Commonwealth Cyber Initiative (CCI) / en Anonymity’s ARX nemesis /news/2025-10/anonymitys-arx-nemesis <span>Anonymity’s ARX nemesis</span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-10-20T11:12:08-04:00" title="Monday, October 20, 2025 - 11:12">Mon, 10/20/2025 - 11:12</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of faculty and students from 鶹Ƶ recently discovered a vulnerability in a widely used anonymization tool. They presented their findings last week in Taiwan at the </span><a href="https://www.sigsac.org/ccs/CCS2025/" title="ACM CCS"><span class="intro-text">Association for Computing Machinery Conference on Computer and Communications Security (ACM CCS)</span></a><span class="intro-text">, one of the world’s most prestigious computer security conferences, with a very low paper acceptance rate.</span></p> <p>The problem they discovered was with ARX, an open-source data anonymization tool, which provides what is referred to as <em>k</em>-anonymity. It is a commonly used tool in clinical settings to maintain data privacy. The discovery is particularly important at a time when more and more private data is being used in a variety settings and systems.</p> <p>Evgenios Kornaropoulos, an assistant professor in the <a href="https://cs.gmu.edu" title="Computer science">Department of Computer Science</a>, said, “Sometimes this type of microdata is very valuable. Tools like ARX anonymize the data so it’s compliant with HIPAA, and then that data can be shared with policymakers, engineers, scientists, and others who will make policy decisions and scientific studies based on this information.”&nbsp;</p> <p>While many people receiving medical care are comfortable with their information being included in larger data sets for purposes of medical discovery, they likely do not want personal, identifiable information released.</p> <div class="align-left"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-10/somiya_presenting.jpeg?itok=J1ansOsf" width="350" height="263" alt="Somiya Chhillar speaking at the ACCESS Academy" loading="lazy"> </div> </div> <p>“For patients, and especially those from more vulnerable or marginalized communities, data privacy is not an abstract concern, it’s deeply tied to trust in the health care system," said paper co-author Rebecca Sutter, a professor in the <a href="https://nursing.gmu.edu" title="Nursing">School of Nursing</a>, and director of the <a href="https://publichealth.gmu.edu/mapclinics" title="MAP">MAP Clinics</a>. "The integrity of tools like ARX matters because they underpin how we protect patient information while advancing public health research. When anonymization fails, it’s not only a technical vulnerability, it’s a human one."</p> <p>Computer science PhD student Somiya Chhillar, lead author on the paper, said that the ubiquity of ARX was a reason they chose to study it. “We wanted to see how ARX really operates and how the algorithm works. While we were doing that, we realized that a few of the steps that it takes are very opportunistic, and because of that, it leaks information that we shouldn't be finding out by just looking at the anonymized data.”</p> <p>Chhillar said that ARX follows a “greedy strategy,” explaining that there is a tension between privacy and utility. When data is shared, it should be useful without leaking information. The best metric for deciding the data usefulness is measured by information loss while the data is being made private. “The algorithm tries to minimize information loss while anonymizing the data, and ideally, we want the least possible information loss. And that's the greedy aspect of it; it's not always going for the most private, it’s just going for the most utilit<strong>y.”</strong></p> <p>This is what backfires, said Kornaropoulos, because experts (or attackers) can reverse engineer the anonymization steps the algorithm took throughout its execution to maximize utility and figure out properties of the data that were there before and after this anonymization step.</p> <p>Kornaropoulos praised his student’s dedication to the discovery, noting that Chhillar “worked on this project for a while, and this code base of ARX is an elaborate tool, with thousands of lines of code. She had to go through it to truly internalize understand everything that's going on there,” he said.</p> <p>The project was supported by a <a href="https://cyberinitiative.org" title="CCI">Commonwealth Cyber Initiative (CCI)</a> grant from the program, “Securing Interactions between Humans and Machines,” and as a requirement of the grant, the project crossed different parts of the university. The College of Engineering and Computing collaborated with 鶹Ƶ and Partners (MAP) Clinics, which provided <strong>the data.</strong></p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/rsutter2" hreflang="und">Rebecca Sutter, DNP, APRN, BC-FNP</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="30b1167e-304a-45f9-88b5-13a68b5c60e5" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="8ef98303-35f1-4073-ae4d-1f1a562f856d"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/strengths/cybersecurity"> <p class="cta__title">Learn more about Cybersecurity at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="db1cdb29-2248-499d-a67a-b80231e75b6e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="b4a204af-9cf8-4501-8c96-e0ad82cc5004" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-b1b8a2d74107bfe97f2601634bb3b8588621246000a35584cdcab648714486a0"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award" hreflang="en">Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 27, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/5846" hreflang="en">Data Mining in Health Care</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 20 Oct 2025 15:12:08 +0000 Nathan Kahl 343951 at Cybersecurity student hopes to use his powers for good /news/2025-08/cybersecurity-student-hopes-use-his-powers-good <span>Cybersecurity student hopes to use his powers for good </span> <span><span>Shayla Brown</span></span> <span><time datetime="2025-08-29T11:49:25-04:00" title="Friday, August 29, 2025 - 11:49">Fri, 08/29/2025 - 11:49</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US">When 鶹Ƶ cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun intro-text" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US"> in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.&nbsp;</span><span class="EOP TrackedChange SCXW140835998 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Since winter 2024, the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://honorscollege.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Honors College</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> student has been interning at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> (CCI) Northern Virginia Node, George 鶹Ƶ’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-08/250819602.jpg?itok=gVKY2IIJ" width="560" height="374" loading="lazy"> </div> </div> <figcaption>CEC student and Commonwealth Cyber Initiative intern Connor Wadlin. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It’s a super exciting job because I get to work with </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AprilTags</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, which are on objects that the drone's camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/events-programs/events-for-2025/cci-symposium-2025.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">CCI Symposium</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> environmental variables, cyber-attacks, and more,” he explained.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin learned about many of the tools he’s currently using for CCI in his classes with </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Highlight Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">College of Engineering and Computing</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> professors</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, such as his </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">mentor </span><a class="Hyperlink SCXW140835998 BCX0" href="https://volgenau.gmu.edu/profiles/mgebril" target="_blank"><span class="SCXW140835998 BCX0 TrackChangeTextInsertion TrackedChange TextRun Underlined NormalTextRun" lang="EN-US">Mohamed Gebril</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, an associate professor in the Department of Cyber Security Engineering.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“George 鶹Ƶ supports people where they are to get them where they want to be,” Wadlin said.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">The skills Wadlin has acquired during his time at George 鶹Ƶ and in his work with CCI have enable him to help other students in their studies.