Webinar on UMBC's new, live online cybersecurity training, 11am 6/30

UMBC will collaborate with the Howard County Public School System (HCPSS) to increase STEM opportunities for students. The partnership was formalized with an official signing on Thursday, September 1 at the Sheraton Columbia Waterside Restaurant in Columbia, Maryland.

UMBC will collaborate with the HCPSS Office of Career and Technology Education to inform students about the wide variety of information technology and engineering programs available at UMBC and the Center for Women In Technology (CWIT). UMBC will provide guest speakers for high school classes, attend HCPSS professional development days for computer science and technology teachers, and collaborate with Howard County community groups to promote STEM education to student groups underrepresented in STEM fields. CWIT offers scholarships, initiatives for creating a supportive learning environment, and programs for high school girls interested in engineering and information technology.

UMBC to help promote computing and engineering in Howard County Public School System

The UMBC Cyber Defense Lab presents

Categorizing Misconceptions of Cybersecurity Reasoning

 Travis Scheponik
Computer Science and Electronical Engineering
University of Maryland, Baltimore County

11:15am-12:30pm Friday, 9 September 2016, ITE 237

We present preliminary analysis of student responses to cybersecurity interview prompts.

During spring 2016, we interviewed twenty-six students at three diverse colleges and universities (UMBC, Prince George’s Community College, Bowie State University) to understand how they reason about cybersecurity.  Each interview lasted approximately one hour during which we asked the subject to solve four cybersecurity problems.  For this purpose, we developed twelve engaging interview prompts organized in three protocols each comprising four prompts.  Using a paired expert-novice methodology, we are analyzing transcriptions of the interviews produced from audio and video recordings.  The twelve prompts focused on five difficult and important concepts identified from a Delphi method with thirty-six experts, which we carried out in fall 2014.

Preliminary analysis of student responses reveals common misconceptions and problematic reasoning, including conflating concepts, biased reasoning, unsound logic, and factual errors.  For example, students commonly conflate authentication and authorization, as well as encryption and hashing.   Examples of biased reasoning include seeing the situation only from the user’s perspective, placing inappropriately high trust in physical objects, and underestimating potential vulnerabilities from insider threats.  Initially, we marked student statements as “correct’’ or “incorrect.’’  From the “incorrect’’ responses, we identified misconceptions about cybersecurity.  Then, we categorized why responses were incorrect and we identified a variety of biases and problematic reasonings.

Our motivation is to produce educational assessment tools that will measure how well students understand cybersecurity concepts, for the purpose of identifying effective ways to teach cybersecurity.  Results of our work will also be useful in developing curricula, learning exercises, and other educational materials and policies.

Joint work with David Delatte, Geoffrey Herman, Michael Neary, Linda Oliva, Alan Sherman, and Julia Thompson.  Support for this research is provided in part by the U.S. Department of Defense under CAE-R grants H98230-15-1-0294 and H98230-15-1-0273, and by the National Science Foundation under SFS grant 1241576.  We will present our results at the Frontiers in Education Conference, October 12-15, 2016, in Erie, PA.

 About the Speaker:  Travis Scheponik is a PhD student in computer science at UMBC, working with Dr. Alan T. Sherman.  His research interests include cybersecurity education.

Host: Alan T. Sherman,

talk: Categorizing Misconceptions of Cybersecurity Reasoning, 11:15 Fri 9/9


The UMBC ACM Student Chapter and CSEE department invite students, alumni, faculty and staff to its seventh annual Welcome Back Picnic held 1-2:30 on Thursday, September 8 in room 312 of the University Center.

It’s a opportunity to socialize with everyone and for the faculty and students to meet each other.

What: Seventh annual CSEE Welcome Back Picnic
Who: Limited to CSEE faculty, staff, students and alumni
Date: Thursday, 8 September 2016
Time: 1:00pm to 2:30pm
Location: University Center, Room 312

So get ready to dig into some good food and conversations. Have an amazing year ahead! Welcome once again, from the UMBC ACM Student Chapter Committee and CSEE department.

7th Annual CSEE Welcome Back Picnic, 1-2:30 Thr Sept 8, 312 University Cntr

Screen Shot 2016-08-30 at 1.04.19 AM

The Computing Research Association has published five short videos to explain the benefits of pursuing a PhD in a computing discipline. The videos showcase young researchers with PhDs who are now working in industry as they talk about what compelled them to pursue a doctorate and how they are using their advanced training in their work. The videos illustrate how a PhD is useful in industry as well as in academia.


