talk: James R. Clapper, former US Director of Intelligence, 12-1pm Fri. Oct 6, 132 PAHB, UMBC

Lecture by James Clapper, former US Director of Intelligence, 12-1pm Fri. Oct. 6 at UMBC

James R. Clapper, former US Director of Intelligence, will give a public lecture on Friday, 6 October 2017 in the lecture hall (room 132) of the Performing Arts & Humanities Building at UMBC.

The Honorable James R. Clapper served as the fourth US Director of Intelligence from August 9, 2010 to January 20, 2017. In this position, Mr. Clapper led the United States Intelligence Community and served as the principal intelligence advisor to President Barack Obama.

Mr. Clapper retired in 1995 after a distinguished career in the U.S. Armed Forces. His career began in 1961 when he enlisted in the U.S. Marine Corps Reserve and culminated as a lieutenant general in the U.S. Air Force and Director of the Defense Intelligence Agency. His intelligence-related positions over his 32 years in uniform included Assistant Chief of Staff for Intelligence at Headquarters, US Air Force during Operations Desert Shield/Desert Storm, and Director of Intelligence for three combatant commands: US Forces, Korea; Pacific Command, and Strategic Air Command. He served two combat tours during the Southeast Asia conflict, and flew 73 combat support missions in EC-47’s over Laos and Cambodia.

Directly following his retirement, Mr. Clapper worked in industry for six years as an executive in three successive companies with the Intelligence Community as his business focus. He also served as a consultant and advisor to Congress and to the Departments of Defense and Energy, and as a member of a variety of government panels, boards, commissions, and advisory groups. He was a senior member of the Downing Assessment Task Force which investigated the Khobar Towers bombing in 1996, was vice chairman of a commission chaired by former Governor Jim Gilmore of Virginia on the subject of homeland security, and served on the NSA Advisory Board.

Mr. Clapper returned to the government two days after 9/11 as the first civilian director of the National Imagery and Mapping Agency (NIMA). He served in this capacity for almost five years, transforming it into the National Geospatial-Intelligence Agency (NGA) as it is today.

Prior to becoming the Director of National Intelligence, Mr. Clapper served for over the three years in two Administrations as the Under Secretary of Defense for Intelligence, where he served as the principal staff assistant and advisor to the Secretary and Deputy Secretary on intelligence, counterintelligence, and security matters for the Department. In this capacity, he was also dual-hatted as the Director of Defense Intelligence for the DNI.

Mr. Clapper earned a bachelor’s degree in government and politics from the University of Maryland, a master’s degree in political science from St. Mary’s University, San Antonio, Texas, and an honorary doctorate in strategic intelligence form the then Joint Military Intelligence College.

His awards include three National Intelligence Distinguished Service Medals, two Defense Distinguished Service Medals, the Air Force Distinguished Service Medal, the Coast Guard’s Distinguished Public Service Award, three Department of Defense Distinguished Civilian Service Awards, the Presidentially-conferred National Security Medal, and many other U.S. civilian and military, as well as foreign government awards and decorations.

He is married to the former Susan Terry, and they have two grown children and four grandchildren

Equifax breach is a reminder of society’s larger cybersecurity problems

There are a lot more holes in cybersecurity fences. iomis/Shutterstock.com

Equifax breach is a reminder of society’s larger cybersecurity problems

Richard Forno, University of Maryland, Baltimore County

The Equifax data breach was yet another cybersecurity incident involving the theft of significant personal data from a large company. Moreover, it is another reminder that the modern world depends on critical systems, networks and data repositories that are not as secure as they should be. And it signals that these data breaches will continue until society as a whole (industry, government and individual users) is able to objectively assess and improve cybersecurity procedures.

Although this specific incident is still under investigation, the fact that breaches like this have been happening – and getting bigger – for more than a decade provides cybersecurity researchers another opportunity to examine why these events keep happening. Unfortunately, there is plenty of responsibility for everyone.

Several major problems need to be addressed before people can live in a truly secure society: For example, companies must find and hire the right people to actually solve the overall problems and think innovatively rather than just fixing the day-to-day issues. Companies must be made to get serious about cybersecurity – at a time when many firms have financial incentives not to, also. Until then, major breaches will keep happening and may get even worse.

