cryptography / en Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award /news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award <span>Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </span> <span><span>Nathan Kahl</span></span> <span>Mon, 01/27/2025 - 12:32</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US"><span class="intro-text"><a href="https://cs.gmu.edu/~evgenios/" title=" Evgenios Kornaropoulo">Evgenios Kornaropoulos</a>, an assistant professor in George Mason 鶹’s <a href="https://cs.gmu.edu" title="Computer Science">Computer Science</a> Department, focuses on computer security and applied cryptography, where he stays ahead of changes in the field. "The needs of everyday users have grown, and our technology's privacy expectations must advance accordingly,” he said. “We've moved beyond simply communicating sensitive data securely; now, we need technology capable of performing computations on sensitive data without compromising privacy.” </span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-09/evgenios_kornaropoulos.jpg?itok=dvUt_y7M" width="350" height="350" alt="Kornaropoulos headshot" loading="lazy" /></div> </div> <figcaption>Evgenios Kornaropoulos. Photo provided</figcaption></figure><p>He recently received a <a href="https://www.nsf.gov" title="NSF">National Science Foundation (NSF)</a> <a href="https://new.nsf.gov/funding/opportunities/career-faculty-early-career-development-program" title="CAREER award">CAREER award</a> for $648,811 for his work on privacy and data security under the title “Encrypted Systems with Fine-Grained Leakage.”  </p> <p>The tension between the privacy of sensitive data and the functionality that users demand from their data is the focus of the NSF CAREER funding, and it has been among Kornaropoulos’ research areas for several years. He said, “The new technology that we are developing allows the user to never expose any information in the clear to the cloud while maintaining functionality. You want the cloud to do interesting computations for you without decrypting your information. If you don't decrypt, the cloud never gets to see what you are processing.” </p> <p>When users store sensitive information, such as health records or financial data, with common cloud-based providers, the provider gains full access to the document's contents—essentially exposing the data in plain text to the cloud. A potential remedy is to encrypt the data before uploading it. However, this approach comes with a drawback: whenever users need to access or compute something from the encrypted data, they must download all the scrambled files locally and perform the computations on their own devices. </p> <p>So how can the user still process the information but know that the cloud didn’t learn anything? “We believe that the answer is the notion of ‘cryptographic leakage’, he said. “The cloud provider still sees some accesses on encrypted data, that is, the leakage, but these observations are confusing. 鶹 designs scale to today’s needs and come with provable guarantees that these observations cannot be meaningfully stitched together by the cloud provider to infer the sensitive data.” </p> <p>Kornaropoulos said, “Searching on encrypted data is one of the biggest functionalities and we have a research thrust in which we will collaborate with industry leaders and local organizations on this problem. Specifically, we have an active collaboration with the <a href="https://publichealth.gmu.edu/mapclinics" title="MAP clinics">Mason and Partners Clinics</a> (interprofessional clinics which serve the uninsured and refugee community within Prince William and Fairfax counties in Northern Virginia) to explore the application scenarios of our technology to that setting.” </p> <p>"Privacy-preserving data storage and data use is an important problem in computer security that is of critical interest to organizations that must trust their sensitive data to third-party data storage facilities," said Computer Science department chair David Rosenblum.   "Evgenios is an internationally renowned leader in addressing this problem, and his NSF CAREER award will afford him the opportunity to explore novel solutions that balance strong security guarantees against practical needs for efficiency."</p> <p>The NSF CAREER award is reserved for the nation’s most talented up-and-coming researchers. From the NSF website: “The Faculty Early Career Development (CAREER) Program offers NSF’s most prestigious award in support of early-career faculty who have the potential to serve as academic role models in research and education and to lead advances in the mission of their department or organization.”   </p> <p>The award is the most-recent of several distinctions Kornaropoulos has earned. He was elevated to IEEE Senior Member in 2024, his paper was among the finalists for the “<a href="https://cec.gmu.edu/news/2024-09/computer-science-paper-nominated-pwnie-award-best-cryptographic-attack-category" target="_blank">Best Cryptographic Attack</a>” category at Pwnie Awards 2024, and his latest work at the intersection of AI and security has <a href="https://cec.gmu.edu/news/2024-11/evgenios-kornaropoulos-quoted-ai-and-large-language-models" target="_blank">gained significant media attention</a>.  </p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/evgenios" hreflang="en">Evgenios Kornaropoulos</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="46b947cc-9fad-44b5-8407-f725ea1fe557" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="3550358c-f469-484a-927f-b94b1a277085"> <div class="cta"> <a class="cta__link" href="https://cs.gmu.edu/"> <h4 class="cta__title">Connect with the Department of Computer Science <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="87a69010-1fd4-4adb-b0e0-d230a59d64fc" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="dc8a2233-9e53-4cc3-98ac-acd15cd628e4" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-27c908f74da385ca9b565dc5246e7c89c2727fe3e14de1fd670f6db3b792bd4e"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-02/george-mason-scientist-leads-18m-nsf-grant-address-mobility-challenges-urban-flooding" hreflang="en">George Mason scientist leads $1.8M NSF grant to address mobility challenges from urban flooding</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-02/george-mason-researcher-gets-career-award-quantum-leaps-computing-help-ai" hreflang="en">George Mason researcher gets CAREER award for quantum leaps in computing, with the help of AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 13, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award" hreflang="en">Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 27, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/using-robotics-introduce-ai-and-machine-learning-concepts-elementary-classroom" hreflang="en">Using robotics to introduce AI and machine learning concepts into the elementary classroom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 23, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-12/cyber-savant-hacks-his-way-international-team" hreflang="en">Cyber savant hacks his way onto international team</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 3, 2024</div></div></li> </ul></div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/3346" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/1161" hreflang="en">National Science Foundation</a></div> <div class="field__item"><a href="/taxonomy/term/6606" hreflang="en">Mason and Partners (MAP)</a></div> </div> </div> </div> </div> </div> Mon, 27 Jan 2025 17:32:18 +0000 Nathan Kahl 115471 at Podcast - EP 49: The metaverse, crypto, and the evolution of the internet /news/2023-06/podcast-ep-49-metaverse-crypto-and-evolution-internet <span>Podcast - EP 49: The metaverse, crypto, and the evolution of the internet</span> <span><span>Damian Cristodero</span></span> <span>Fri, 06/02/2023 - 13:37</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">What exactly is the metaverse? Some say it is the future of the internet — a broad shift in how we interact with technology, including new and more ways to collaborate in virtual worlds.  </span></p> <p>Others say it creates even more infringements on privacy and creates chances for identity theft. Foteini Baldimtsi, an assistant professor in George Mason 鶹’s <a href="https://cs.gmu.edu?utm_medium=cpa&utm_source=oub-podcast-core&utm_campaign=ate&utm_content=episode49" target="_blank" title="Department of Computer Science">Department of Computer Science</a>, and James Casey, an associate professor in <a href="https://game.gmu.edu/?utm_medium=cpa&utm_source=oub-podcast-core&utm_campaign=ate&utm_content=episode49" target="_blank" title="Computer Game Design Program website">Mason’s Computer Game Design</a> program, talk to Mason President Gregory Washington about what the metaverse is, and could be, and how the volatile world of cryptocurrency fits in. </p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/extra_large_content_image/public/2023-06/Baldimtsi_Casey_ATE_ep49_800x450_230511901.jpg?itok=SPkrqXEl" width="800" height="450" alt="Fateini Baldimsti and James Casey in the WGMU studio to record episode 49 of the Access to Excellence podcast. " loading="lazy" /></div> </div> <figcaption>Foteini Baldimsti and James Casey join Mason president Gregory Washington in the studio to discuss the imprint the metaverse is making on society and our future in this episode of the <a href="/podcast?utm_medium=cpa&utm_source=oub-podcast-ep49&utm_campaign=ate&utm_content=episode">Access to Excellence</a> podcast. <br /> Photo: Cristian Torres / George Mason 鶹</figcaption></figure></div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="fa50d5c4-679d-425b-90f4-a8a90840a387" class="block