UMBC 16th Digital Entertainment Conference, 11-5 Sat. 4/18 online

UMBC’s 16th Digital Entertainment Conference, online 11-5 Sat. 4/18

 

16th UMBC Digital Entertainment Conference

 

11:00am-5:00pm, Saturday, April 18, 2020

Online on YouTube

The Digital Entertainment Conference (DEC) is an annual event run by the students of the UMBC Game Developer’s Club that brings professional game developers from the area to UMBC to talk about their experience in the game industry. DEC’20 will be held online 11-5 on Saturday, April 18 on the UMBC Game Developers Club YouTube Channel. Attend online to see and interact with professions from the local game industry.

This year’s speakers include four professionals from Zenimax, a video game publisher headquartered in Maryland: Bobby Foster (Figure Artist), Eric Bakutis (Content Designer), Ryan Griffin (Artist), and Katie Hirsch (Programmer).

DEC’20 is free to attend and open to UMBC students, high school students, UMBC alumni and anyone interested in game development. It is sponsored by the UMBC Game Developers club and funded by the COEIT Dean’s Office’s Collaborative Student Funding Program.

UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition

 

UMBC Cyber Dawgs win Mid-Atlantic Collegiate Cyber Defense Competition

 

Last weekend, the UMBC Cyber Dawgs took first place in the Mid-Atlantic Collegiate Cyber Defense Competition (MACCDC), which was held virtually. UMBC’s team was one of eight that participated in the competition, fighting to protect their networks efficiently and effectively from simulated cyber threats and attacks. The team topped Penn State; the University of Maryland, College Park; and University of Virginia, which won the national championship for the past two years.

UMBC’s Cyber Dawgs will move on to compete in the National Collegiate Cyber Defense Competition (NCCDC). Due to COVID-19, the competition will be held remotely this year.

How does the competition work?

These regional and national competitions attract leading collegiate cybersecurity teams from across the nation. They put teams in situations that mimic scenarios they might encounter working to secure and protect online systems for government agencies and companies. Throughout each challenge, teammates work together to protect their systems from hackers and cyber attacks. At the same time, they keep their networks accessible to the users relying on them. 

Meet the team

The MACCDC was about 14 hours long, and was held over two days. During the competition, the teams were not permitted to interact with their coaches Charles Nicholas, professor of computer science and electrical engineering (CSEE), and Rick Forno, senior lecturer in CSEE.

The winning UMBC team included Anna Staats ‘20, computer science; RJ Joyce ‘18, M.S. ‘20, computer science; Cyrus Bonyadi, Ph.D. ‘23, computer science; Drew Barrett ‘20, computer science; Seamus Burke ‘20, computer science; Henry Budris ‘22, computer science; Chris Skane ‘21, computer science; and Nikola Bura ‘21, computer science. 

“We are so proud of our team, and their ability to work together as a team under such extraordinary conditions,” says Nicholas.

This is the third time in six years that the Cyber Dawgs have won the MACCDC. The UMBC team won the national championship in 2017.


Adapted from a UMBC News article by Megan Hanks. Banner image: Student using a computer. Photo by Marlayna Demond ’11 for UMBC.

Online talk: Synergy-based human-machine interfaces, 1-2 3/23, Webex

To investigate the neural representations of kinematic synergies, scalp electroencephalographic (EEG) signals and hand kinematics are recorded during representative types of hand grasping.