Click to watch all five videos or select one below.
  • Video 1: Adrienne Porter Felt (PhD Berkeley) talks about her work on security at Google.
  • Video 2: Hoda Eldardiry (PhD Purdue) talks about her work on predictive analytics, using machine learning and data mining at Palo Alto Research Center (PARC)
  • Video 3: Susanna Ricco (PhD Duke) and Mac Mason (PhD Duke) at Google talk about their work in robotics and vision.
  • Video 4: Richard Socher (PhD Stanford) talks about his work in artificial intelligence at Salesforce.
  • Video 5: Tiffany Chen (PhD Stanford) talks about her work in bioinformatics at Cytobank.

Consider pursuing an advanced degree in computing

Professor Adam Bargteil was elected to a three-year term as director-at-large for ACM SIGGRAPH, the premier professional organization for computer graphics and interactive techniques.

Dr. Bargteil completed his Ph.D. in computer science at the University of California at Berkeley, where he worked in the Berkeley Computer Animation and Modeling group. Before joining the UMBC CSEE department, he spent two years as a postdoctoral fellow in the Graphics Lab at Carnegie Mellon University and was an assistant professor in the School of Computing at the University of Utah. His primary research interests are in computer graphics and animation, especially using physics-based animation. He is also interested in scientific computing, numerical methods, computational physics, and computational geometry.

SIGGRAPH is a special interest group of the Association for Computing Machinery (ACM), the world’s first and largest computing society. Since its beginning in 1974 as a small group of specialists in a previously unknown discipline, it has evolved to become an international community of researchers, artists, developers, filmmakers, scientists, and business professionals who share an interest in computer graphics and interactive techniques.

As a director-at-large, Professor Bargteil will be part of a nine-person committee charged with steering the organization on its mission to foster and celebrate innovation in computer graphics and interactive techniques. Like all voting members of the ACM SIGGRAPH Executive Committee, directors-at-large are elected by the ACM SIGGRAPH membership.

Prof. Adam Bargteil Elected as ACM SIGGRAPH Director-at-Large


Ph.D. Dissertation Defense
Computer Science and Electrical Engineering

Solving Mathematical Problems in Quantum Regime

Omar Shehab

2:00pm Thursday, 7 July 2016, ITE 325b

In this dissertation, I investigate a number of algorithmic approaches in quantum computational regime to solve mathematical problems. My problems of interest are the graph isomorphism and graph automorphism problems, and the complexity of memory recall of Hopfield network. I show that the hidden subgroup algorithm, quantum Fourier sampling, always fails, to construct the automorphism group for the class of the cycle graphs. I have discussed what we may infer for a few non-trivial classes of graphs from this result. This raises the question, which I have discussed in this dissertation, whether the hidden subgroup algorithm is the best approach for these kinds of problems. I have given a correctness proof of the Hen-Young quantum adiabatic algorithm for graph isomorphism for cycle graphs. To the best of my knowledge, this result is the first of its kind. I also report a proof-of-concept implementation of a quantum annealing algorithm for the graph isomorphism problem on a commercial quantum annealing device. This is also, to the best of my knowledge, the first of its kind. I have also discussed the worst-case for the algorithm. Finally, I have shown that quantum annealing helps us achieve exponential capacity for Hopfield networks.

Committee: Drs. Samuel J Lomonaco Jr. (Chair), Milton Halem, Yanhua Shih, William Gasarch and John Dorband

Omar Shehab PhD defense: Solving Mathematical Problems in Quantum Regime, 7/7

Rick Forno

On June 14, the Democratic National Committee announced that its computer system had been hacked. Rick Forno, director of UMBC’s graduate program in cybersecurity and assistant director of the UMBC Center for Cybersecurity, discussed the “ongoing process” of stopping such attacks during a long-form discussion segment on the WOSU Radio’s “All Sides” show.

Forno made clear that there is no single, permanent solution to thwarting cyber threats, and a single mistake or vulnerability can have a major impact on digital security.. “All it takes is one person who does something wrong”—opening an email or plugging in a thumb-drive containing malware—“to place the entire organization at risk,” he says.

Forno also focused on the challenge of educating people about how to practice safe computing, and turning those practices into regular habits. The issues that arise with computing are as much human-based as they are technology-based, he suggests, plus, “You attack one problem and three more pop up the next day.”

To understand how a hack happened and to prevent hackers from taking advantage of vulnerabilities in the future, Forno suggests collecting and analyzing “artifacts” of the attack—things the hackers left behind—and heightening ongoing monitoring of key systems, approaches the DNC is likely now taking.