block-layout-builder block-inline-blocktext"> <h2>Listen to this episode</h2> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p><iframe allowtransparency="true" data-name="pb-iframe-player" height="150" scrolling="no" src="https://www.podbean.com/player-v2/?from=embed&i=f7xte-1423eb2-pb&share=1&download=1&fonts=Arial&skin=1&font-color=auto&rtl=0&logo_link=episode_page&btn-skin=7&size=150" style="border: none; min-width: min(100%, 430px);" title="The metaverse, crypto, and the evolution of the internet" width="100%"></iframe></p> </div> </div> <div data-block-plugin-id="inline_block:mason_accordion" data-inline-block-uuid="ef02ecc7-f4a3-415d-b53c-c006a5e12881" class="block block-layout-builder block-inline-blockmason-accordion"> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="720821a0-d327-498a-8eba-c314d7b2e898" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="3eaa59ee-d9ab-4fe2-bc1d-6b87a9c651f5"> <div class="cta"> <a class="cta__link" href="https://cs.gmu.edu?utm_medium=cpa&utm_source=oub-podcast-core&utm_campaign=ate&utm_content=episode49"> <h4 class="cta__title">Explore Computer Science at Mason <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4cba23b2-c71b-436f-a0a6-388d0e02bc97" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="da2c7bb3-84c5-494c-936f-b24b72893fe0"> <div class="cta"> <a class="cta__link" href="https://game.gmu.edu/?utm_medium=cpa&utm_source=oub-podcast-core&utm_campaign=ate&utm_content=episode49"> <h4 class="cta__title">Find out about Mason's Computer Game Design program <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="52639f82-486e-4841-815c-3729b2150c80" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p> </p> <p> </p> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Episode</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/foteini" hreflang="und">Foteini Baldimtsi</a></div> <div class="field__item"><a href="/profiles/jcasey9" hreflang="und">James Casey</a></div> <div class="field__item"><a href="/profiles/president" hreflang="und">Gregory Washington</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="60db99c5-7bf7-4848-ad63-f6fa048dc3f6" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="7ae170da-5f9f-445e-8c62-4b77e5e83476" class="block block-layout-builder block-inline-blocknews-list"> <h2>Access to Excellence Podcast Episodes</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-ad6ed7ba7879e00f554be777b8db9959e84e8e077f3761ff95ee581d0a4fff75"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"><li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-04/podcast-ep-67-building-community-and-conversation-through-arts" hreflang="en">Podcast — EP 67: Building community and conversation through the arts</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">April 21, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-03/podcast-ep-66-peace-building-amid-rise-global-conflict" hreflang="en">Podcast — EP 66: Peace building amid the rise of global conflict</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">March 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-02/podcast-ep-65-james-baldwins-insights-american-life-and-identity" hreflang="en">Podcast — EP 65: James Baldwin’s insights on American life and identity</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">February 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/podcast-ep-64-navigating-ais-risks-and-rewards" hreflang="en"> Podcast — EP 64: Navigating AI’s risks and rewards</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 21, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-12/podcast-ep-63-economic-perceptions-driving-us-politics" hreflang="en">Podcast — EP 63: The economic perceptions driving U.S. politics</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 11, 2024</div></div></li> </ul></div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/7311" hreflang="en">Access to Excellence podcast</a></div> <div class="field__item"><a href="/taxonomy/term/326" hreflang="en">Podcast Episode</a></div> <div class="field__item"><a href="/taxonomy/term/226" hreflang="en">podcast</a></div> <div class="field__item"><a href="/taxonomy/term/2321" hreflang="en">Computer Game Design</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/7586" hreflang="en">cryptocurrencies</a></div> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/18066" hreflang="en">metaverse</a></div> </div> </div> </div> </div> <div> </div> </div> Fri, 02 Jun 2023 17:37:33 +0000 Damian Cristodero 105771 at New scoring framework addresses software vulnerabilities /news/2022-10/new-scoring-framework-addresses-software-vulnerabilities <span>New scoring framework addresses software vulnerabilities</span> <span><span>Tama Moni</span></span> <span>Tue, 10/25/2022 - 13:50</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/malbanes" hreflang="und">Massimiliano