Synergy-based human-machine interfaces

Ramana Vinjamuri
Harvey N. Davis Distinguished Assistant Professor
Stevens Institute of Technology

 

1:00-2:00 pm Monday, 23 March 2020

Online Webex meeting

Human-machine interfaces (HMIs) have not only become popular technologies but have become the hope of many individuals for restoring their lost limb function. Any HMI has two important intrinsic design components—(i) decode the human commands and (ii) controlling the machine to convert that command into action. Decades of research went into making the interface between the human and the machine seamless but were unable to effectively address the inherent challenges, namely, complexity, adaptability, and variability. To overcome the above challenges, it is critical to computationally understand and quantitatively characterize the human sensorimotor control. Emerging areas in HMIs critically depend on the ability to build bioinspired models, experimentally validate them and utilize them in adaptive and intuitive control. The human hand with high dimensionality encompasses the three inherent challenges and may serve as an ideal validation paradigm. How the central nervous system (CNS) controls this high dimensional human hand effortlessly is still an unsolved mystery. To address this high dimensional control problem, many bioinspired motor control models have been proposed, one of which is based on synergies. According to this model, instead of controlling individual motor units, CNS simplifies the control using coordinated control of groups of motor units called synergies. However, there are several unanswered questions today— Where are synergies present in CNS? What is their role in motor control and motor learning? By combining the concepts of human motor control, computational neuroscience, machine learning and validation with noninvasive human experiments, can we answer these fundamental questions? The goal of this research is to develop efficient, seamless and near-natural human-machine interfaces based on biomimetically inspired models.

Ramana Vinjamuri received his Ph.D. in Electrical Engineering in 2008 specialized in dimensionality reduction in control and coordination of human hand from the University of Pittsburgh. He worked as a postdoctoral research associate (2008-2012) in the field of Brain Machine Interfaces (BMI) to control prosthesis in the School of Medicine, University of Pittsburgh where he received Mary E Switzer Merit Fellowship from NIDILRR in 2010. He worked as a Research Assistant Professor in the Department of Biomedical Engineering at the Johns Hopkins University (2012-2013) in the area of neuroprosthetics. He is currently an Assistant Professor in the Department of Biomedical Engineering at Stevens Institute of Technology (2013-Present). In 2018, he received Harvey N Davis Distinguished Teaching Award for excellence in undergraduate and graduate teaching. He received the NSF CAREER Award in 2019. His other notable research awards are from USISTEF and New Jersey Health Foundation. He also holds a secondary appointment as an Adjunct Assistant Professor at Indian Institute of Technology, Hyderabad, India.

Webex talk: John Mitchell: Will Blockchain Change Everything? Fri 3/27 1-2pm

Lockheed Martin Distinguished Speaker Series

Will Blockchain Change Everything?

Dr. John Mitchell
Mary and Gordon Crary Family Professor
Departments of Computer Science & Electrical Engineering
Stanford University

1:00-2:00pm EST, Friday, 27 March 2020
Webex meeting hosted by Anupam Joshi
https://umbc.webex.com/meet/joshi

Far from serving only as a foundation for cryptocurrency, blockchain technology provides a general framework for trusted distributed ledgers. Over the past few years, their popularity has grown tremendously, as shown by the number of companies and efforts associated with the Linux Foundation’s Hyperledger project, for example. From a technical standpoint, a blockchain combines a storage layer, networking protocols, a consensus layer, and a programmable transaction layer, leveraging cryptographic operations. The distributed state machine paradigm provides atomicity and transaction rollback, while consensus supports distributed availability as well as certain forms of fair access. From an applications perspective, blockchains appeal to distributed networks of independent agents, as arise in supply chain, credentialing, and decentralized financial services. The talk will look at the potential for radical change as well as specific technical challenges associated with verifiable consensus protocols and trustworthy smart contracts.

John Mitchell is the Mary and Gordon Crary Family Professor in the School of Engineering, Professor of Computer Science, co-director of the Stanford Computer Security Lab, and Professor (by courtesy) of Education. He was Vice Provost at Stanford University from 2012 to 2018. Mitchell’s research focusses on programming languages, computer, and network security, privacy, and education. He has published over 200 research papers, served as editor of eleven journals, including Editor-in-Chief of the Journal of Computer Security, and written two books. He has led research projects funded by numerous organizations and served as advisor and consultant to successful small and large companies. His first research project in online learning started in 2009 when he and six undergraduate students built Stanford CourseWare, an innovative platform that served as the foundation for initial flipped classroom experiments at Stanford and helped inspire the first massive open online courses (MOOCs) from Stanford. Professor Mitchell currently serves as Chair of the Stanford Department of Computer Science.