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George 鶹Ƶ. He even assists the students during our workshops,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is participating in George 鶹Ƶ’s </span><a class="Hyperlink SCXW140835998 BCX0" href="/admissions-aid/accelerated-masters" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Bachelor’s to Accelerated Master’s Program</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> and will to pursuing a master’s degree also in cyber security.</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cutting</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">edge technology,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin’s team is also working to develop</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> a first</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">of</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">its</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">kind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That's always got to be the end goal,” said Wadlin.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="0cea7810-3f69-41bb-a54e-947fabf8f245"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Explore the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/mgebril" hreflang="und">Mohamed Gebril</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="f48742ce-f36a-4b68-9a09-4ea4555c6ffb" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-5c42234e66a718943cf475285c8ffb66b47c1ccf552c10395f5f4f62227c1eda"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/confidence-meets-opportunity-fall-2025-career-fair" hreflang="en">Confidence meets opportunity at Fall 2025 Career Fair </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/skills-learned-jurisprudence-learning-community-help-student-land-full-time-position" hreflang="en">Skills Learned in Jurisprudence Learning Community Help Student Land Full-Time Position</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/environmental-science-major-lands-internship-us-geological-survey" hreflang="en">Environmental science major lands internship with U.S. Geological Survey </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/field-career-dreams-grad-student-spends-summer-identifying-and-protecting-native" hreflang="en">Field of career dreams: Grad student spends summer identifying and protecting native plants</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 2, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/21256" hreflang="en">CEC students</a></div> </div> </div> </div> </div> </div> Fri, 29 Aug 2025 15:49:25 +0000 Shayla Brown 342981 at George 鶹Ƶ and CodeLock work on securing the software supply chain /news/2025-05/george-mason-and-codelock-work-securing-software-supply-chain <span>George 鶹Ƶ and CodeLock work on securing the software supply chain </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-05-15T07:27:25-04:00" title="Thursday, May 15, 2025 - 07:27">Thu, 05/15/2025 - 07:27</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">鶹Ƶ </span><span class="intro-text">Department of Information Sciences and Technology </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Professor Kun Sun received a grant from the </span><a href="https://cyberinitiative.org" title="CCI Nova"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Commonwealth Cyber Initiative (CCI) of Northern Virginia</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> to collaborate with </span><a href="https://www.codelock.it" title="CodeLock"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CodeLock,</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> Inc</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">., a Virginia-based technology company specializing in software security. The grant totals $75,000 for one year and is part of CCI’s </span><a href="https://cyberinitiative.org/innovation/cyber-acceleration-catapult/call-for-proposals.html" title="CCI"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Academic Support for Cybersecurity Entrepreneurship and Next-Gen Development</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> (ASCEND) Fund. </span><span class="EOP SCXW190735760 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The idea for this funding is to partner a startup company with university subject matter experts,” said Sun. “The focus of this grant is to build a platform that connects startups with academic experts to solve technical industry challenges.”  </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project will integrate Sun’s previous research on automated security patching with </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> technology for secure software supply chain using dynamically generated digital signatures to develop solutions that address vulnerabilities in source code. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-02/untitled_0.png?itok=8IWyGgqi" width="350" height="350" loading="lazy"> </div> </div> <figcaption>The CCI is Virginia’s main access point for cybersecurity research, innovation, workforce development. Image courtesy CCI.&nbsp;</figcaption> </figure> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> offers a cybersecurity platform designed to secure software development processes by providing real-time monitoring, compliance automation, and protection against insider threats and supply chain attacks. It creates a forensic chain of custody by linking every code change to its developer, ensuring transparency and integrity throughout the software development lifecycle. ​ </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">So</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> for software supply chain security we install outside software applications on our smartphones and computers, for example,” said Sun. “That software may rely on  other software and we have this term, SBOM, which means software bill of material. It says that we need to know what other dependent software is used and can we trust that software? If you install software, you need to verify it has not been manipulated or modified by an attacker.” Sun will apply his 10+ years of research on automatic software vulnerability detection and automated program repair. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The vast majority of software supply chain attacks begin with compromised credentials—something traditional security tools are ill-equipped to prevent,” said </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> CEO Brian Gallagher. “By enforcing zero-trust authentication at the developer level and linking that identity to a tamper-proof chain of custody, </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> is fundamentally reshaping the threat landscape. Partnering with George 鶹Ƶ allows us to build on that foundation by automating vulnerability patching, which not only strengthens security but also delivers measurable cost savings for our customers. This collaboration accelerates our mission to bring transparency, accountability, and efficiency to software development across both government and commercial sectors.”</span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project team will get feedback from </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> existing customers and collaborate with CCI and the </span><a href="https://www.nvtc.org" title="NVTC"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">Northern Virginia Technology Council</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> to refine the solution for broader commercial adoption. Additional funding will be provided by </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> and supplemented through grant opportunities. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ksun3" hreflang="und">Kun Sun</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="addcd760-8411-417d-bff5-264648e05587" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-1c2dcc74aa652d5664f3aeb710dfcd5b7aee156799c1129e34f60efe6bac5380"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George 鶹Ƶ cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10196" hreflang="en">software</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Thu, 15 May 2025 11:27:25 +0000 Nathan Kahl 117286 at Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 /news/2025-03/nearly-500-high-schoolers-get-expert-advice-virginia-cyberslam-2025 <span>Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-03-17T12:20:56-04:00" title="Monday, March 17, 2025 - 12:20">Mon, 03/17/2025 - 12:20</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US">Nearly 500 high school students from across the commonwealth gathered at 鶹Ƶ for Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US"> 2025, where cybersecurity experts from both the public and private sectors shared industry insights during a day of activities aimed at inspiring the next generation of cybersecurity professionals.