Albanese</a></div> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span>The George Mason 鶹 <a href="https://cec.gmu.edu">College of Engineering and Computing</a> has launched the Mason Vulnerability Scoring Framework (MVSF), which publishes a continuously updated ranking of the most-common global software weaknesses. The work, in conjunction with <a href="https://www.parc.com/" target="_blank">PARC</a> (Palo Alto Research Center), relies on the <a href="https://nist.gov">National Institute of Standards and Technology’s</a> (NIST)—Common Vulnerabilities and Exposures data and other sources of vulnerability information to create an up-to-date database that can be used to identify and mitigate risks. This line of work has resulted in multiple pending patent applications and a Best Paper Award at the 19th International Conference on Security and Cryptography.</span></span></p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/2022-10/Vulnerability-scoring-NS-thumbnail_600x600.jpg" width="600" height="600" alt="Graphic with blue computer code and yellow locks on a black background" loading="lazy" /></div> </div> <figcaption>Cybersecurity code with 1s and 0s<br /> Photo provided by iStock images</figcaption></figure><p><span><span>Liza Wilson Durant, Mason’s associate provost for strategic initiatives and community engagement, says, "This preemptive tool to guide strategic defense against cybersecurity vulnerabilities will not only safeguard systems but mitigate potential business revenue losses for those who leverage the tool. “ </span></span></p> <p><span><span>An existing list called the Common Weakness Enumeration (CWE) Top 25 Most Dangerous Software Weaknesses, compiled by The <a href="https://mitre.org">MITRE Corporation</a>, has long been the industry standard. MVSF improves on the CWE Top 25 by having data input monthly, compared to MITRE’s yearly reporting. This improvement allows researchers, programmers, developers, and others to have an accurate, almost real-time picture of where software vulnerabilities are most likely to be exploited. Additionally, where MITRE ranks the top 25 vulnerabilities, MVSF ranks the top 150. </span></span></p> <p><span><span>Associate Professor, <a href="https://ist.gmu.edu">Department of Information Sciences and Technology</a> and Associate Director, <a href="https://csis.gmu.edu/">Center for Secure Information Systems</a>, Max Albanese oversees the project for Mason. He says, “If there is a trend where a certain type of vulnerability is becoming more severe, you don’t have to wait for a full year to discover that; you’ll see that class of vulnerability getting worse – or better – month-to-month.”  MVSF can even correct course based on new information, going back and re-ranking weaknesses’ order in a previous month based on new information that was not known at the time of original ranking. </span></span></p> <p><span><span>Albanese further notes that NIST assigns a severity score to vulnerabilities based on a combination of an exploitability score – how difficult the vulnerability is to exploit – and an impact score – how bad the consequences would be if the vulnerability were exploited. MVSF uses those components as variables but allows users to add their own, additional variables not considered by NIST. MVSF also allows users to decide how to weigh the variables that rank the vulnerabilities. This customizability, still under development, is an important feature of the new system. </span></span></p> <p><span><span>Mason and PARC’s collaboration on the Mason Vulnerability Scoring Framework builds on a relationship that started with both of them working on a Defense Advanced Research Projects Agency (DARPA) project dubbed SCIBORG: Secure Configurations for the Internet of Things (IoT) based on Optimization and Reasoning on Graphs. The goal of SCIBORG was to devise fundamentally new approaches to determine security configurations that protect critical infrastructure and IoT-based systems.</span></span></p> <p><span><span>The association with PARC here was important to making the project a success. “Working with GMU was a productive collaboration,” says Marc Mosko, principal scientist, PARC. “Configuration vulnerabilities are growing, now comprising over 15 percent of all Common Vulnerability and Exposure (CVE) notices. We appreciate that across many different industry sectors, there are often gaps in context between management, software security teams, and those who are responsible for ensuring systems are performing optimally on an ongoing basis. 鶹 work addresses these evolving configuration security needs, and we look forward to exploring opportunities to apply this work in the future.”