Webex Talk: Hard-Learned Lesson in Defense of a Network, 12-1 Fri 3/27

The UMBC Cyber Defense Lab presents

Hard-Learned Lesson in Defense of a Network

Dan Yaroslaski
Former Operations Officer at Marine Forces Cyberspace Command, Colonel, USMC


12–1:00pm, Friday, 27 March 2020
WebEx: https://umbc.webex.com/meet/sherman

Often network defenders fail to take into account organizational culture when attempting to provide a secure, reliable, and usable enterprise network. Users and process leaders often fall victim to the false allure of the value of networked systems, without asking the question, “Should this be networked?” Collectively, organizations also forget that networks are a combination of the humans who use the network, the personas we all have to form to gain access to this manmade domain, and the interplay of logical and physical network architecture manifested in geographical locations. The value of some simple military principles—including defense-in-depth, mission focus, redundancy, and resiliency versus efficiency—can help a network defender better advise everyone from the “C Suite” decision-makers to the average network user, on how to have a secure network while accepting reasonable limitations.

Colonel Dan Yaroslaski is a career Marine with over 30 years of service to the nation. He started as an enlisted anti-armor missileman, who then became an Assault Amphibian Vehicle Officer (AAV’s are 27 Ton armored amphibious descendants of the WW II vehicles used from Tarawa to Iwo Jima). He has made a career of integrating technology and human beings to form cohesive combat organizations. Dan’s diverse career placed him at the forefront of high-end, top-secret compartmentalized planning and execution, to the extremely human act of advising an Afghan National Army Kandak (Battalion). During his five-year tenure at Marine Forces Cyberspace Command, he successfully architected new techniques that took advantage of boundary defenses, to new and innovative ways to integrate traditional warfare methods with cyberspace operations, as highlighted in a recent NPR story about USCYBERCOM’s Operation GLOWING SYMPHONY. Dan also spent time creating effective policy directing network operations and defense, to include an extremely frustrating year negotiating the interplay of network operations, operations in the information environment, and Marine Corps culture. Dan and his wife are now empty nesters, so they spend an enormous amount of time nurturing two dogs to fill the void left by their children. As the Rolling Stones point out, “What a drag it is getting old.”

Host: Alan T. Sherman,

Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings:

  • Apr 10, Russ Fink (APL), ransomware
  • Apr 24, Lance Hoffman (GWU), policy
  • May 8, Jason Wells (UMBC SFS scholar), law enforcement
  • May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE 456

talk: Autonomous Agents, Deep Learning, and Graphs for Cyber Defense, 12-1 Fri. 3/13

The UMBC Cyber Defense Lab presents

Autonomous Agents, Deep Learning,
and Graphs for Cyber Defense

Dr. Hasan Cam
Army Research Laboratory

12–1 pm Friday, 13 March 2020, ITE 227, UMBC


Cyber resilience usually refers to the ability of an entity to detect, respond to, and recover from cybersecurity attacks to the extent that the entity can continuously deliver the intended outcome despite their presence. Cybersecurity tools such as intrusion detection and prevention systems usually generate far too many alerts, indicators or log data, many of which do not have obvious security implications unless their correlations and temporal causality relationships are determined. In this talk, I will present methods to first estimate the infected and exploited assets and then take recovery and preventive actions using autonomous agents, deep learning, and graphs. Autonomous adversary and defender agents are designed such that the adversary agent can infer the adversary activities and intentions, based on cybersecurity observations and measurements, while the defender agent aims at estimating the best reactive and pro-active actions to protect assets and mitigate the adversary activities. The graph thinking and causality analysis of cyber infection and exploitation helps predict the infection states of some assets. This prediction data of infections is taken as input data by deep reinforcement learning to train agents for determining effective actions. This talk will discuss some preliminary results from the development of building an automated system of autonomous agents to provide cyber resiliency over networks.