Finding the right people

Data breaches are commonplace now, and have widespread effects. The Equifax breach affected more than 143 million people – far more than than the 110 million victims in 2013 at Target, the 45 million TJX customers hit in 2007, and significantly more than the 20 million or so current and former government employees in the 2015 U.S. Office of Personnel Management incident. Yahoo’s 2016 loss of user records, with a purported one billion victims, likely holds the dubious record for most victims in a single incident.

In part, cybersecurity incidents happen because of how companies – and governments – staff their cybersecurity operations. Often, they try to save money by outsourcing information technology management, including security. That means much of the insight and knowledge about how networks and computer systems work isn’t held by people who work for the company itself. In some cases, outsourcing such services might save money in the short term but also create a lack of institutional knowledge about how the company functions in the long term.

Generally speaking, key cybersecurity functions should be assigned to in-house staff, not outside contractors – and who those people are also matters a lot. In my experience, corporate recruiters often focus on identifying candidates by examining their formal education and training along with prior related work experience – automated resume scanning makes that quite easy. However, cybersecurity involves both technical skills and a fair amount of creative thinking that’s not easily found on resumes.

Moreover, the presence (or absence) of a specific college degree or industry certification alone is not necessarily the best indicator of who will be a talented cybersecurity professional. In the late 1990s, the best technical security expert on my team was fresh out of college with a degree in forest science – as a self-taught geek, he had not only the personal drive to constantly learn new things and network with others but also the necessary and often unconventional mindset needed to turn his cybersecurity hobby into a productive career. Without a doubt, there are many others like him also navigating successful careers in cybersecurity.

Certainly, people need technical skills to perform the basic functions of their jobs – such as promptly patching known vulnerabilities, changing default passwords on critical systems before starting to use them and regularly reviewing security procedures to ensure they’re strong and up to date. Knowing not to direct panicked victims of your security incident to a fraudulent site is helpful, too.

But to be most effective over the long term, workers need to understand more than specific products, services and techniques. After all, people who understand the context of cybersecurity – like communicating with the public, managing people and processes, and modeling threats and risks – can come from well beyond the computing disciplines.

Being ready for action

Without the right people offering guidance to government officials, corporate leaders and the public, a problem I call “cyber-complacency” can arise. This remains a danger even though cybersecurity has been a major national and corporate concern since the Clinton administration of the 1990s.

One element of this problem is the so-called “cyber insurance” market. Companies can purchase insurance policies to cover the costs of response to, and recovery from, security incidents like data breaches. Equifax’s policy, for example, is reportedly more than US$100 million; Sony Pictures Entertainment had in place a $60 million policy to help cover expenses after its 2014 breach.

This sort of business arrangement – simply transferring the financial risk from one company to another – doesn’t solve any underlying security problems. And since it leaves behind only the risk of some bad publicity, the company’s sense of urgency about proactively fixing problems might be reduced. In addition, it doesn’t address the harm to individual people – such as those whose entire financial histories Equifax stored – when security incidents happen.

Cybersecurity problems do not have to be just another risk people accept about using the internet. But these problems are not solved by another national plan or government program or public grumbling about following decades-old basic cybersecurity guidelines.

Rather, the technology industry must not cut corners when designing new products and administering systems: Effective security guidelines and practices – such as controlling access to shared resources and not making passwords impossible to change in our “internet of things” devices – must become fundamental parts of the product design process, too. And, cybersecurity professionals must use public venues and conferences to drive innovative thinking and action that can help fundamentally fix our persistent cybersecurity woes and not simply sell more products and services.

Making vulnerability unprofitable

Many companies, governments and regular people still don’t follow basic cybersecurity practices that have been identified for decades. So it’s not surprising to learn that in 2015, intelligence agencies were exploiting security weaknesses that had been predicted in the 1970s. Presumably, criminal groups and other online attackers were, too.