</span></span></p> <p>Mason and PARC’s collaboration on the Mason Vulnerability Scoring Framework builds on a relationship that started with both of them working on a Defense Advanced Research Projects Agency (DARPA) program <a href="https://www.darpa.mil/program/configuration-security" target="_blank">ConSec</a> in a project dubbed SCIBORG: Secure Configurations for the Internet of Things (IoT) based on Optimization and Reasoning on Graphs. The goal of SCIBORG was to devise fundamentally new approaches to determine security configurations that protect critical infrastructure and IoT-based systems.</p> <p><span><span>Albanese, who is also an external consultant for MITRE, has initiated a collaboration with MITRE’s group responsible for CWE to leverage synergies between the two organizations.</span></span></p> <p><span><span>In addition to the excitement of the innovation, it is equally impactful to see undergraduate students involved in its design and implementation and innovating alongside their mentor faculty," says Wilson Durant.</span></span></p> <p><span><span>The <a href="https://www.cci-novanode.org/">Virginia Commonwealth Cyber Initiative (CCI)</a> will provide continued support for two Mason undergraduate students to assist with the project, which Albanese says is key for the continued maintenance of the system. </span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/17166" hreflang="en">configuration vulnerabilities</a></div> <div class="field__item"><a href="/taxonomy/term/1451" hreflang="en">Internet of Things</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Tue, 25 Oct 2022 17:50:54 +0000 Tama Moni 101611 at Foteini Baldimtsi earns NSF CAREER Award /news/2022-05/foteini-baldimtsi-earns-nsf-career-award <span>Foteini Baldimtsi earns NSF CAREER Award</span> <span><span>Martha Bushong</span></span> <span>Mon, 05/16/2022 - 11:05</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/foteini" hreflang="und">Foteini Baldimtsi</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-05/Foteini-story-photo_600x400.jpg?itok=hhkdAb7i" width="350" height="233" alt="Foteini Baldimtsi standing in front of computers." loading="lazy" /></div> </div> <figcaption>Computer Science, Assistant Professor, Foteini<br /> Baldimtsi.</figcaption></figure><p><span><span><span><span><span>George Mason Department of Computer Science Assistant Professor Foteini </span></span></span><span><span><span><span>Baldimtsi has been granted a National Science Foundation CAREER Award for her project, <em>Privacy Preserving Transactions with Accountability Extensions</em>.</span></span></span></span> </span></span></p> <p><span><span><span><span><span>Baldimtsi recently discussed the ubiquity of cryptography. “We use cryptography every single day. Every time you log in to your email or make a transaction with your bank, you use cryptography. Data do not fly around unencrypted.” </span></span></span></span></span></p> <p><span><span><span><span><span>Even so, certain types of interactions require people to offer up more data than they might be comfortable with. She gave a non-digital example of buying alcohol at a store, noting that a vendor simply needs to know if a buyer is over 21. When the buyer shows a driver’s license, the vendor can learn a customer’s full name, address, and exact date of birth, even though they didn’t need that information for the transaction. Using cryptographic techniques, she seeks to create digital credentials that only prove the necessities for a particular interaction. Such “zero-knowledge proofs,” she says, “lets me prove something to you about my identity, while keeping the rest of the stuff hidden.”</span></span></span></span></span></p> <p><span><span><span><span><span>Privacy has a price, one of which is speed. She said, “A big part of my CAREER award is how to make privacy techniques practical by being faster and more efficient.” She is particularly looking at anonymous payments. A credit card company, for example, may know that someone is buying coffee from Einstein’s Bagel in the Nguyen Engineering Building every day, though they only need to be able to process a financial transaction. “If you pay with cash, your bank only knows you withdrew a sum of money, but no one knows where or how you’re spending that money. Using a credit card is so much more convenient than paying with cash,” she said. “The question is, using our credit cards or our phones, can we maintain the same level of privacy? The answer is yes.”</span></span></span></span></span></p> <p><span><span><span><span><span>Digital privacy has regulatory consequences. “There is a tension between privacy and the ability to enforce the law,” she noted. “If we make everything completely private, there are regulatory issues, so I’m trying to design auditable or accountable schemes that ensure the following - as long as users obey the law, their privacy is maintained. If they break the law - under some well-defined notion of what the law says - their privacy will be lifted.” A key part of her grant, she said, is tackling the challenge of determining ways to mathematically formulate the law. To assist with this, she will be collaborating with the Mason policy and business schools.