UCYBR - UMBC Center for Cybersecurity
This is the official channel for the UMBC Center for Cybersecurity (UCYBR), an interdisciplinary university center that unifies UMBC’s many cybersecurity capabilities. The Center aims to provide both Maryland and the nation with academic and research leadership, collaboration, innovation, and outreach in this critical discipline by streamlining our academic, research, workforce development, and technology incubation activities to advance UMBC’s position as a leading research university in cybersecurity-related disciplines. Contact ucyber@umbc or visit https://cybersecurity.umbc.edu/ to learn more!
Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods
Shaping Opinion and Influencing Societies through Narrative Construction
Tensor Decomposition Methods for Cybersecurity
Metametaphysical Ontologies for Consensus
GotCHA: CAPTCHAs for an AI Era
Anonymized Data Can Still Tell Tales: 2024 UMBC SFS Research Study
Automatically Binding Cryptographic Context to Messages in Network Protocols Using Formal Methods
Verifiable Election Tech: How Voters Can Independently Verify their Votes are Accurately Counted
MalDICT: Benchmark Datasets on Malware Behaviors, Platforms, Exploitation, and Packers
Building Effective Incident Response Workflows
Joe 'Kingpin' Grand on "Hacking a Hardware Wallet and Recovering $2 Million"
Analysis of Session Binding Proxy Protocol: Advantages and Dangers of Oblivious Protocol Participant
Fast Withdrawals from Optimistic Rollups
AVScan2Vec: Feature Learning on Antivirus Scan Data for Production-Scale Malware Corpora
W-OTS+ up my Sleeve:A Hidden Secure Fallback for Cryptocurrency Wallets
Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication
Recon and Reverse Engineering: A Case Study of Cyberphysical Systems in UMBCs Academic Building ILSB
Validation of the Cybersecurity Curriculum Assessment
“Think Like an Attacker”: Towards a Definition and Non-Technical Assessment of Adversarial Thinking
Myths in Cybersecurity: Pros and Cons of Analogies
Identifying Commonsense Misconceptions in Computer Security
Physical Security and How We Break It (Legally)
More holes than cheese: Vulnerabilities of the e-voting system used in the 2022 French POF Election
CDL- 5/6/22 - Model Validation for DARPA DPRIVE
CDL- 4/15/22 - Designing Quantum Resistant Key Exchange Protocols with CPSA
CDL- 4/1/22 - A Formal Methods Analysis of the Session Binding Proxy Protocol
CDL- 3/18/22 - CyMOT: Cybersecurity Training for Operational Technology in Manufacturing
CDL- 3/4/22 - Voting Technology