Therefore, it’s understandable that commercialism will arise – as both an opportunity and a risk. At present, when cybersecurity problems happen, many companies start offering purported solutions: One industry colleague called this the computer equivalent of “ambulance chasing.” For instance, less than 36 hours after the Equifax breach was made public, the company’s competitors and other firms increased their advertising of security and identity protection services. But those companies may not be secure themselves.

There are definitely some products and services – like identity theft monitoring – that, when properly implemented, can help provide consumers with reassurance when problems occur. But when companies discover that they can make more money selling to customers whose security is violated rather than spending money to keep data safe, they realize that it’s profitable to remain vulnerable.

With credit-reporting companies like Equifax, the problem is even more amplified. Consumers didn’t ask for their data to be vacuumed up, but they are faced with bearing the consequences and the costs now that the data have gotten loose. (And remember, the company has that insurance policy to limit its costs.)

Government regulators have an important role to play here. Companies like Equifax often lobby lawmakers to reduce or eliminate requirements for data security and other protections, seek to be exempted from liability from potential lawsuits if they minimally comply with the rules and may even try to trick consumers into giving up their rights to sue. Proper oversight would protect customers from these corporate harms.

Making a commitment

I’ve argued in the past that companies and government organizations that hold critical or sensitive information should be willing to spend money and staff time to ensure the security and integrity of their data and systems. If they fail, they are really the ones to blame for the incident – not the attackers.

A National Institute of Standards and Technology researcher exemplified this principle when he recently spoke up to admit that the complex password requirements he helped design years ago don’t actually improve security very much. Put another way, when the situation changes, or new facts emerge, we must be willing to change as necessary with them.

Many of these problems indeed are preventable. But that’s true only if the cybersecurity industry, and society as a whole, follows the lead of that NIST researcher. We all must take a realistic look at the state of cybersecurity, admit the mistakes that have happened and change our thinking for the better. Only then can anyone – much less everyone – take on the task of devoting time, money and personnel to making the necessary changes for meaningful security improvements. It will take a long time, and will require inconvenience and hard work. But it’s the only way forward.

Richard Forno, Senior Lecturer, Cybersecurity & Internet Researcher, University of Maryland, Baltimore County

This article was originally published on The Conversation. Read the original article.

The Conversation

Talk: Role of the Defense Information Systems Agency, 12p Fri 9/22

UMBC Cyber Defense Lab

Tech Talk with the Defense Information Systems Agency (DISA)

James Curry

Lead Engineer – Cyber Security Range
IDC – Cyber Workforce Development Division
Defense Information Systems Agency (DISA)

12:00–1:00pm, Friday, 22 September 2017, ITE 228, UMBC

A broad reaching brief on some of the technical aspects of DISA’s role as a combat support agency within the Department of Defense. Topics will include Scalability and the challenges of Big Data Analytics, Interoperability of systems, Visualization, Incident Response and Digital Forensics, Challenges with Classification Guidance, Supply Chain Risk Management, and Software Defined Networks/Infrastructure as a Service. Attendees are highly encouraged to ask questions.

James Curry is DISA’s Lead Engineer for the Cyber Security Range (CSR), which is chartered to develop and host a realistic DoD Information Network (DODIN) environment for Training, Testing, or Exercises. In this position, he has designed and built fully virtual implementations of DISA’s Internet Access Points (IAPs) and its Joint Regional Security Stack (JRSS), enabling the DoD Workforce to train in an IaaS on-demand environment that realistically matches DISA’s core infrastructure. He is a Scholarship for Service (SFS) recipient (2008-2009) and received his Masters and Bachelors of Science in Computer Science from New Mexico Tech. Email:

Host: Alan T. Sherman,

The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.

HackUMBC hackathon, Saturday-Sunday 7-8 October 2017

HackUMBC hackathon, Saturday-Sunday 7-8 October 2017

HackUMBC is a 24-hour tech innovation marathon where students across the East Coast collaborate on new ideas to build mobile, web and hardware projects. HackUMBC invites diverse groups of students to enjoy a weekend of hacking, workshops, tech talks, networking, and other fun activities. At the end of 24 hours, projects are presented and judged for different prize categories from sponsors and other organizations.