&nbsp;</span><span class="EOP SCXW163820684 BCX0 intro-text">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-2.png?itok=S69YBjX3" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Dolores Garza addresses CyberSlam 2025 attendees. Photo by Teresa Donnellan/CEC</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">“</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">What an event it was March 10, with 475 students representing 22 schools and six school districts from around the commonwealth enjoying hands-on workshops and activities led by cyber experts from industry, government, and higher education,” said </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> founder Chris Starke, a teacher for Loudoun County Public Schools who co-directed the event with the University of Alabama in Huntsville’s Jennifer Marden. “In all, 28 presenters combined to run 12 workshops—6 for each of our novice and advanced students. It was truly rewarding to see students enjoy learning about cybersecurity.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Students heard from keynote speaker Dolores Garza, Branch Chief of the Technical Operations Group at the United States Marshals Service, among others. Garza oversaw the creation of a cyber investigation unit at the U.S. Marshals and described the evolution of cybersecurity as a professional field. She encouraged attendees to stay open to new technological developments and emphasized the need for a hybrid set of skills that combines criminal investigatory techniques with technical expertise.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“Diversity in technology is not just an asset; it is a necessity,” said Garza. “The more perspectives we bring to problem-solving, the stronger and more effective our solutions become.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-6.png?itok=NquBylb_" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Student navigates drone during CyberSlam 2025. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Throughout the day, professionals led hands-on workshops in various aspects of cybersecurity.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">David Raymond from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia Cyber Range</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> led a session on advanced Capture the Flag challenges, focusing on Wireshark.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">Greg Crabb</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">10-8, LLC</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, conducted a tabletop exercise on incident response and deep fake technology, and Randy Benn from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> introduced students to the Internet of Things.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Other experts leading workshops represented </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Vertex11</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, &nbsp;OpusType Advisors, </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">the</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Idaho National Laboratory</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, the </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun" lang="EN-US">Drug Enforcement Administration</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun CommentStart" lang="EN-US">CYBER.ORG</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, George 鶹Ƶ, and </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Shenandoah University</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, leading workshops on drones, deep fakes, digital forensics, and more.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-5.png?itok=0CrQKcAq" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Students participate in a CyberSlam workshop. Photo by Ron Aira/Office of University Branding&nbsp;</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank our co-hosts, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George 鶹Ƶ’s Department of Cyber Security Engineering</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> and Loudoun County Public Schools, as well as the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative Northern Virginia Node</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node), Virginia Cyber Range,&nbsp;Vertex11, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.caci.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CACI International Inc</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">., </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://codehs.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CodeHS</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.widelity.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Widelity, Inc.</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and </span><a class="Hyperlink SCXW163820684 BCX0" href="https://gtedge.ai/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">GT Edge AI</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> for sponsoring this wonderful event that in four years has impacted more than 1,600 students,” said Starke. “</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">And,</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> thank you to our exhibitors the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.cisa.gov/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Cybersecurity and Infrastructure Security Agency</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://competitivecyber.club/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">鶹Ƶ Competitive Cyber</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (MCC), </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George 鶹Ƶ’s College of Engineering and Computing</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, GT Edge AI, and the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://va.ng.mil/Army-Guard/91st-Cyber/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia National Guard 91</span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun Superscript" lang="EN-US"><sup>st</sup></span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Cyber Brigade</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-3_0.png?itok=j-7EUDNh" width="350" height="350" loading="lazy"> </div> </div> <figcaption>CyberSlam attendees navigate drones in a workshop. Photo by Jennifer Marden</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">One event highlight was a panel featuring George 鶹Ƶ students from the MCC club—Dylan Charnick, Dylan Knoff, and Danyaal </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Shaozab</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">. MCC is known for its inclusivity, welcoming George 鶹Ƶ students from all majors and levels of experience. The club meets twice weekly, hosting impressive speakers, running workshops on cybersecurity skills, and forming teams to participate successfully in various CTF events throughout the year.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">During the panel, the MCC students fielded questions from the audience about degree programs at George 鶹Ƶ, the benefits of technical certifications, and how to best prepare for a career in cybersecurity. “Most cyber jobs are here in the D.C. area,” noted Knoff, pointing out one benefit of pursuing cybersecurity at George 鶹Ƶ.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> fosters the cultivation of cybersecurity talent in Northern Virginia, where the industry is booming. This year’s event particularly underscored the opportunities in both public and private sectors that are preparing the next generation of cybersecurity professionals, ensuring they are equipped with the skills and knowledge needed to thrive in this rapidly growing field.</span><span class="EOP CommentStart SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node, specifically Liza Durant and Jordan 鶹Ƶ for sponsoring the amazing raffle prizes and their support for the Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and also George 鶹Ƶ’s Elizabeth Dean&nbsp;for making this event possible,” said Marden. “We could not have done this with the support of George 鶹Ƶ, CCI, our presenters, sponsors, and of course our wonderful Virginia cybersecurity educators and students.