</span></span></span></span></span></p> <p><span><span><span><span><span>From her abstract:</span></span></span><span><span><span><span> “The amount of digital data collected electronically is increasing and poses threats to user privacy. Cryptographic mechanisms enhancing data privacy suffer from prohibitive computational and communication costs and do not offer accountability mechanisms. Towards the goal of bringing privacy-enhancing technologies closer to adoption, this project defines and constructs new cryptographic building blocks like: new types of digital signatures, cryptographic accumulators, and zero-knowledge proofs, which are at the core of mechanisms used to enhance privacy.”</span></span></span></span></span></span></p> <p><span><span><span><span><span>The award totals more than $500K and the award period is from July 2022 to June 2027. </span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 16 May 2022 15:05:16 +0000 Martha Bushong 70131 at Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges /news/2022-01/commonwealth-cyber-initiative-cci-researchers-address-multi-disciplinary-challenges <span>Commonwealth Cyber Initiative (CCI) researchers address multidisciplinary challenges</span> <span><span>Martha Bushong</span></span> <span>Wed, 01/26/2022 - 15:19</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/hpurohit" hreflang="und">Hemant Purohit</a></div> <div class="field__item"><a href="/profiles/eoster" hreflang="und">Eric Osterweil</a></div> <div class="field__item"><a href="/profiles/dbarbara" hreflang="und">Daniel Barbará</a></div> <div class="field__item"><a href="/profiles/vmotti" hreflang="und">Vivian Genaro Motti</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span>Whether you are an experienced software developer, a teen texting on a smartphone, or an older adult checking a bank statement, cybersecurity is part of your life. Humans and computers interact every minute of every day and cybersecurity is there to keep information safe and actions private. But normal human behavior can compromise safety and privacy.</span></p> <p><span>For the next 12 months, researchers funded by the </span><a href="https://cci-novanode.org" title="CCI Nova Node"><span>Commonwealth Cyber Initiative’s </span></a><span>(CCI) Northern Virginia Node (NoVa Node) will be exploring the impact of human behavior on cybersecurity systems. Divided into six teams, the researchers will seek to leverage the power of their academic expertise in the social sciences, and related fields. The teams include faculty from the Colleges </span><a href="https://cec.gmu.edu" title="College of Engineering and Computing"><span>of Engineering and Computing</span></a><span>, </span><a href="https://chss.gmu.edu" title="College of Humanities and Social Sciences"><span>Humanities and Social Sciences</span></a><span>, </span><a href="https://cehd.gmu.edu" title="College of Education and Human Development"><span>Education and Human Development</span></a><span>, and the School of Business. Each team will explore a different aspect of the problem as they aim to translate those understandings into solutions or areas for additional investigation that can impact the welfare of Virginians.</span></p> <p> </p> <p><span><strong>“Human-Centric Training for Privacy and Security Controls: Bridging the Awareness Gap for Diverse Populations”</strong></span></p> <p><span>PI: Vivian Genero Motti, College of Engineering and Computing (CEC), George Mason 鶹; Co-PIs: Samy El-Tawab, and Ahmad Salman, </span><a href="https://isc.jmu.edu/programs/academic-programs/integrated-science-and-engineering" title="College of Integrated Sciences and Engineering"><span>College of Integrated Sciences, James Madison 鶹</span></a></p> <p><span>If you retired from the workforce 25 years ago, before Wi-Fi, online shopping, banking, or smartphones, you are likely more vulnerable to cyberattacks. In fact, older adults face a disproportionate risk of suffering cyberattacks; still, they do not have access to resources and educational materials suitable to meet their needs related to human behavior and privacy protection.</span></p> <p><span>Vivian Motti and her team want to do something about that. They plan to reach out to underrepresented users and characterize their level of awareness about cybersecurity. Motti and her team believe that gaining a better understanding of these populations will help inform educational content development, providing content, language, and design aspects that are all suitable to their specific user profiles.