The event takes place on Saturday and Sunday, October 7-8 at several locations on the UMBC campus. Visit the HackUMBC site for complete details and to register.

CSEE Alumna Lauren Mazzoli chosen for UMBC Alumni Association Rising Star award

CSEE Alumna Lauren Mazzoli chosen for UMBC Alumni Association Rising Star award

Each year, the UMBC Alumni Association celebrates UMBC graduates and faculty who have made outstanding contributions to the University, their fields, and their communities. This year, CSEE Alumna Lauren Mazzoli was chosen for the Rising Star award, which is given to an outstanding undergraduate alumna/us of the last decade who has demonstrated professional achievement.

Lauren received B.S. degrees in both Computer Science and Mathematics in 2015 and completed a, M.S. degree in Computer Science at UMBC in 2017. As an undergraduate, she was in the first cohort of UMBC’s Cyber Scholars and was a CWIT affiliate. After completing her undergraduate studies, she joined Northrop Grumman as a Cyber Software Engineer and continued her studies in the UMBC Computer Science M.S. program. This summer she was selected for Northrop Grumman’s Future Technical Leaders Program, which is aimed at identifying and investing in Northrop Grumman’s next generation of technologists and leaders.

Lauren has been active as an alumna in supporting UMBC and its programs. She created and ran a semester-long Cyber Competition that was supported by Northrop Grumman for UMBC’s Cyber Scholars and Affiliates and participated in several on-campus activities to strengthen the relationship and interactions between Northrop Grumman and UMBC. She is currently on the board for Northrop Grumman’s Women’s International Network, and was the Lead of the Professional Development Group’s Community Outreach Activities. She has also spoken at, or been a panelist in, a number professional events.

All members of the UMBC community are invited to join the UMBC Alumni Association in celebrating the 2017 award recipients at the 2017 Alumni Awards Ceremony on Thursday, October 5 at 6:30 p.m. in the Earl and Darielle Linehan Concert Hall.

Marie desJardins receives award for inspiring women to pursue careers in computing, engineering and math

 

Professor Marie desJardins was selected for the 2017 A. Richard Newton Educator ABIE Award by the Anita Borg Institute. The annual award recognizes an educator who has developed innovative teaching practices and approaches that attract girls and women to computing, engineering, and math. As part of the award Dr. desJardins will take part in a panel on efforts to increase women’s representation and success in technology at the 2017 Grace Hopper Celebration of Women in Computing in Orlando this October.

Increasing gender diversity in computing has become both a professional focus and personal commitment for desJardins over the course of her career. “It’s part of a broader equity issue — for everyone to be able to envision themselves as creators of technology, and for the future of technology to be created by a diverse community of scientists and engineers,” she says.

This summer, desJardins shared her passion for encouraging girls and women to pursue careers in computing with nearly 150 elementary and middle school girls who attend the Mind, Body, Coding camp at UMBC. “Seeing these young girls whose lives could be transformed by greater access to computing is incredibly inspiring,” she says. “It’s a big part of what gets me energized every day to do the work that I do, from supporting diversity in K-12 computing education to mentoring junior female faculty who will train the next generation of computer scientists.”

The award announcement cited Professor desJardins for her many accomplishments in education, research and support of and commitment to improving student diversity, access, and quality of computer science courses at the high school level.

“Marie is known on campus and throughout her professional community for her dedication to mentoring, diversity, outreach, and innovative educational practices. Marie was named one of UMBC’s 10 “Professors Not to Miss” in 2011, and is regularly sought out to give invited talks to student groups. In 2010, she was invited to be a CRA-W/CDC Distinguished Lecturer. She was also one of the inaugural Hrabowski Innovation Fellows, and with that award, helped to create the ACTIVE Center, a new classroom that supports pedagogical approaches that increase student engagement and active problem solving.

Marie has become known nationally for her support of and commitment to improving student diversity, access, and quality of computer science courses at the high school level, and has received multiple NSF awards to support her efforts in this area. She is the lead PI on the NSF-sponsored “CS Matters in Maryland” project, which is creating curriculum and training high school teachers to teach the new AP CS Principles course. She has built a statewide coalition to increase access to K-12 CS education, with a focus on inclusion and diversity. She is also the Maryland team leader for the Exploring Computing Education Pathways (ECEP) Alliance, an NSF-funded initiative that is coordinating state-level CS education efforts.