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="df8242b0-caab-447b-9b69-6f967a4432e7" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="29c404d3-7f4b-4bd9-bb7b-ead7d1d616f6"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/strengths/cybersecurity"> <p class="cta__title">Explore Cybersecurity at George 鶹Ƶ <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef2037b0-71ae-4792-ad61-df0597edd70d" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="2b541678-77ec-40ec-8ada-77de7c0e366b" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-c2d06a0c738479b4fef52ee32b8926a65044d2dddb9caae92b02da7dbe360dac"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/cyber-security-engineering-student-excels-his-internship-second-time" hreflang="en">Cyber security engineering student excels at his internship for the second time </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 6, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George 鶹Ƶ’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Mon, 17 Mar 2025 16:20:56 +0000 Teresa Donnellan 116276 at Keeping data safe by keeping it separate /news/2025-02/keeping-data-safe-keeping-it-separate <span>Keeping data safe by keeping it separate </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-02-25T10:35:36-05:00" title="Tuesday, February 25, 2025 - 10:35">Tue, 02/25/2025 - 10:35</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Developing a robust cybersecurity system demands a lot of data, but keeping all that data in a single location introduces the risk of a data breach. Luckily, 鶹Ƶ researcher </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cec.gmu.edu/profiles/zzhu24" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Zhuangdi Zhu</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US"> in the </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Department of Cyber Security Engineering</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US"> specializes in federated learning, a method of decentralized machine learning that allows multiple entities to collaboratively train a machine learning model without sharing their raw data.&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">Zhu is using this expertise to assist </span><a class="Hyperlink SCXW236395453 BCX0" href="https://engineering.virginia.edu/faculty/wajih-ul-hassan" target="_blank"><span class="FieldRange SCXW236395453 BCX0 TextRun Underlined NormalTextRun" lang="EN-US">Wajih Ul Hassan</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US"> of the University of Virginia develop scalable host-based intrusion detection systems (HIDS). Together, Zhu and Hassan are leveraging artificial intelligence (AI) to enhance a given host’s cybersecurity while ensuring data privacy.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">HIDS monitor and analyze the activities within a single host or device. These systems use data, such as system logs, web browsing logs, and process logs, to detect irregularities that may indicate a security threat. For example, Zhu noted, a HIDS might detect malicious software that prompts a browser to download a harmful PDF file. By identifying such irregularities, the HIDS can prevent potential security breaches. Central management of these logs through managed security service providers (MSSPs) on cloud servers, however, could potentially breach user privacy. Enter: federated learning.&nbsp;</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-02/zhuangdi-zhu-profile-1x1.jpg?itok=NrcM87hF" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Zhuangdi Zhu, photo provided</figcaption> </figure> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">In a federated learning system, each entity trains a local model on its own data and only shares the model updates with a central server. Local models are trained on individual datasets, and their findings are sent to a central server, Zhu explained. The server then aggregates these parameters to create a global model, which is subsequently sent back to the local models. This iterative process continues until a robust and accurate model is developed. Federated learning thus ensures sensitive data remains within the local models, addressing privacy concerns and complying with data regulations.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">The project, </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cyberinitiative.org/research/funded-projects/ai-for-cybersecurity-and-cybersecurity-for-ai/secure-privacy-conscious-threat-detection.html" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun" lang="EN-US">funded by the Commonwealth Cyber Initiative</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">, is set to span one year, starting in the summer of 2025. In addition to developing a federated learning framework for HIDS, the team plans to create an open-source dataset for intrusion detection, which will serve as a valuable resource for future research and development in this field.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">Zhu's work on decentralized machine learning not only addresses critical privacy concerns but also paves the way for more secure and efficient threat detection systems. Her work on this project represents a significant step forward in the ongoing effort to protect digital environments from evolving cyber threats.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zzhu24" hreflang="en">Zhuangdi Zhu</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="9b556b60-0cb5-461d-b15b-bfb16c1f3d81" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="2bdbfce3-3287-4ae7-a476-2c129c5063be"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <p class="cta__title">Learn more about George 鶹Ƶ's Department of Cyber Security Engineering <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="324bc1e1-71b8-466e-9505-6fd7e74443b4" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="bf299381-622f-4891-a8c0-9d3581884221" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="0a45c8f3-ab25-47e3-8fee-fe675035f3a5" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-6e11371528656742332cb8e9871c2d2aa14ee1e8be32f41d0462fe4a82125907"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/3-million-national-institute-aging-grant-will-provide-much-needed-support-underserved" hreflang="en">$3 million National Institute on Aging grant will provide much-needed support to underserved dementia caregivers</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/resilient-robots-rough-terrain" hreflang="en">Resilient robots in rough terrain </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 14, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/ist-professors-unveil-human-ai-collaboration-tool-automate-cartoon-colorization" hreflang="en">IST professors unveil human-AI collaboration tool to automate cartoon colorization</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 10, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/one-woman-team-puts-many-eyes-skies" hreflang="en">A one-woman team puts many eyes in the skies </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 1, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/7006" hreflang="en">Machine Learning</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Tue, 25 Feb 2025 15:35:36 +0000 Teresa Donnellan 115901 at Cybersecurity faculty teams pitch startup ideas at Commonwealth Cyber Initiative competition  /news/2024-10/cybersecurity-faculty-teams-pitch-startup-ideas-commonwealth-cyber-initiative <span>Cybersecurity faculty teams pitch startup ideas at Commonwealth Cyber Initiative competition&nbsp;</span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2024-10-11T13:11:08-04:00" title="Friday, October 11, 2024 - 13:11">Fri, 10/11/2024 - 13:11</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> <div class="field__item"><a href="/profiles/awmarsh" hreflang="en">Andre Marshall, PhD</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">On October 9, 2024, the <a href="https://cyberinitiative.org/" target="_blank">Commonwealth Cyber Initiative</a>’s Northern Virginia Node accelerator program (CCI+A) culminated in a final pitch competition in front of a panel of cybersecurity industry experts and entrepreneurs at 鶹Ƶ Square. Program participants, cybersecurity engineering academics from throughout the Commonwealth of Virginia, spent the past few months bringing their ideas for businesses to life.&nbsp;</span></p> <p>The program helped participants connect with mentors, identify&nbsp;funding and how to obtain it, investigate their target customer, further develop their minimum viable product and hone their elevator pitch. <a href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank">CCI Northern Virginia Node</a> Director Liza Wilson Durant, who welcomed event attendees, encouraged participants to change their perspective from faculty member explaining the technical basis for their idea, to end user who is trying to understand the problem it will solve.