Hasan Cam is a Computer Scientist at US Army Research Laboratory. He currently works on the projects involved with autonomous agents, active malware defense, cyber resiliency, and risk assessment over wired, mobile, and tactical networks. His research interests include cybersecurity, machine learning, data analytics, networks, algorithms, and parallel processing. He served as the government lead for the Risk area in Cyber Collaborative Research Alliance. He has previously worked as a faculty member in academia and a senior research scientist in the industry. He has served as an editorial member of two journals, a guest editor of two special issues of journals, an organizer of symposiums and workshops, and a Technical Program Committee Member in numerous conferences. He received a Ph.D. degree in electrical and computer engineering from Purdue University, and an M.S. degree in computer science from Polytechnic University, New York. He is a Senior Member of IEEE.

Host: Alan T. Sherman,

Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming CDL Meetings:

  • Mar 27, Dan Yaroslaski, cybercommand
  • Apr 10, Russ Fink (APL), ransomware
  • Apr 24, Lance Hoffman (GWU), policy
  • May 8, Jason Wells, law enforcement
  • May 22, Spring SFS Meeting at UMBC, 9:30-2, ITE 456

❌ Canceled: UMBC Data Science Meetup: Rapid Data Exploration with Apache Drill ❌

❌ Canceled: UMBC Data Science Meetup:
Rapid Data Exploration with Apache Drill

5:30-7:00 pm 11 March 2020, UC 310, UMBC

Join Charles Givre for a hands-on introduction to data exploration with Apache Drill. Becoming a data-driven business means using all the data you have available, but a common problem in many organizations is that data is not optimally arranged for ad-hoc analysis. Through a combination of lecture and hands-on exercises, you’ll gain the ability to access previously inaccessible data sources and analyze them with ease. You’ll learn how to use Drill to query and analyze structured data, connect multiple data sources to Drill, and perform cross-silo queries. Study after study shows that data scientists and analysts spend between 50% and 90% of their time preparing their data for analysis. Using Drill, you can dramatically reduce the time it takes to go from raw data to insight. This workshop will show you how.

UMBC University Center, Room 310
March 11, 2020, from 5:30 pm to 7:00 pm
(5:30 – 6:00 pm) Social
(6:00 – 6:50 pm) Workshop: Rapid Data Exploration with Apache Drill
(6:50 – 7:00 pm) Question and Answer Session

Register on the Meetup page.

Note that we formally end our Q&A session at 7 pm (so that graduate students can catch their classes starting at 7:10 pm) but in our previous events we’ve seen that one-on-one and group discussions with the speaker(s) continue even after Q&A session

Speaker: Mr. Charles Givre works as a manager at JP Morgan Chase. Prior to joining Deutsche Bank, Mr. Givre worked as a Senior Lead Data Scientist for Booz Allen Hamilton for the last seven years where he works in the intersection of cybersecurity and data science. Mr. Givre taught data science classes at BlackHat, the O’Reilly Security Conference, the Center for Research in Applied Cryptography and Cyber Security at Bar Ilan University. One of Mr. Givre’s research interests is increasing the productivity of data science and analytic teams, and towards that end, he has been working extensively to promote the use of Apache Drill in security applications and is a committer and PMC Chair for the Drill project. Mr. Givre teaches online classes for O’Reilly about Drill and Security Data Science and is a coauthor for the O’Reilly book Learning Apache Drill. Mr. Givre holds a Masters Degree in Middle Eastern Studies from Brandeis University, as well as a Bachelors of Science in Computer Science and a Bachelor’s of Music both from the University of Arizona. He blogs at thedataist.com and tweets @cgivre.