Marie is UMBC’s 2014-17 Presidential Teaching Professor and was a founding member of the Maryland chapter of the Computer Science Teachers Association, for which she is currently the university liaison. Her research focuses on artificial intelligence, particularly machine learning, planning and decision making, and multi-agent systems. She has published over 100 scientific papers on these topics, and was recently named one of the “Ten AI Researchers to Follow on Twitter” by TechRepublic and one of “14 Women in AI You Should Follow on Twitter” by craigconnects.

At UMBC, Marie has been PI or co-PI on over $6,000,000 of external research funding, including a prestigious NSF CAREER Award, and has graduated 11 Ph.D. students and 25 M.S. students. She is particularly well known on campus and in her professional community for her commitment to student mentoring. She has been involved with the AAAI/SIGART Doctoral Consortium for the last 16 years and has worked with 90 undergraduate researchers and high school student interns. She was awarded the 2014 NCWIT Undergraduate Research Mentoring Award and the 2016 CRA Undergraduate Research Mentoring Award in recognition of her commitment to undergraduate research.”

UMBC researchers develop AI system to design clothing for your personal fashion style

 

AI system designs clothing for your personal fashion style

Everyone knows that more and more data is being collected about our everyday activities, like where we go online and in the physical world. Much of that data is being used for personalization. Recent UMBC CSEE Masters student Prutha Date explored a novel kind of personalization – creating clothing that matches your personal style.

Date developed a system that takes as input pictures of clothing in your closet, extracts a digitial representation of your style preferences, and then applies that style to new articles of clothing, like a picture pair of pants or a dress you find online. This work meshes well with recent efforts by Amazon to manufacture clothing on demand. Imagine being able to click on an article of clothing available online, personalize it to your style, and then have it made and shipped right to your door!

This innovative research was cited in a recent article in MIT Technology Review, Amazon Has Developed an AI Fashion Designer.

Tim Oates, a professor at the University of Maryland in Baltimore County, presented details of a system for transferring a particular style from one garment to another. He suggests that this approach might be used to conjure up new items of clothing from scratch. “You could train [an algorithm] on your closet, and then you could say here’s a jacket or a pair of pants, and I’d like to adapt it to my style,” Oates says.

Fashion designers probably shouldn’t fret just yet, though. Oates and other point out that it may be a long time before a machine can invent a fashion trend. “People innovate in areas like music, fashion, and cinema,” he says. “What we haven’t seen is a genuinely new music or fashion style that was generated by a computer and really resonated with people.”

You can read more about the work in a recent paper by Prutha Date, Ashwinkumar Ganesan and Tim Oates, Fashioning with Networks: Neural Style Transfer to Design Clothes. The paper describes how convolutional neural networks were used to personalize and generate new custom clothes based on a person’s preference and by learning their fashion choices from a limited set of clothes from their closet.

Prof. Cynthia Matuszek on how robots could help bridge the elder-care gap

File 20170825 19934 3c3fa
Robots can also lend a hand of sorts. Photographee.eu/Shutterstock.com

 

How robots could help bridge the elder-care gap

Cynthia Matuszek, University of Maryland, Baltimore County

Despite innovations that make it easier for seniors to keep living on their own rather than moving into special facilities, most elderly people eventually need a hand with chores and other everyday activities.

Friends and relatives often can’t do all the work. Growing evidence indicates it’s neither sustainable nor healthy for seniors or their loved ones. Yet demand for professional caregivers already far outstrips supply, and experts say this workforce shortage will only get worse.

So how will our society bridge this elder-care gap? In a word, robots.

Just as automation has begun to do jobs previously seen as uniquely suited for humans, like retrieving goods from warehouses, robots will assist your elderly relatives. As a robotics researcher, I believe artificial intelligence has the potential not only to care for our elders but to do so in a way that increases their independence and reduces their social isolation.