Rick Forno discusses DNC hack on NPR

Google will fund travel grants to the 2016 Grace Hopper Celebration of Women in Computing Conference (GHC) which takes place in Houston, Oct 19-21, 2016. The GHC is the world’s largest gathering of women technologists and offers many valuable resources to students and academics alike, from a Student Opportunity Lab to tracks specifically designed to educate and inspire faculty. Its career fair, one of the largest in the U.S., earns a 97% satisfaction rate from our student survey respondents.

University students and industry professionals in the US and Canada who are excelling in computing and passionate about supporting women in tech can apply for a travel grant to attend the 2016 Grace Hopper conference. Sponsorship includes: conference registration, round trip flight to Houston, TX, arranged hotel accommodations from October 18-22, $75 USD reimbursement for miscellaneous travel costs and a fun social event with your fellow travel grant recipients on one of the evenings of the conference.

Apply by Sunday, July 10 using this online form. The Grace Hopper Travel Grant recipients will be announced by July 27th.

Travel grants for students to attend 2016 Grace Hopper Conference

Cyber Chase

In 2009 a small group took shape at UMBC. A student-run club composed of individuals who shared one common interest: computer and network security. They would meet weekly and discuss the latest cyber-security topics happening and even compete at a national security event, known as the Collegiate Cyber Defense Competition (CCDC). Officially, the UMBC Cyber Defense Team was born, but the group would also come to be known as the UMBC Cyber Dawgs.

Founding member Jorge Teixeira recounted what the early days of the UMBC Cyber Defense Team were like. “The idea started from Jeff Miller, who talked to Prof. John Pinkston,” said Teixeira, “I was sitting in [his lab] when they met to scout for a meeting room/lab.” At the time, Teixeira had done some security research for his MS and had a networking background and wanted to help Miller on what he could.

“We wanted to become an official SGA org but there was a lot of bureaucracy and delays involved, so that didn’t happen right away.” said Teixeira. In Fall 2010, the group competed in CCDC qualifications and went to regionals in mid Spring 2010, boosting the popularity of the group and finally becoming recognized by the SGA by late Fall 2010.

Teixeira also revealed the origins of the name Cyber Dawgs. “The name was coined by Dr. Nicholas in one of our early meetings with him, but the official name was and is UMBC Cyber Defense Team.” Said Teixeira.

“There are no limitations whatsoever with this group.”

Today, the Cyber Dawgs are still around and continue to compete at competitions like the CCDC. They have two faculty advisors, Dr. Charles Nicholas and Dr. Richard Forno, who take a hands off approach to let the club be student run. However, they do help with the logistics of the club and help provide necessary resources.

Bryan Vanek, Computer Science major and Cyber Dawgs club President, runs the day to day operations. While the majority of the group consists of STEM majors, Vanek doesn’t want the Cyber Dawgs to be limited to just people in the security or the computer science field. He actively encourages anyone who has an interest in some area of cybersecurity and a willingness to learn to join the group. “There are no limitations whatsoever with this group.” Vanek said, “We’ll be more than happy to help you along the way!”

Preparing for the yearly CCDC competition is a huge undertaking. The competition focuses on aspects of information assurance and system security, where teams are given a commercial system that they need to protect. In order to do this, security checklists are looked over and good security practices, such as firewall rules and permissions are implemented.

During the competition, a ‘red team’ will attack their system in order to compromise it. Cyber Dawgs have to react in real time, not only trying to close off their connection but cleaning up any damage the red team has done to prevent it from happening again. They have to achieve all of this while keeping any and all required services of that system up.

Cyber Dawgs

2015 CCDC

This year, the Cyber Dawgs placed fourth at regionals and the year before that they received first place at regionals, which let them move on to the national competition in Texas where they placed fourth overall.

“As long as people have a desire to learn security, we will be there to support them.”

Anh Ho, a junior Computer Science major and Vice President of Cyber Dawgs, helps plan meetings and events in addition to helping other club members prepare technically for competitions. It’s his 4th year in the club and will be his 3rd year competing. He also helps avoid some of the pitfalls they’ve had in the past when dealing with both club and competition logistics. “These can be simple logistical oversights such as failure to request T-Shirts from SGA [to] technical configurations and what we should do the following year to learn from our mistakes.” said Ho.

He also shares Vanek’s passion in supporting people who take an interest in security. “As long as people have a desire to learn security, we will be there to support them.” said Ho.

Other competitions include cyber Capture the Flags (CTFs). These events can last anywhere between a day or a week with a focus on cyber security as a whole. Some CTFs are more focused on red team activities, such as a reverse engineering and web exploitation. Other CTFs focus on defensive mechanics, like analyzing forensic data and implementing strong security practices on servers.