</span></p> <p><span>“By adopting a user-centric design approach, this project will ensure that cybersecurity training meets users' needs for minority groups. By involving older adults front and center in the research agenda, we will establish training contents that are appropriate to their level of understanding,” says Motti.  Also, besides following the training contents and retaining what they learn, they will be able to act and prevent potential attacks that could pose privacy risks.</span></p> <p> </p> <p><span><strong>“Impact of Human Behavior in a Mixed Traffic Environment”</strong></span></p> <p><span>PI: Linghan Zhang, CEC; Co-PIs: Nirup Menon, School of Business, Nupoor Ranade, College of Humanities and Social Sciences (CHSS),</span></p> <p><span>As autonomous vehicles become more prevalent and mingle with human-driven vehicles this mixed traffic environment may comprise both. In mixed traffic, the behaviors of human drivers are unpredictable and can lead to situations that confuse autonomous vehicles and cause adverse events for both.</span></p> <p><span>The CCI NoVa Node’s research in autonomous vehicles (AVs) has already garnered attention from vehicle manufacturers such as Ford, Cadillac, and Daimler-Benz. Linghan Zhang and her team aim to extend that research by studying their use in mixed traffic.</span></p> <p><span>According to Linghan, the team’s goal is to reflect driving reality through a multi-vehicle simulation in mixed traffic, using driving conditions that have led to real-world collisions in the past. She says, “Prior research only focuses on a single user’s behavior, and the data collected is mainly limited to surveys and interviews. With objective driving data missing, prior experiments did not reflect on-road driving reality.”  </span></p> <p><span>This project could achieve valuable and meaningful data on how human driver behaviors affect other components in mixed driving environments, especially in security- and safety-critical contexts when human errors are inevitable as well as uncover what humans need to know while driving alongside AVs. The team expects that the results will be significant for autonomous vehicle implementation and policymaking. </span></p> <p> </p> <p><span><strong>“Towards Building Cyber-Security Resilience in a COVID-Induced Virtual Workplace”</strong></span></p> <p><span>PI: Amitava Dutta; Co-PI: Pallab Sanyal, School of Business, George Mason 鶹</span></p> <p><span>Before COVID-19 rocked our world, individuals and businesses were already increasing their online presence. The pandemic accelerated the speed forcing a change. People who were not comfortable in the online environment were made to go online and people who were already comfortable expanded their online presence to areas that they had previously conducted in person.</span></p> <p><span>“In short, COVID-19 has caused a shift from organizational ecosystems to a virtual workplace for employees, which has opened multiple vectors for cyberattacks,” says Amitava Duta, professor at the School of Business. “鶹 research focuses on the behavioral and organizational aspects of cybersecurity and is motivated by the ongoing transformations following the onset of the COVID-19 pandemic.”</span></p> <p><span>In their project, the team will investigate the significant changes in online behavior following the onset of the COVID-19 pandemic are. They expect their insights will help organizations build greater cyber-security resilience in a virtual workplace.  </span></p> <p><span>Because Washington, D.C. and Northern Virginia are home to prominent financial services organizations these businesses would have a strong interest in strengthening their cybersecurity posture to address its behavioral aspects. Soon, Amazon will also have a significant presence and retail online sales is another area frequently targeted by cybercriminals. If organizations would be willing to provide data on customer behavior on their website, the models developed from the team’s work could be refined and tailored for an important application domain.</span></p> <p> </p> <p><span><strong>“Characterizing and Countering User Security Fatigue in Password Enhancement through Deep Learning”</strong></span></p> <p><span>PI: Gerald Matthews, CHSS, George Mason 鶹; Co-PIs: Giuseppe Anteniese and Daniel Barbará, CEC, George Mason 鶹</span></p> <p><span>If you already have a demanding job, you might think maintaining security is an additional burden, and not keep up with cybersecurity best practices such as updating or changing your passwords.</span></p> <p><span>Professor Giuseppe Ateniese has designed a tool for enhancing password strength, based on a deep learning approach, but psychological factors may limit the adoption and impact of the tool. Everyone can be vulnerable to security fatigue and lax cybersecurity practices can have major societal consequences—threats to national security, financial losses to individuals and organizations, and invasion of privacy.