Personal robots

Robots can hand medicine to patients. UMBC Interactive Robotics and Language Lab, CC BY-SA

In the 2004 movie “I, Robot,” the robot-hating protagonist Del Spooner (played by Will Smith) is shocked to discover a robot in his grandmother’s house, baking a pie. You may have similar mental images: When many people imagine robots in the home, they envision mechanized domestic workers doing tasks in human-like ways.

In reality, many of the robots that will provide support for older adults who “age in place” – staying at home when they might otherwise be forced to relocate to assisted living or nursing homes – won’t look like people.

Instead, they will be specialized systems, akin to the Roomba, iRobot’s robotic vacuum cleaner and the first commercially successful consumer robot. Small, specific devices are not only easier to design and deploy, they allow for incremental adoption as requirements evolve over time.

Seniors, like everyone else, need different things. Many need help with the mechanics of eating, bathing, dressing and standing up – tasks known as “activities of daily living.” Along with daily help with cooking and managing their medications, they can benefit from a robotic hand with more intermittent things such as doing the laundry and getting to the doctor’s office.

That may sound far-fetched, but in addition to vacuuming robots can already mop our floors and mow our lawns. Experimental robots help lift people into and out of chairs and beds, follow recipes, fold towels and dispense pills. Soon, autonomous (self-driving) cars will ferry people to appointments and gatherings.

The kinds of robots already available include models that drive, provide pet-like social companionship and greet customers. Some of these technologies are already in limited trials in nursing homes, and seniors of course can already rely on their own Roombas.

Pepper, a social companion robot, in a retail environment. Tokumeigakarinoaoshima

Meanwhile, robot companions may soon help relieve loneliness and nudge forgetful elders to eat on a regular schedule.

Scientists and other inventors are building robots that will do these jobs and many others.

Round-the-clock care

While some tasks remain out of reach of today’s robots, such as inserting IVs or trimming toenails, mechanical caregivers can offer clear advantages over their human counterparts.

The most obvious one is their capacity to work around the clock. Machines, unlike people, are available 24/7. When used in the home, they can support aging in place.

Another plus: Relying on technology to meet day-to-day needs like mopping the floor can improve the quality of time elders spend with family and friends. Delegating mundane chores to robots also leaves more time for seniors to socialize with the people who care about them, and not just for them.

And since using devices isn’t the same as asking someone for help, relying on caregiving robots may lead seniors to perceive less lost autonomy than when they depend on human helpers.

Jenay Beer, a researcher at the University of South Carolina, advocates using robots to help elders age in place.

 

Interacting with robots

This brave new world of robot caregivers won’t take shape unless we make them user-friendly and intuitive, and that means interaction styles matter. In my lab, we work on how robots can interact with people by talking with them. Fortunately, recent research by the Pew Research Center shows that older adults are embracing technology more and more, just like everyone else.

Now that we are beginning to see robots that can competently perform some tasks, researchers like Jenay Beer, an assistant professor of computer science and engineering at the University of South Carolina, are trying to figure out which activities seniors need the most help with and what kinds of robots they might be most willing to use in the near term.

To that end, researchers are asking questions like:

But the fact is we don’t need all the answers before robots begin to help elders age in place.

Looking ahead

After all, there’s no time to lose.

The Census Bureau estimated that 15 percent of Americans – nearly one in six of us – were aged 65 or older in 2016, up from 12 percent in 2000. Demographers anticipate that by 2060 almost one in four will be in that age group. That means there will be some 48 million more elderly people in the U.S. than there are now.

I believe robots will perform many elder-care tasks within a decade. Some activities will still require human caregivers, and there are people for whom robotic assistance will never be the answer. But you can bet that robots will help seniors age in place, even if they won’t look like butlers or pastry chefs.

Cynthia Matuszek, Assistant Professor of Computer Science and Electrical Engineering, UMBC, University of Maryland, Baltimore County

This article was originally published on The Conversation. Read the original article.

