<?xml version="1.0"?>
<News hasArchived="false" page="2" pageCount="2" pageSize="10" timestamp="Mon, 20 Apr 2026 16:07:48 -0400" url="https://dev.my.umbc.edu/groups/cybersecurity/posts.xml?page=2&amp;tag=security">
  <NewsItem contentIssues="true" id="148342" important="false" status="posted" url="https://dev.my.umbc.edu/groups/cybersecurity/posts/148342">
    <Title>Talk: A Privacy and Security Analysis of myUMBC Answers, 3/28</Title>
    <Tagline>12-1pm ET Friday, March 28, 2025 online</Tagline>
    <Body>
      <![CDATA[
          <div class="html-content"><h3>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025</h3><div><br></div><h4><a href="https://damslabumbc.github.io/author/christian-badolato/" rel="nofollow external" class="bo">Christian Badolato<br></a>12–1pm Friday, March 28, 2025 <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">online</a></h4><div><br></div><div><a href="https://en.wikipedia.org/wiki/Generative_artificial_intelligence" rel="nofollow external" class="bo"><strong>Generative AI</strong></a> has the potential to improve user search experiences by supporting natural language querying and providing more detailed and domain-specific responses. UMBC is seeking to provide this convenience to myUMBC users through the <a href="https://my3.my.umbc.edu/groups/doit/posts/147188" rel="nofollow external" class="bo"><strong>myUMBC Answers</strong></a> system, which enables users to access both personal and UMBC services information from the myUMBC search bar. In this talk, we investigate the resiliency of Answers against several common generative AI attacks that were performed by the UMBC Scholarship for Service (SFS) scholars in collaboration with other students and the UMBC Division of Information Technology (DoIT). We first provide an overview of the study and the myUMBC Answers system before discussing the types of attacks which were launched against the system. We then explore the behavior of the Answers system in response to these attacks. Finally, we outline the recommendations provided to DoIT by the study participants to improve the security and user experience of myUMBC Answers.</div><div><br></div><div><a href="null" rel="nofollow external" class="bo"><strong>Christian Badolato</strong></a> is a PhD student working with Professor <a href="https://robertoyus.com/" rel="nofollow external" class="bo"><strong>Roberto Yus</strong></a> focusing on data privacy in the Internet of Things at UMBC after having received his master’s degree from the same university. He has several years of experience as a software architect and is a Certified Information Systems Security Professional.</div><div><br></div><div>Support for this <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cyber Defense Lab</strong></a> event was provided in part by NSF under SFS grant DGE-1753681.</div><div><br></div></div>
      ]]>
    </Body>
    <Summary>A Privacy and Security Analysis of myUMBC Answers: UMBC SFS Scholar Winter Study 2025     Christian Badolato 12–1pm Friday, March 28, 2025 online     Generative AI has the potential to improve...</Summary>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/148342/guest@my.umbc.edu/4d1af12d45ef4b1f267e575d72a7ef4b/api/pixel</TrackingUrl>
    <Tag>ai</Tag>
    <Tag>privacy</Tag>
    <Tag>security</Tag>
    <Tag>umbc</Tag>
    <Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/cybersecurity</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
    <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
    <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
    <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
    <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
    <Sponsor>The UMBC Cyber Defense Lab</Sponsor>
    <ThumbnailUrl size="xxlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxlarge.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xlarge.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/large.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/medium.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/small.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xsmall.jpg?1743014997</ThumbnailUrl>
    <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/148/342/7f9291521079d284b6738c920d38f486/xxsmall.jpg?1743014997</ThumbnailUrl>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 26 Mar 2025 13:47:00 -0400</PostedAt>
    <EditAt>Wed, 26 Mar 2025 15:24:07 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="147367" important="false" status="posted" url="https://dev.my.umbc.edu/groups/cybersecurity/posts/147367">
  <Title>Talk: Formal Methods or Usable Security: Why Not Both?</Title>