</span></p> <p><span>Introducing security tools powered by Artificial Intelligence, when successful, will counteract typical human fallibilities and promote safety in computer systems across government, industry, and personal use. This project investigates the effect of security fatigue on the use of Anteniese’s tool. It will also explore strategies for mitigating fatigue and supporting user engagement.</span></p> <p><span>The team believes that enhancing employees' ability and motivation to maintain effective security protocols has immediate economic benefits and the research has the potential to suggest design features of security tools that can support commercialization as well as training protocols.</span></p> <p> </p> <p><span>“<strong>Enabling Invisible Security and Privacy for Resilient Human-Centric Cybersecurity Systems</strong>”</span></p> <p><span>PI: Eric Osterweil, CEC, George Mason 鶹; Co-PI: Matt Canham, CHSS, George Mason 鶹</span></p> <p><span>For decades, cryptography has been one of cybersecurity’s most essential tools. While its utility is certain, its complexity limits its use for non-experts. The result—non-experts fall prey to cybercriminals for many reasons including lack of knowledge, incorrect thought processes, and the inability to invest adequate time and resources to implement proper data protection.</span></p> <p><span>Eric Osterweil and his co-investigator Matt Canham hope to change that through their work with the CCI NoVa Node. “This project will seed a critical foundation for adaptive cybersecurity protections for human users’ end-to-end encryption (E2EE) needs. The results from this project will be used as foundations for enhancing a core staple of Internet communications (email) and future advances in prescriptive protections for Cybersecurity Threat Intelligence (CTI) information sharing,” says Osterweil.</span></p> <p><span>The CTI industry continues to grow, with companies, federal agencies, and international communities relying on CTI. In Virginia, where federal agencies and their partners routinely conduct transactions over email, this is especially true. Their view is that building human usable E2EE protections and extending those to adaptive CTI will be directly relevant to operational cybersecurity projects and needs throughout the industry and public sectors in Virginia.</span></p> <p><span>The pair believes that a key benefit to the Commonwealth will include course-related exposure of this material to the students at George Mason 鶹. “Students will be able to showcase both the results of this work and their own derived qualifications to benefit their entry into local industry and jumpstart their ascension to professional careers,” says Osterweil. </span></p> <p><span> </span></p> <p><span><strong>"Characterizing Biases in Automated Scam Detection Tools for Social Media to Aid Individuals with Developmental Disabilities" </strong></span></p> <p><span>PI: Hemant Purohit, CEC; Co-PIs: Géraldine Walther, CHHS; Matt Peterson, CHHS; YooSun Chung, CEHD </span></p> <p><span>Designers of scam detection tools often focus on improving the computational accuracy of the methods, especially those with state-of-the-art Natural Language Processing (NLP) and Machine Learning (ML)-based techniques, but their understanding of the diverse human behavior can be limited. This project aims to build a foundation for inclusive cybersecurity technologies to protect individuals with disabilities from online scams using a unique interdisciplinary collaborative approach between computing and non-computing researchers.</span></p> <p><span>Specifically, the team’s objective is to uncover the biases in the existing scam detection techniques for social media using NLP and ML methods. “We will conduct Eye Tracking analyses using a labeled scam dataset of social media posts from existing literature on online cybersecurity and study the differences between the attention patterns of individuals with and without developmental disabilities when perceiving scam posts,” says Hemant Purohit.</span></p> <p><span>The project hopes to gain insights that will support cybersecurity training development for reducing online fraud for individuals with special education needs. At the same time, the researchers want to identify limitations in automated scam detection tools and help create more effective cybersecurity tools that can protect user groups in our communities.   </span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/511" hreflang="en">coronavirus; covid-19</a></div> <div class="field__item"><a href="/taxonomy/term/12576" hreflang="en">Social Media</a></div> <div class="field__item"><a href="/taxonomy/term/9011" hreflang="en">natural language processing</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> </div> </div> </div> </div> </div> Wed, 26 Jan 2022 20:19:34 +0000 Martha Bushong 64136 at