Prof. Gymama Slaughter to develop bioreactors for life-saving organ transplants

 

UMBC’s Gymama Slaughter to develop bioreactors that could pause the clock for life-saving organ transplants

UMBC’s Gymama Slaughter will develop a bioreactor to extend the viability of lifesaving human organs as they await transplant through a major new grant from the U.S. Army Medical Research and Material Command. Funding for the project totals nearly $1.5 million for a period of three years. Slaughter, associate professor of computer science and electrical engineering, will collaborate closely with Warren Grayson and Gerald Brandacher, both associate professors at Johns Hopkins.

Gymama Slaughter, right, with Joel Tyson ’17, chemical engineering, and Zahra Ghassemi M.S. ’17, chemical engineering, in her lab.

The team will create a bioreactor integrating in-line sensors, mechanical stimulator, and blood perfusion system to more accurately and continuously monitor organs as they are transported for transplantation. They will also “develop a system that closely mimic the organ’s natural environment,” explains Slaughter.

Currently, organ and tissue donors typically need to be in close proximity to transplant recipients due to limitations in organ transport. Some organs are only viable for about six hours, and they must be kept at very cool temperatures to remain viable, so the transport process can be a race against time. With technological improvements, Slaughter says, the viability of the organs could be increased to about 36 hours, greatly expanding the distance an organ could travel from donor to recipient, and the likelihood of a successful transplant.

“This interdisciplinary research will enable us to tackle complex organ transplant viability problems to create the next big breakthrough platform technology for extending and monitoring the viability of organs to improve patient care,” says Slaughter. Together, the researchers hope their work will lead to a new era of successful human organ transplantation, saving the lives of wounded soldiers and others in need of transplants in hard-to-reach locations around the world.

Adapted from a UMBC News article by Megan Hanks, photos by Marlayna Demond ’11 for UMBC.

PhD defense: Prajit Das, Context-dependent privacy and security management on mobile devices

Ph.D. Dissertation Defense

Context-dependent privacy and security management on mobile devices

Prajit Kumar Das

8:00-11:00am Tuesday, 22 August 2017, ITE325b, UMBC

There are ongoing security and privacy concerns regarding mobile platforms which are being used by a growing number of citizens. Security and privacy models typically used by mobile platforms use one-time permission acquisition mechanisms. However, modifying access rights after initial authorization in mobile systems is often too tedious and complicated for users. User studies show that a typical user does not understand permissions requested by applications or are too eager to use the applications to care to understand the permission implications. For example, the Brightest Flashlight application was reported to have logged precise locations and unique user identifiers, which have nothing to do with a flashlight application’s intended functionality, but more than 50 million users used a version of this application which would have forced them to allow this permission. Given the penetration of mobile devices into our lives, a fine-grained context-dependent security and privacy control approach needs to be created.

We have created Mithril as an end-to-end mobile access control framework that allows us to capture access control needs for specific users, by observing violations of known policies. The framework studies mobile application executables to better inform users of the risks associated with using certain applications. The policy capture process involves an iterative user feedback process that captures policy modifications required to mediate observed violations. Precision of policy is used to determine convergence of the policy capture process. Policy rules in the system are written using Semantic Web technologies and the Platys ontology to define a hierarchical notion of context. Policy rule antecedents are comprised of context elements derived using the Platys ontology employing a query engine, an inference mechanism and mobile sensors. We performed a user study that proves the feasibility of using our violation driven policy capture process to gather user-specific policy modifications.

We contribute to the static and dynamic study of mobile applications by defining “application behavior” as a possible way of understanding mobile applications and creating access control policies for them. Our user study also shows that unlike our behavior-based policy, a “deny by default” mechanism hampers usability of access control systems. We also show that inclusion of crowd-sourced policies leads to further reduction in user burden and need for engagement while capturing context-based access control policy. We enrich knowledge about mobile “application behavior” and expose this knowledge through the Mobipedia knowledge-base. We also extend context synthesis for semantic presence detection on mobile devices by combining Bluetooth, low energy beacons and Nearby Messaging services from Google.

Committee: Drs. Anupam Joshi (chair), Tim Finin (co-chair), Tim Oates, Nilanjan Banerjee, Arkady Zaslavsky, (CSIRO), Dipanjan Chakraborty (Shopperts)

1 22 23 24 25 26 142