Complimentary food, such as pizza and chips, and non-alcoholic beverages will be provided

Visitor parking spaces are located at Administration Drive Garage upper level, Commons Garage first level, Walker Avenue Garage upper level, Lot 9 and Lot 7 on Walker Avenue. Visitors do not need to pay for parking after 4:00 pm.

Join the UMBC Data Science Meetup group and register for this event here.

talk: Hardware Security Kernel for Managing Memory and Instruction Execution, 12pm Fri 2/28

The UMBC Cyber Defense Lab presents

Hardware Security Kernel for Managing Memory and Instruction Execution

 Patrick Jungwirth, PhD

Computational and Information Sciences Directorate
Army Research Lab, Aberdeen Proving Ground, USA

12–1 pm Friday, 28 February 2020, ITE 227, UMBC

The cybersecurity world faces multiple attack vectors from hardware-level exploits, including cache bank malicious operations, rowhammer, Spectre, Meltdown, and Foreshadow attacks, and software-based attacks including buffer-overflows, et al.  Hardware-level exploits bypass protections provided by software-based separation kernels.  Current microprocessor execution pipelines are not designed to understand security:  they treat malicious instructions, software bugs, and harmless code the same. This presentation explores adding a hardware-level security monitor below the execution pipeline [1,2,3].

[1] P. Jungwirth, et al.:  “Hardware security kernel for cyber-defense,” Proc. SPIE 11013, Disruptive Technologies in Information Sciences II, 110130J, Baltimore 10 May 2019); https://doi.org/10.1117/12.2513224
[2] P. Jungwirth, and J. Ross:  “Security Tag Fields and Control Flow Management,” IEEE SouthEastCon 2019, Huntsville, AL, April 2019.
[3] P. Jungwirth and D. Hahs:  “Transfer Entropy Quantifies Information Leakage,” IEEE SouthEastCon 2019, Huntsville, AL, April 2019.

About the SpeakerDr. Jungwirth is a computer architecture researcher at the Army Research Lab.  Previously he worked for the Aviation and Missile, RDEC in Huntsville, AL.  Currently, he is researching hardware state machines to provide simple operating system support (monitor) and control flow integrity in hardware.  Dr. Jungwirth is co-inventor of the OS Friendly Microprocessor Architecture, US Patent 9122610.  The OS Friendly Microprocessor Architecture includes hardware security features for an operating system and supports near single-cycle context switches in hardware. Email: 

Host: Alan T. Sherman, 

Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681.

The UMBC Cyber Defense Lab meets biweekly Fridays.  All meetings are open to the public.

Upcoming CDL Meetings:

Mar 13, Hasan Cam, autonomous agents
Mar 27, Dan Yaroslaski, cybercommand
Apr 10, Russ Fink (APL), ransomware
Apr 24, TBA
May 8, Jason Wells, law enforcement
May 22, Spring SFS Meeting at UMBC, 9:30am-2pm, ITE 456

UMBC Data Science Meetup: Enabling Value-Based Health Care Using Modern Analytics Tools

Enabling Value-Based Health Care
Using Modern Analytics Tools

Daniel Pichardo and Dr. Xue Yang

UMBC will have its second Data Science meetup on February 27 at UMBC University Center, Room 310. Attendance is free, register here. Visitors can park for free (after 4:00 pm) at the parking lots marked with black arrows in the event photo. The program is as follows

(5:30 – 6:00 pm) Social
(6:00 – 6:50 pm) Talk & Demo: Enabling Value-Based Health Care Using Modern Analytics Tools
(6:50 – 7:15 pm) Question and Answer Session

Speakers: Daniel Pichardo and Dr. Xue Yang

Speaker Bios: Danny Pichardo is a Senior Data Scientist at Newwave. He previously worked as a Statistician at the American Urological Association. He holds a B.Sc. In Statistics from UMBC. His interest and experience include prediction modeling and causal inference using real world health data.