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/extra_large_content_image/public/2024-10/untitled-4.png?itok=tOGZV4Cf" width="1200" height="675" alt="CCI+A 2024 participants and advisors. Photo by Teresa Donnellan." loading="lazy"> </div> </div> <figcaption>CCI+A 2024 participants and advisors. Photo by Teresa Donnellan.</figcaption> </figure> <p>Each of the eight 2024 faculty teams presented a pitch and received insights on the industry and investment landscapes from the esteemed judging panel. The panel included Jennifer Addie, chief operating officer of Mach37 Cyber Accelerator and VentureScope; Maria Swainson, a managing vice president at Gartner and a member of Citrine Angels, an investment group; Maurice Boissiere, chief customer officer at DataTribe; and, Alicia Lynch, chief information security officer at TD Synnex. Jamil Jaffer, founder and executive director of the National Security Institute at the Antonin Scalia Law School at George 鶹Ƶ and venture partner with Paladin Capital Group moderated the panel.&nbsp;</p> <p>Faculty team products included everything from hardware to protect a person’s identity to encryption software. CyberGuard AI, led by Old Dominion University’s Peter Foytick; PrivacyGuard, led by Old Dominion’s Rui Ning; CyberSeQurity, led by 鶹Ƶ's Weiwen Jiang; EngineeRD Solutions, led by George 鶹Ƶ’s Brian Ngac; MedChai, led by William &amp; Mary’s Ran Yang; Continuous and Lightweight Authentication for Wearable and Portable Systems (CLAWS), led by George 鶹Ƶ’s Sai Manoj Pudukotai Dinakarrao; RADAR - Real-time Anomaly Detection with Edge AI Hardware, led by Virginia Commonwealth University’s Jayasimha Atulasimhal; and, Machine Learning Operations Executed in an Encrypted Environment (MOXIE), led by Old Dominion scientists all presented pitches.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-10/untitled_3_0.png?itok=tO6Zsu5m" width="560" height="315" alt="Robert Podswadt pitches MOXIE to a panel of cybersecurity industry expert. Photo by Teresa Donnellan." loading="lazy"> </div> </div> <figcaption>Robert Podswadt pitches MOXIE to a panel of cybersecurity industry expert. Photo by Teresa Donnellan.</figcaption> </figure> <p>Robert Podswadt, the development lead for MOXIE, made the winning pitch. His teammates include John Matter and Daniel Takabi. The panel praised Podswadt’s clarity, particularly his use of simple graphics to explain MOXIE, a proposed homomorphic computing encryption service. &nbsp;</p> <p>“We’re leveraging our vibrant entrepreneurial ecosystem, and we’re leveraging our deep pool of cybersecurity talent here in Northern Virginia,” said Vice President for Research, Innovation, and Economic Impact at 鶹Ƶ <a href="https://provost.gmu.edu/profiles/awmarsh" target="_blank">Andre Marshall</a>, who spoke at the event. He added that CCI was “a visionary initiative by the state of Virginia” whereby more than 40 academic units are working together to foster cybersecurity research and workforce development in Virginia.&nbsp;&nbsp;</p> <p>&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/6691" hreflang="en">entrepreneurship</a></div> <div class="field__item"><a href="/taxonomy/term/116" hreflang="en">Campus News</a></div> <div class="field__item"><a href="/taxonomy/term/15406" hreflang="en">鶹Ƶ Square</a></div> <div class="field__item"><a href="/taxonomy/term/20416" hreflang="en">CEC high impact stories</a></div> </div> </div> </div> </div> </div> Fri, 11 Oct 2024 17:11:08 +0000 Teresa Donnellan 114286 at George 鶹Ƶ faculty are tackling cybersecurity’s talent pipeline problem /news/2024-05/george-mason-faculty-are-tackling-cybersecuritys-talent-pipeline-problem <span>George 鶹Ƶ faculty are tackling cybersecurity’s talent pipeline problem</span> <span><span>Jennifer Anzaldi</span></span> <span><time datetime="2024-05-10T13:01:06-04:00" title="Friday, May 10, 2024 - 13:01">Fri, 05/10/2024 - 13:01</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">If you’re a cybercriminal, the latest news on cybersecurity talent shortfalls should put a smile on your face. For example, </span><a href="https://www.isaca.org/-/media/files/isacadp/project/isaca/resources/infographics/isaca_state_of_cyber_2023_global_infographic_final.pdf"><span class="intro-text">the majority of cybersecurity leaders report</span></a><span class="intro-text"> that their teams are understaffed, and they have problems retaining qualified professionals.</span><br><br>But for <a href="https://business.gmu.edu/profiles/nmenon">Nirup Menon</a>, a 鶹Ƶ professor of information systems and operations management (ISOM), and <a href="https://business.gmu.edu/profiles/bngac">Brian Ngac</a>, an instructor in the ISOM area, this workforce challenge is a golden career opportunity for the young people of Northern Virginia and the Washington, D.C., area.</p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/ngac_and_menon_golf_600x600.jpg?itok=iRijGNjV" width="350" height="350" alt="Nirup Menon and Brian Ngac" loading="lazy"> </div> </div> <figcaption>Nirup Menon and Brian Ngac</figcaption> </figure> <p>The pair recently won a two-year award from the <a href="https://www.nist.gov/">National Institute of Standards and Technology</a> (NIST), an agency within the U.S. Department of Commerce, to create unique experiential learning opportunities and workshops designed to enhance cybersecurity education and workforce development.<br><br>Working closely with industry partners <a href="https://mobius-llc.com/">Mobius Consulting</a> and <a href="https://www.ida.org/">Institute for Defense Analyses (IDA)</a>, Menon and Ngac will recruit and help select students to work on actual cybersecurity projects. “They need to have taken some fundamental cyber class ahead of time,” Menon clarifies. “We want students with a commitment to the field. It allows you to get experience but it’s also competitive.”<br><br>Throughout the 12-week projects, students will receive mentoring both from the industry participant and from business faculty. “We run it in an agile scrum-like manner,” Ngac says. “Every week, we ask ‘What did you do?’ ‘What are you going to do?’ ‘What are the challenges that are impacting your work?’” If students run into trouble, faculty mentors can work with industry managers to help them get back on track.<br><br>“We’re trying to build not just the cyber workforce but the skills as well,” Ngac says.<br><br>Menon and Ngac have developed a specialty in this type of hands-on learning, which they have dubbed the Professional Readiness Experiential Program (PREP). More than 100 Virginia-based undergraduates and 20 industry participants have participated in PREP, which includes projects funded by two <a href="https://cyberinitiative.org/">Commonwealth Cybersecurity Initiative</a>&nbsp;Experiential Learning grants in collaboration with Mobius and IDA.&nbsp;<br><br>“PREP not only focuses on cybersecurity projects, but also works on many business process improvement projects,” says Ngac. "Honors and high-performing ISOM students work on real-world projects with industry participants on identifying technical solutions to business challenges through rigorous research, modelling, analysis, quantification, risk management, implementation planning, and, at times, execution.”<br><br><span lang="EN-SG">The NIST award also incorporates workshops for students who are new to cybersecurity but interested in exploring it as a career option. Workshops will be launched in collaboration with&nbsp;</span><a href="https://www2.trinitydc.edu/" target="_blank" title="Trinity Washington University"><span lang="EN-SG">Trinity Washington University</span></a><span lang="EN-SG">&nbsp;(TWU), a PBI (predominantly black institution) and HSI (Hispanic-serving institution) whose College of Arts and Sciences is women-only. For a field such as cybersecurity, which continues to face diversity challenges, the participation of organizations such as TWU is essential.</span><br><br>“We want to bring in students who have not thought of cybersecurity as a field, because they think it’s all engineering, hacking and coding,” Menon says. The workshops will emphasize the variety of functions that are integral to the space, such as management and auditing, in addition to engineering.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/ngac_and_menon_golf_group_600x1300.jpg?itok=uNzuuKi8" width="560" height="252" alt="Students and industry participants in the current CCI Experiential Learning Projects" loading="lazy"> </div> </div> <figcaption>Students and industry participants in the current CCI Experiential Learning Projects</figcaption> </figure> <p><br>“It’s not just tech, there may be creativity involved in anticipating scams and threats,” Ngac explains. “These are different things we’ll be bringing up in the workshop in terms of roleplaying what cybercriminals might do, or how someone might try to socially engineer an attack.”