team poses with the first place trophy after&nbsp;winning VMI's Cyber Fusion event.<br><br> ​​​</figcaption> </figure> <p>鶹Ƶ Patriots won <a href="https://www.vmi.edu/about/conferences/cyberfusion/" target="_blank">Commonwealth Cyber Fusion</a>, an event that combines a collegiate cyber competition with learning and career opportunities.&nbsp;</p> <p>鶹Ƶ students competed in the event last weekend and again claimed first place, a position 鶹Ƶ has maintained from the previous Cyber Fusion. 鶹Ƶ representatives at Cyber Fusion included Henry Coffman, member of the Virginia Cyber Range Executive Committee, and Jim Jones, 鶹Ƶ faculty advisor.&nbsp;</p> <p>The students who competed in the event are a part of <a href="https://competitivecyber.club/" target="_blank">鶹Ƶ’s Competitive Cyber club</a>, sponsored by the <a href="https://cec.gmu.edu/strengths/cybersecurity" target="_blank">Cybersecurity Engineering</a> (CYSE) department and coached by Jones. A number of members in the club are also students in the CYSE program.&nbsp;&nbsp;</p> <p><a href="https://volgenau.gmu.edu/profiles/pbrouse" target="_blank">Peggy Brouse</a>, CYSE professor, says she is very proud of the winners’ continuing efforts and their achievements as representatives of 鶹Ƶ.  &nbsp;</p> <p>“Once again, our CEC students from both the Cyber Security Engineering and the Computer Science departments brought home the first place trophy from the Cyber Fusion conference,” says Brouse. “The students they competed against are from top-ranked cyber schools which makes the accomplishment even more noteworthy.”&nbsp;</p> <p>The students self-formed the 鶹Ƶ Competitive Cyber club which plays a large part in their successes, she says.  &nbsp;</p> <p>“Especially impressive is that the club welcomes all students to learn about and practice for competitions regardless of experience or academic year,” Brouse says. “I look forward to future competitions.”&nbsp;</p> <p>Cyber Fusion is co-hosted by the <a href="https://www.vmi.edu/about/conferences/cyberfusion/" target="_blank">Virginia Military Institute</a> (VMI), Sen. Mark R. Warner, the <a href="https://cyberinitiative.org/" target="_blank">Commonwealth Cyber Initiative</a>, and the <a href="https://www.virginiacyberrange.org/" target="_blank">Virginia Cyber Range</a>. According to VMI, Cybersecurity is one of the nation’s and Commonwealth’s top priorities. Cyber Fusion is the organized integration of data and tools from disparate sources of support for secure and resilient system lifecycles.&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/9486" hreflang="en">Events</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> </div> </div> </div> </div> </div> Wed, 02 Mar 2022 15:23:45 +0000 Rena Malai 66246 at 鶹Ƶ welcomes new Eminent Scholar in Cybersecurity /news/2021-09/mason-welcomes-new-eminent-scholar-cybersecurity <span>鶹Ƶ welcomes new Eminent Scholar in Cybersecurity</span> <span><span>Martha Bushong</span></span> <span><time datetime="2021-09-22T18:14:51-04:00" title="Wednesday, September 22, 2021 - 18:14">Wed, 09/22/2021 - 18:14</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2021-09/GA.jpeg?itok=8-kC5JW7" width="226" height="320" loading="lazy"> </div> </div> <figcaption>Giuseppe Ateniese is the Eminent Scholar for Cybersecurity. Courtesy photo</figcaption> </figure> <p><span><span>It’s not surprising that 鶹Ƶ’s prominence in the field of cybersecurity attracted Giuseppe Ateniese to the <a href="https://cec.gmu.edu/">College of Engineering and Computing</a>. 鶹Ƶ has a long history of active teaching and research in cybersecurity. In the 2022&nbsp;U.S. News and World Report Best Colleges List 鶹Ƶ ranked&nbsp;#28 nationally and #15 for public universities.&nbsp;Ateniese, who was recently hired as an Eminent Scholar in Cybersecurity, wants to take 鶹Ƶ to the next level.</span></span></p> <p><span><span>“鶹Ƶ was always on my radar,” says Ateniese. “So once this opportunity as an eminent scholar popped up, I was very interested. 鶹Ƶ is providing me with strong support to build a top-notch research group.”</span></span></p> <p><span><span>Ateniese comes to 鶹Ƶ from Stevens Institute of Technology, where he was&nbsp;chair of the computer science department. He taught at Sapienza-University of Rome, served as assistant and associate professor at Johns Hopkins University, and was one of the JHU Information Security Institute founders. His experience in the corporate sector included a stint as a researcher at IBM’s Zurich research lab and as a scientist at the Information Sciences Institute of the University of Southern California. He also briefly worked as a visiting professor at Microsoft in Redmond, Washington.</span></span></p> <p><span><span>In addition to teaching cybersecurity classes, Ateniese expects to lead transformative growth in 鶹Ƶ’s cybersecurity research portfolio and encourage and foster new and existing collaborations with the <a href="https://cyberinitiative.org/">Commonwealth Cyber Initiative</a> and its partners as well as&nbsp;other academic, industrial, and governmental institutions in the greater Washington, D.C. area. </span></span></p> <p><span><span>Ateniese says he would like to serve as a bridge between different units. “This is something I actually learned as department chair,” he says. “When I was able to connect faculty within my department to different units, sometimes I was able to make things happen.” He sees a large part of his role as finding collaborators. “I really want to go after bringing cybersecurity to the next level and figure out what is needed at 鶹Ƶ to move in that direction,” he says.</span></span></p> <p><span><span>Ateniese’s research focuses on cloud security and machine learning applied to security and intelligence issues. He is also investigating new security applications for decentralized computing based on blockchain/bitcoin technology.</span></span></p> <p><span><span>“Society is embracing artificial intelligence, and I’m concerned that we are doing this in a way that is probably too fast,” he says. “We have to consider also security and privacy implications of this technology. My goal is to build a safe and private artificial intelligence framework so that we can ensure that machine learning models are doing what they’re supposed to do.”</span></span></p> <p><span><span>He is also investigating new security applications for decentralized computing based on blockchain/bitcoin technology. “Everyone is talking about bitcoin and other cryptocurrencies,” he says. “But that’s probably nothing compared to what is possible with blockchains and smart contracts.”</span></span></p> <p><span><span>Though his appointment is with the <a href="https://cs.gmu.edu/">computer science</a> and <a href="https://cybersecurity.gmu.edu/">cybersecurity engineering</a> departments, he sees amazing potential collaborations between different groups because cybersecurity spans&nbsp;many units. As time goes on, he aims to understand what’s available and coordinate significant cybersecurity initiatives.</span></span></p> <p><span><span>Department of Computer Science chair David Rosenblum says, “Giuseppe is an internationally leading scholar who brings to 鶹Ƶ an outstanding record of research achievement in computer security, as well as extensive leadership experience in academic administration and entrepreneurship.&nbsp;We look forward to supporting him as he leads strategic research efforts in critically important areas such as blockchain technology and trustworthy AI.”</span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> </div> </div> </div> </div> </div> Wed, 22 Sep 2021 22:14:51 +0000 Martha Bushong 53626 at