Xue Yang is a data scientist with a solid medical background. At NewWave, Xue works on data analysis and AI/ML model exploration that support data exchange/feedback platform and AI/ML projects. Before joining NewWave, she was building AI/ML models using medical insurance claims data at CareFirst. Xue has a M.P.S. in Data Science from UMBC, a Ph.D. on Genetics and an M.D. from China, and was a postdoc at Johns Hopkins Medical School at the Institute of Genetic Medicine.

Abstract: Value-based healthcare is a healthcare delivery model in which providers are paid based on patient health outcomes. Value-based healthcare requires measuring clinical outcomes and spotting population trends while incentivizing health care providers for the delivery of better healthcare.

New Wave is building next-generation data platforms to improve health outcomes and reduce waste by transforming the wealth of data CMS currently collects, which allows the Center for Medicare and Medicaid Innovation to fulfill its objectives of delivering value-based health care for the citizens. We leverage cloud-based tools such as Snowflake, Looker, and Databricks to provide health care providers a flexible platform to explore their patient’s data, as well as enable data scientists to perform efficient data analyses, model development, and reporting. We will demo how these tools can seamlessly work together, enabling every step of the data science process. Please join us on this journey of transformation as we attempt to modernize and innovate in healthcare.

Parking: Visitor parking spaces are located at Administration Drive Garage upper level, Commons Garage first level, Walker Avenue Garage upper level, Lot 9 and Lot 7 on Walker Avenue. Visitors do not need to pay for parking after 4:00 pm. Register here.

🔴 talk: Shawn Blanton (CMU); Designing Secure Hardware Systems, 1pm Fri 2/7; Commons 329

Lockheed Martin Distinguished Speaker Series

Designing Secure Hardware Systems

Shawn Blanton

Trustee Professor, Electrical and Computer Engineering
Carnegie Mellon University

1:00-2:00pm Friday 7 Feb. 2020

Commons 329, UMBC
University Center Ballroom

On October 29, 2018, DARPA issued an RFI that stated: “This Request for Information (RFI) from the Defense Advanced Research Projects Agency’s (DARPA) Microsystems Technology Office (MTO) seeks information on technology, concepts, and approaches to support the integration of security capabilities directly into System on Chip (SoC) system design and to enable the autonomous integration and assembly of SoCs.

This RFI and the tens of millions of dollars that the US government has already invested in hardware security research and development is based on the fact that the fabrication of state-of-the-art electronics is now mostly overseas. With the recent announcement that GLOBALFOUNDRIES is going to stop all 7nm development, there is now only one company in the US that continues to pursue advanced semiconductors (Intel). Unfortunately, Intel does not have the same experience of making chips for third parties as does Samsung and (most importantly) TSMC (Taiwan Semiconductor Manufacturing Corporation). As a result, the US government believes it will be forced to fabricate advanced, sensitive electronics overseas in untrusted fabrication facilities. As a result, there is keen interest in design methodologies that mitigate reverse engineering, tampering, counterfeiting, etc.

In this talk, an overview of hardware security will be presented followed by a discussion on a concept called logic locking. This approach will be described and the “back and forth” that is now occurring in the research community involving: (i) vulnerability discovery and (ii) logic locking improvement.

Shawn Blanton is a professor in the Electrical and Computer Engineering Department at Carnegie Mellon University and Associate Director of the SYSU-CMU Joint Institute of Engineering (JIE). In 1995 he received his Ph.D. in Electrical Engineering and Computer Science from the University of Michigan, Ann Arbor. His research interests include various aspects of integrated system tests, testable design, and test methodology development. He has consulted for various companies and is the founder of TestWorks, a Carnegie Mellon University spinout focused on information extraction from IC test data. He is a Fellow of the IEEE and Senior Member of the ACM and served as the program chair for the 2011 International Test Conference.

1 3 4 5 6 7 33