<br><br>Unlike a standard grant, the NIST award is structured as a cooperative agreement in which the funding agency will collaborate in shaping and delivering programs as they evolve.<br><br>“The advantage of working with NIST is that top people work there. They are the standards body, so they have seen and surveyed a lot of industry,” Menon says. He also lauds NIST’s high-level view of cybersecurity and its implications. “They’re not just looking at technology but also public policy, human factors, etc. It’s a holistic approach.”<br><br><em>Organizations interested in being an industry participant (whether they have cybersecurity-focused or business process improvement-focused projects) with PREP are encouraged to contact </em><a href="mailto:bngac@gmu.edu"><em>Brian Ngac</em></a><em>.</em></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="07a7b036-4377-4afd-9d70-f66f9b300e24"> <div class="cta"> <a class="cta__link" href="/admissions-aid"> <p class="cta__title">Join the 鶹Ƶ Nation <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4731e68e-8e07-4ddf-a91b-b3f486139b82" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="d25831bc-6cce-452d-b805-bb45b8714043" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-0f4480aa3569f4002402d5e3695c1de02e991a8407226f251503e5e281f6693b"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/confidence-meets-opportunity-fall-2025-career-fair" hreflang="en">Confidence meets opportunity at Fall 2025 Career Fair </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/center-community-mental-health-partnership-provides-behavioral-health-training" hreflang="en">Center for Community Mental Health partnership provides behavioral health training </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/career-influencers-network-guides-career-ready-students-toward-success" hreflang="en">Career Influencers Network guides career-ready students toward success</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 9, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-pathways-program-introduces-high-schoolers-quantum" hreflang="en">George 鶹Ƶ pathways program introduces high schoolers to quantum </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 3, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-mason-highlighted-creating-workforce-partnerships" hreflang="en">George 鶹Ƶ highlighted for creating workforce partnerships</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 15, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/21026" hreflang="en">A.I. &amp; Innovation - Costello</a></div> <div class="field__item"><a href="/taxonomy/term/21091" hreflang="en">Costello Research Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/20911" hreflang="en">Costello Research ICT</a></div> <div class="field__item"><a href="/taxonomy/term/12501" hreflang="en">Costello College of Business News</a></div> <div class="field__item"><a href="/taxonomy/term/13796" hreflang="en">Costello College of Business Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/13131" hreflang="en">ISOM Faculty Research</a></div> <div class="field__item"><a href="/taxonomy/term/15126" hreflang="en">workforce</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/19536" hreflang="en">National Institute of Standards and Technology NIST</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/17356" hreflang="en">Strategic Direction</a></div> </div> </div> </div> </div> </div> Fri, 10 May 2024 17:01:06 +0000 Jennifer Anzaldi 112546 at 鶹Ƶ professors are researching hacker psychology to defend against cyberattacks /news/2024-05/mason-professors-are-researching-hacker-psychology-defend-against-cyberattacks <span>鶹Ƶ professors are researching hacker psychology to defend against cyberattacks</span> <span><span>Colleen Rich</span></span> <span><time datetime="2024-05-02T09:39:13-04:00" title="Thursday, May 2, 2024 - 09:39">Thu, 05/02/2024 - 09:39</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">A team of 鶹Ƶ researchers is probing the psychology behind cyberattacks as part of a U.S. intelligence community program aimed at turning the tables on hackers.</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/cybersecurity_gettyimages-funtap1484313578_.jpg?itok=wb4ntm7k" width="350" height="205" alt="cybersecurity graphics" loading="lazy"> </div> </div> <figcaption>Illustration by Getty Images</figcaption> </figure> <p><span><span><span>As the prevalence and severity of cyberattacks continue to grow, the Intelligence Advanced Research Project Activity (IARPA) has turned its focus on how best to exploit the weakest link in cyberattacks: the human factor. </span></span></span></p> <p><span><span><span>Under a new IARPA program, researchers hope to better understand cyber attackers’ cognitive vulnerabilities and decision-making biases and use those vulnerabilities to derail future attacks. </span></span></span></p> <p><span><span><span>Researchers <a href="https://volgenau.gmu.edu/profiles/dbarbara">Daniel Barbará</a>, <a href="https://computing.gmu.edu/profiles/ateniese">Giuseppe Ateniese</a>, and <a href="https://psychology.gmu.edu/people/gmatthe">Gerald Matthews</a> were recently selected as part of a broader team of computer science, cybersecurity, and psychology experts to forge new research pathways and deliver cutting-edge &nbsp;technology as part of IARPA’s Reimagining Security with Cyberpsychology-Informed Network Defense, or ReSCIND, program.</span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-05/110406052e.jpg?itok=s7eJDMa9" width="282" height="350" alt="Daniele Barbara" loading="lazy"> </div> </div> <figcaption>Daniel Barbara. Photo by Office of University Branding</figcaption> </figure> <p><span><span><span>The team of researchers will build defensive tools that first cue in on hackers’ human limitations and use those weaknesses to delay or derail the attack while it is underway.&nbsp; </span></span></span></p> <p><span><span><span>“You want to make them waste their time,” said Barbará, a computer science professor at George 鶹Ƶ’s <a href="https://cec.gmu.edu/">College of Engineering and Computing</a>. “The more they waste their time, the least damage they’re going to do.”</span></span></span></p> <p><span><span><span>This can be accomplished by luring hackers with decoys such as false networks or documents to distract them. </span></span></span></p> <p><span><span><span>But the trick is two-fold. The decoys must first and foremost appear to be real. They also need to entice the hackers away from their original aim. The latter is where understanding the psychological factors that influence hackers is essential. </span></span></span></p> <p><span><span><span>As part of the first phase of the ReSCIND program, researchers will aim to fill gaps that exist in the current understanding of human cognition and decision making that influence cyber attackers’ behavior. </span></span></span></p> <p><span class="intro-text">“It’s a challenging topic to address because hackers, of course, tend to be somewhat secretive,” Matthews, a professor of psychology at George 鶹Ƶ, said. “There aren’t many opportunities to study hacker psychology.”</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/giuseppe-ateniese-1x1-profile.jpg?itok=QNcLhVg5" width="350" height="474" alt="Giuseppe" loading="lazy"> </div> </div> <figcaption>Giuseppe Ateniese. Photo provided</figcaption> </figure> <p><span><span><span>Matthews said the current understanding of hackers’ behavior that provides the baseline for their research comes from several areas of study in psychology. Key among those areas is human performance and in particular how emotional states might influence performance. </span></span></span></p> <p><span><span><span>“Hackers themselves are under pressure and potentially anxious about getting caught,” Matthews said. “They’re anxious about looking foolish to the people that they are working with.”</span></span></span></p> <p><span><span><span>Cultural factors that motivate hackers are also important to consider and may vary greatly among hackers. Thrill-seeking college-age hackers, for example, would have different cultural norms and motives than highly trained professionals acting on behalf of a nation-state adversary, Matthews said.</span></span></span></p> <p><span><span><span>Researchers hope to further understand the full scope of psychological factors that influence hackers, including how to measure, predict, and induce their cognitive vulnerabilities. </span></span></span></p> <p><span><span><span>“There’s a certain amount of psychology that allows you to link the emotional reactions that hackers might have to cognitive biases and other vulnerabilities in performance,” Matthews said. “So, in this first part of the research, we’re trying to sketch out what some of those vulnerabilities might be.”