Cyber Dawgs Lab

This is the lab where the Cyber Dawgs use to practice for competitions. From left to right: Julio Valcarcel, Anthony Sasadeusz, Anh Ho, Jorge Teixeira.

Recently, the group participated in UMD’s Cyber Skyline CTF and Booz Allen Hamilton’s Kaizen CTF. “In these competitions, we usually do pretty well,” said Vanek, “we received first place either by an individual or by a team.”

“One of our other missions is to spread the word about how awesome the world of cyber security is…”

The Cyber Dawgs aren’t strictly about competitions. Vanek said, “If we just did [competitions] a lot of new people would get deterred. Thus one of our other missions is to spread the word about how awesome the world of cyber security is by teaching others in whatever way we can.”

During regular club meetings, the group has a large selection of activities that people can choose from to learn more about cyber security. These activities change depending on the semester, so in the Fall the activities are focused more on prepping for CTFs while the Spring semester focuses on CCDC by setting up servers and learning about firewall rules.

Christian Beam, a junior studying Computer Science and serving as club treasurer mentioned how not all meetings are just preparing for competitions. “Some meetings we have guest speakers from the industry to give talks about topics such as reverse engineering, or cryptography.” said Beam.

Cyber Dawgs Meeting

This image is from a tech talk with the consulting firm Booz Allen Hamilton. After the meeting, the firm networked with attendees and even accepted resumes for internship and job positions.

The Cyber Dawgs try to reach as many people as possible, whether that involves letting people know about their club meetings through their list serve or attending involvement fest and networking with other groups and clubs that share an interest in cyber security. They reach out to groups like the UMBC Cyber Scholars group to let them know about meetings and encouraging them to get involved.

Chris Gardner joined the Cyber Dawgs in his freshmen year at UMBC in 2014. “I’ve been interested in cyber security for a few years now and was the president of my high school’s security club, so joining the Cyber Dawgs seemed like a natural progression.” said Gardner.

He now helps lead the group in cyber CTFs and has learned a lot about cyber security since he’s been with the group.

The Cyber Dawgs are now working on quite a few projects for the upcoming school year. They plan to update their website with new tools and resources for current and future members. In addition to that, they plan on getting a coach for the CCDC to help them in structure and to show their weak points.

“…great way to give people who are new to cyber security another way to learn.”

In the future, the group wants to host their own CTF event right at UMBC. Vanek said, “This is not only a fun project that we’ve been wanting to do for a while, but it will be a great way to give people who are new to cyber security another way to learn.”

Vanek is proud to be president of the Cyber Dawgs, and is looking forward to all their goals and future as an organization. “I can’t begin to thank everyone enough for all that I’ve learned so far from our experiences together,” Vanek said, “and I truly look forward to what we’re all going to be able to accomplish together in these next few years.

From left to right: Zach Orndorff, Chris Gardner, Josh Domangue, Julio Valcarcel, Jake Rust, Anh Ho, Christian Beam, Tyler Camp

From left to right: Zack Orndorff, Chris Gardner, Josh Domangue, Julio Valcarcel, Jake Rust, Anh Ho, Christian Beam, Tyler Campbell

For more information, you can check out the Cyber Dawgs through their website.

The Cyber Dawgs send out most of their information through the use of their list server. Just send an email to umbccd-subscribe @lists.umbc.edu using your UMBC email address.

You can also chat with members as well by joining their slack channel using for your UMBC email.

Cyber Chase: the UMBC Cyber Dawgs

The UMBC Training Center will hold an online webinar 11:00-11:40am on Thursday, 30 June 2016 about its new, live online versions of its Certificate in Cyber Foundations and our Certificate in Cybersecurity. Each of the courses is comprised of a bundle of classes designed propel you through the training needed to reach specific career and skill-level goals.

This program provides candidates with the skills, knowledge, and credentials required to successfully begin a career in Information Technology and be poised to begin the training necessary to enter the Cybersecurity field. To earn the Certificate in Cyber Foundations, students will be guided through these three courses: CompTIA A+, CompTIA Network+, CompTIA Security+. Each of these courses will prepare you for respective CompTIA Certificate Exams and includes exam vouchers.

The nationally recognized cybersecurity programs at UMBC Training Centers were designed in collaboration with senior executives from Fortune 500 companies and well-known government agencies and teach highly focused skills through practical experience as well as UMBC Training Centers’ signature Rapid Applied Learning approach.

Register for the webinar here.

1 2 3 4 65