  <Tagline>McKenna McCall, 11:45 ET, Monday, Feb 17, ITE325</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><h3><span>Formal Methods or Usable Security: Why Not Both?</span></h3><h4><span><strong>McKenna McCall, CMU</strong></span></h4><h4><span><strong>11:45-12:45 Monday, Feb 17, UMBC ITE 325 and <a href="https://my3.my.umbc.edu/groups/csee/events/140127/join_meeting" rel="nofollow external" class="bo">online</a></strong></span></h4><p><span><br></span></p><p><span>Formal methods research involves using mathematical techniques to specify and verify properties of software and hardware systems. In security and privacy research, formal methods can lead to strong, provable security guarantees—and typically leave questions about how humans might interact with these systems unanswered. Indeed, formal methods and usable security are traditionally distinct areas of research. In this talk, I will demonstrate how techniques from both research areas can be applied—or even combined—to create solutions that are simultaneously mathematically rigorous and usable. In one project, we revisit static analysis tools for home IoT users from a usable security lens and investigate the usability and utility of the workflow involved in using the tools. Later in the talk, I will describe a project with a formal methods focus where we propose a new technique for preventing undesirable information flows on the web. We argue that this approach is usable in more realistic scenarios than what is proposed by prior work—without sacrificing security.</span></p><p><span><a href="https://www.andrew.cmu.edu/user/mckennak/" rel="nofollow external" class="bo"><strong>McKenna McCall</strong></a> is a postdoctoral researcher in the Software and Societal Systems Department at Carnegie Mellon University supervised by Lorrie Cranor and Lujo Bauer. She received her PhD from Carnegie Mellon University in 2023, advised by Limin Jia. McKenna’s research spans fields from information flow control and programming languages to security and privacy for home IoT and confidential computing. She is particularly interested in research where formal methods and usable security intersect, and combines techniques from both research areas to produce results that incorporate mathematical rigor as well as usability.</span></p><div><span><br></span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
  </Body>
  <Summary>Formal Methods or Usable Security: Why Not Both?  McKenna McCall, CMU  11:45-12:45 Monday, Feb 17, UMBC ITE 325 and online     Formal methods research involves using mathematical techniques to...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/147367/guest@my.umbc.edu/b9d28ddf5b42e211bedf3d7df3706e07/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>iot</Tag>
  <Tag>privacy</Tag>
  <Tag>security</Tag>
  <Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/cybersecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxlarge.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xlarge.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/large.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/medium.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/small.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xsmall.jpg?1739714164</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/147/367/e483c38299e51ae5f8e276d5dcb47830/xxsmall.jpg?1739714164</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sun, 16 Feb 2025 09:19:02 -0500</PostedAt>
  <EditAt>Thu, 13 Mar 2025 17:13:30 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="146242" important="false" status="posted" url="https://dev.my.umbc.edu/groups/cybersecurity/posts/146242">
  <Title>AI Lunchbox: Security Risk in AI/ML, 12/12</Title>
  <Tagline>12:00-1:00 pm EST, Thursday, December 12, 2024</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><span>In the AI Lunchbox session </span><span><strong>Security Risk in AI/ML</strong></span><span>, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach participants how to incorporate AI security risk into their organizational strategy and AI development workflows. </span><a href="https://www.linkedin.com/in/randyabernethy/" rel="nofollow external" class="bo"><span>Randy Abernethy</span></a><span> from </span><a href="https://rx-m.com/" rel="nofollow external" class="bo"><span>RX-M, LLC</span></a><span> will be a speaker. </span><span>The session will be held online from 12 to 1 p.m. EST on December 12, 2024. Register <a href="https://c4ai.umbctraining.com/event/security-risk-in-ai-ml/" rel="nofollow external" class="bo"><strong>here</strong></a> to receive a link to the</span><span> event from the UMBC Training Centers </span><a href="https://c4ai.umbctraining.com/" rel="nofollow external" class="bo"><span>Center for Applied AI</span></a><span>.</span></div>
    <hr><a href="https://cybersecurity.umbc.edu/" rel="nofollow external" class="bo"><strong>UMBC Cybersecurity Institute</strong></a></div>
]]>
  </Body>
  <Summary>In the AI Lunchbox session Security Risk in AI/ML, participants will learn about attacks on AI models and how to defend against them. Designed for a general audience, this presentation will teach...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/146242/guest@my.umbc.edu/4dedc88a7fdb994c7c9d405ab1ebd828/api/pixel</TrackingUrl>
  <Tag>ai</Tag>
  <Tag>risk</Tag>
  <Tag>security</Tag>
  <Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/cybersecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
  <Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xxlarge.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xlarge.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/large.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/medium.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/small.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xsmall.jpg?1734019439</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/146/242/cb605bcf2c880ac784cb1a694e5940e6/xxsmall.jpg?1734019439</ThumbnailUrl>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 12 Dec 2024 11:05:19 -0500</PostedAt>
</NewsItem>
</News>