</span></span></span></p> <p><span><span><span>As part of the second phase, researchers will further define when cyberpsychology-informed defenses can best be used and how to determine the success of those defenses. The final phase will focus on modeling, adapting, and automating those defenses.</span></span></span></p> <p><span><span><span>Ateniese, a computer science professor and eminent scholar in cybersecurity, said the ReSCIND program reflects the growing importance of cyberpsychology research in shaping emerging technology. </span></span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2024-05/matthews_pic-1.jpg?itok=G5k0FHSz" width="352" height="396" alt="Matthews" loading="lazy"> </div> </div> <figcaption>Gerald Matthews. Photo provided</figcaption> </figure> <p><span><span><span>“I see a myriad of excellent applications, not just this project,” Ateniese said. “As you can imagine, people today are building AI systems that either mimic or seek to improve upon human behavior. So, the psychology perspective is very intriguing.”</span></span></span></p> <p><span><span><span>The ReSCIND program will run for nearly four years and is being carried out through research contracts awarded across five teams.</span></span></span></p> <p><span><span><span>Barbará, Ateniese, and Matthews’ research will contribute to a ReSCIND contract awarded to SRI International, an independent nonprofit research institute headquartered in California.</span></span></span></p> <p><span><span><span>The George 鶹Ƶ team will work alongside experts from the Florida Institute for Human and Machine Cognition, Margin Research, Research and Assessment Design: Science Solution, Two Six Technologies, University of Florida, and Virtual Reality Medical Center.</span></span></span></p> <p><span><span><span>In many ways, the project is a natural progression for the three professors who have worked together on several previous projects requiring a multidisciplinary approach. </span></span></span></p> <p><span><span><span>They were first introduced in 2021 by Amarda Shehu, a computer science professor and co-director at the time of the George 鶹Ƶ’s transdisciplinary <a href="https://cahmp.gmu.edu/">Center for Advancing Human-Machine Partnerships</a> (CAHMP). </span></span></span></p> <p><span><span><span>A call for proposals from Virginia’s Commonwealth Cyber Initiative for a project that sought to bridge cybersecurity and human factors research to help users build secure passwords immediately brought to mind Barbará, Ateniese, and Matthews’ expertise. </span></span></span></p> <p><span><span><span>“I always had the agenda of putting teams together and finding some funding opportunities so that then they could obtain preliminary results through which to demonstrate credibility for larger projects,” Shehu said. </span></span></span></p> <p><span><span><span>The match has led to a series of successful projects by the team, including the Commonwealth Cyber Initiative password project and a project focused on distinguishing authentic videos from deepfakes. </span></span></span></p> <p><span><span><span>“The IARPA project is, in some sense, an example of the culmination of an activity, how you put a team together,” Shehu said. “They find some funding so that they can start that relationship and then that kind of blossoms into a larger project. It's really a perfect example of what we want to see in […] in general at 鶹Ƶ in terms of transdisciplinary research and the fruit of that research.”</span></span></span></p> <p><span><span><span>Shehu, now associate vice president for research for 鶹Ƶ’s <a href="https://idia.gmu.edu/">Institute for Digital Innovation</a>, said bringing teams together with broad collective expertise is critical to solving the most complex impediments to technological progress. </span></span></span></p> <p><span><span><span>“The most challenging problems nowadays don't reside specifically within one discipline,” she said. “They bridge disciplines.”</span></span></span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="aa9c41f0-0fb7-46eb-a73e-ea58b759edbb" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="489b4216-d3ff-476d-a750-7e0269c7249b"> <div class="cta"> <a class="cta__link" href="/admissions-aid"> <p class="cta__title">Join the 鶹Ƶ Nation <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="22d313bc-f4a2-4a65-993b-0c1776cceef2" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ashehu" hreflang="und">Amarda Shehu</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/ateniese" hreflang="en">Giuseppe Ateniese</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:feature_image" data-inline-block-uuid="16a5b1cc-1c82-4cf7-a26d-a1bff5841a00" class="block block-feature-image block-layout-builder block-inline-blockfeature-image caption-below"> <div class="feature-image"> <div class="narrow-overlaid-image"> <img src="/sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz" srcset="/sites/g/files/yyqcgq291/files/styles/feature_image_small/public/2023-07/1.png?itok=gPwpqoNE 768w, /sites/g/files/yyqcgq291/files/styles/feature_image_medium/public/2023-07/1.png?itok=i7iiKAdz 1024w, /sites/g/files/yyqcgq291/files/styles/feature_image_large/public/2023-07/1.png?itok=jNMZzKgm 1280w" sizes="(min-width: 1024px) 80vw,100vw" alt="&quot; &quot;"> </div> </div> </div><div data-block-plugin-id="inline_block:text" data-inline-block-uuid="eefb6733-a6f2-492c-ba87-9bfa89ed1cc4" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="a852cad5-39c5-4004-b5c9-a2b2c25e0aea" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-cc13d0d29e4f8bd55937753a68b592c2c3434d165caec5c190ef84085be1f727"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/george-mason-and-kings-college-london-win-google-award-fight-ai-driven-romance-scams" hreflang="en">George 鶹Ƶ and King’s College London win Google Award to fight AI-driven romance scams targeting older adults </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 26, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-10/anonymitys-arx-nemesis" hreflang="en">Anonymity’s ARX nemesis</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">October 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George 鶹Ƶ turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="8c531cdb-44a9-4726-8e81-49daea9a57b2" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><hr> <p>&nbsp;</p> <p><em>This content appears in the Fall 2024 print edition of the </em><strong><a href="/spirit-magazine" target="_blank" title="鶹Ƶ Spirit Magazine">鶹Ƶ Spirit Magazine</a></strong><em> with the title "Using Psychology to Defend Against Cyberattacks."</em></p> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="d4793943-57f6-4c4e-97e3-4ca471c68d62"> <div class="cta"> <a class="cta__link" href="/spirit-magazine"> <p class="cta__title">More from 鶹Ƶ Spirit Magazine <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> </div> </div> Thu, 02 May 2024 13:39:13 +0000 Colleen Rich 111891 at Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity /news/2024-02/commonwealth-cyber-initiatives-cybersecurity-traineeship-launches-careers <span>Commonwealth Cyber Initiative’s Cybersecurity Traineeship launches careers in cybersecurity</span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2024-02-12T22:36:28-05:00" title="Monday, February 12, 2024 - 22:36">Mon, 02/12/2024 - 22:36</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">The <a href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html">Commonwealth Cyber Initiative Northern Virginia Node (CCI NoVa Node)</a> is preparing for the third iteration of its <a href="https://cyberinitiative.org/talent-development/cci-cybersecurity-traineeship-program.html">Cybersecurity Traineeship Program</a>, which offers a seven-week course to <a href="https://cyberinitiative.org/content/cci_research_vt_edu/en/about/regional-structure/northern-virginia-node/about-nova-node.html" target="_blank">Northern Virginia residents</a> interested in pivoting into the cybersecurity sector followed by career support from 鶹Ƶ and Northern Virginia Community College professionals.&nbsp;&nbsp;</span></p> <figure role="group"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2024-02/image.png" width="1280" height="627" alt="CCI NoVa Node map" loading="lazy"> </div> </div> <figcaption>CCI NoVa Node's region is outlined in light blue.&nbsp;&nbsp;</figcaption> </figure> <h3><strong>Course Beginnings</strong></h3> <p>The program’s intensive, full-time course curriculum familiarizes trainees with subjects relevant to Information Technology and cybersecurity, such as Python, database design, SPLUNK, and AWS. Trainees attend class all day and complete homework assignments outside of class.&nbsp;&nbsp;</p> <p>Keyvon Riley, Aaron Hornbuckle, and Walter WIlliams, members of the program’s first cohort, credit the program with launching their careers in tech.&nbsp;&nbsp;</p> <p>“The course days go by really quickly, so practicing is important,” said Riley. “The workload was very fair and needed in order to learn as much as a person can in the allotted time.”&nbsp;</p> <p>“Through a fast-paced learning environment, we were introduced to many concepts, processes, and tools that would be useful and relevant to entering this new environment,” said Hornbuckle. “It also prepared me by showing me how much there is to know and learn in this field, which continuously expands the longer I've worked in the industry.”&nbsp;</p> <p>Williams said the program exceeded his expectations: "Despite my initial nervousness due to a lack of industry understanding, I left feeling equipped with a solid foundation of cybersecurity knowledge."&nbsp;</p> <p>Scott Wood, the associate director of IT and Business Programs at Northern Virginia Community College, who designs the course curriculum each year, adapts the course to the shifting needs of the tech sector by consulting <a href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node/about-nova-node/nova-node-industry-partners.html">industry partners</a>. Next year, Wood will&nbsp;also incorporating guidelines set forth in “<a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf">National Cyber Workforce and Education Strategy</a>,” a 2023 report from the White House.&nbsp;</p> <p>“In addition to assessing technical skills, trainees are evaluated on participation, curiosity, creativity, communication, collaboration, and professionalism,” said Wood. “I’ve been amazed at the level of dedication and commitment from trainees in both iterations of the program. The program runs June through August, when most people are thinking about summer vacations and outdoor activities. The trainees in both programs really put in the work. They didn’t just show up for class. They took an active role in learning the skills and remained engaged throughout the seven-week program.”&nbsp;</p> <h3><strong>Time for Internships</strong></h3> <p>After completing the course, high performers in the program are placed in full-time internship roles with tech companies in Northern Virginia. Riley, Hornbuckle, and Williams each completed internships with <a href="https://www.peraton.com/">Peraton</a> before being offered full-time positions at the company. Riley and Hornbuckle are now cyber security systems engineers, and Williams is a UX/UI designer.&nbsp;</p> <p>"It was an honor to gain on-the-job cybersecurity experience," Williams said. "My internship provided opportunities to shadow projects, contribute to use case development, and apply my UX/UI design skills in unexpected ways."&nbsp;</p> <p>Riley noted that behind his success was a significant amount of work. For example, between his internship and starting his formal start date at Peraton, Riley became CompTIA Security+ certified.&nbsp;&nbsp;</p> <p>“My industry landing did and still does surprise me, because cybersecurity is not for beginners,” Riley explained. “Most cybersecurity [workforce] members have five years or more in the IT field before landing a cyber role. I did not know that when I landed my role and thus had a hard time grasping the level of IT I entered into. Nevertheless, I hit the ground running and would not change it.”&nbsp;&nbsp;</p> <h3><strong>Moving in New Directions</strong></h3> <p>Riley will begin a master’s in information technology in the fall. “I have made the most of every opportunity since the traineeship, and it has led to my success today,” he said. “My future in tech is bright!”&nbsp;</p> <p>Hornbuckle echoed Riley's sentiments, emphasizing the program's role in facilitating a smooth transition into his role. The program's emphasis on continuous learning resonated strongly with Hornbuckle, who noted the ever-evolving nature of the tech landscape and the importance of staying abreast of emerging trends.&nbsp;</p> <p>A former fine arts teacher, Williams' transition into a UX/UI designer underscores the program's role as a pathway to career reinvention. "The program has undoubtedly led me to a rewarding career in tech/cybersecurity," he said, adding, "I was surprised by the opportunity to utilize my UX/UI design skills within cybersecurity. This fusion of disciplines reflects the dynamic nature of the field and the endless possibilities for professional growth."&nbsp;</p> <p>With a curriculum designed in collaboration with industry experts and with a commitment to continuous improvement, CCI NoVa Node’s Cybersecurity Traineeship Program offers individuals seeking to break into the cybersecurity and IT sectors skills, confidence, and resources to embark on rewarding careers in technology.&nbsp;</p> <p>“CCI created a great way to give new opportunities to those wanting a career change into cybersecurity,” said Riley. “I will always be grateful I was one of the first people to have successfully completed this program."&nbsp;</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4151" hreflang="en">NoVa Community College</a></div> <div class="field__item"><a href="/taxonomy/term/1961" hreflang="en">information technology</a></div> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/15126" hreflang="en">workforce</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> </div> </div> </div> </div> </div> Tue, 13 Feb 2024 03:36:28 +0000 Teresa Donnellan 111021 at Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity /news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity <span>Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2024-02-08T16:06:24-05:00" title="Thursday, February 8, 2024 - 16:06">Thu, 02/08/2024 - 16:06</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">鶹Ƶ researcher <a href="/profiles/vshah22" target="_blank">Vijay Shah</a> has joined a $2 million project to develop a system to secure 5G Open Radio Access Network (O-RAN) architecture.</span></p> <p><span><span>Funded by the <a href="https://www.ntia.gov/press-release/2024/biden-harris-administration-awards-nearly-80m-wireless-innovation" target="_blank">National Telecommunications and Information Administration (NTIA)</a>, the project "A Holistic Cybersecurity Testing Framework for 5G Radio Access Networks" is a collaboration with Virginia Tech, Penn State University, and Worcester Polytechnic Institute.</span></span></p> <p><span><span>Shah, who leads <a href="https://www.nextgwirelesslab.org/" target="_blank">鶹Ƶ’s NextG Wireless Lab</a>, will be allocated nearly a quarter of the project’s budget and be working with Nishith Tripathi and Jeff Reed from Virginia Tech,&nbsp;Syed Rafiul Hussain from Penn State University, and Bo Tang from Worcester Polytechnic Institute.</span></span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-02/vijay_shah_insta.png?itok=UBR9iUrM" width="350" height="350" alt="Vijay Shah" loading="lazy"> </div> </div> <figcaption>Vijay Shah</figcaption> </figure> <p lang="EN-US">Security vulnerabilities in O-RAN present a critical cybersecurity challenge in the era of 5G. The team aims to create “a holistic and automated cybersecurity testing framework for O-RAN,” per the project’s executive summary. &nbsp;</p> <p lang="EN-US">Shah will also receive&nbsp;funding from the Commonwealth Cyber Initiative (CCI) to investigate fingerprinting technology for 5G/NextG O-RAN supply chain risk management, additional funding that highlights the multifaceted approach taken by the NextG Wireless Lab to address 5G networks cybersecurity challenges.&nbsp;</p> <p lang="EN-US">As part of these initiatives, the NextG Wireless Lab is actively growing its research team, with opportunities for postdoctoral researchers and PhD students interested in O-RAN cybersecurity, testing, and supply chain management.</p> <p lang="EN-US">Those interested in contributing to cutting-edge research in this field should <a href="mailto:vshah22@gmu.edu" target="_blank">email Shah</a>.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/7181" hreflang="en">Department of Cyber Security Engineering faculty</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/8241" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/3776" hreflang="en">cyber infrastructure</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/19211" hreflang="en">WCC</a></div> </div> </div> </div> </div> </div> Thu, 08 Feb 2024 21:06:24 +0000 Teresa Donnellan 110681 at