<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Tue, 21 Apr 2026 13:50:46 -0400" url="https://dev.my.umbc.edu/groups/cybersecurity/posts.xml?tag=talk">
  <NewsItem contentIssues="false" id="157310" important="false" status="posted" url="https://dev.my.umbc.edu/groups/cybersecurity/posts/157310">
  <Title>ACM Distinguished Speaker Talk: American Self-Defense in Cyberspace</Title>
  <Tagline>11am - 12:30pm, Thursday, March 12; ITE325 and online</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><div><h4><span>ACM Distinguished Speaker Talk: </span><span>American Self-Defense in Cyberspace</span></h4></div><div><h4>Dr. Josiah Dykstra</h4><h5>11am-12:30pm, Thursday, March 12</h5><p><strong>UMBC ITE 325b and <a href="https://umbc.webex.com/meet/wtan1" rel="nofollow external" class="bo">online</a>; Lunch provided!</strong></p><p>The United States is a major consumer, contributor, and target in cyberspace. This talk will describe cyber threats, roles and responsibilities, technology, and policy considerations for achieving American self-defense in cyber. We will discuss options for defending against cyberattack, achieving deterrence, and the interplay between offense and defense. We will consider various perspectives from computer science and engineering, political science, and economics.</p><p>Dr. <a href="https://www.linkedin.com/in/josiah-dykstra/" rel="nofollow external" class="bo">Josiah Dykstra</a> is a senior researcher at RTX BBN Technologies. He solves ambitious problems by blending high-end security research with a real-world attacker mentality to fortify the code powering the world's most critical organizations and devices.</p><p>Dr. Dykstra previously worked for 19 years at the National Security Agency (NSA) where he advised leadership and employees on technical matters for integrated cybersecurity operations and provided technical direction on projects and programs that enabled high impact operational effects. He held a variety of technical and leadership positions including as a senior researcher within NSA's Research Directorate studying computer network operations. His work has also included penetration testing, digital forensics, and malware analysis.</p><p>Dykstra is a Lifetime and Distinguished Member of ACM. He attended the 2nd Heidelberg Laureate Forum as a Young Researcher in 2014, which motivated his commitment to ACM. He is passionate about developing and empowering the next generation of interdisciplinary computing professionals, particularly in cybersecurity. Dykstra remains an active collaborator with academic, industry, and government researchers around the country. He has received numerous noteworthy awards, including the Presidential Early Career Award for Scientists and Engineers (PECASE). He is one of eight people in the CyberCorps Scholarship for Service (SFS) Hall of Fame.</p><p>Josiah received a B.S. in computer science and B.A. in music from Hope College (Holland, MI), M.S in information assurance from Iowa State University, and Ph.D. in computer science from the University of Maryland, Baltimore County. His doctoral research explored new technical and legal mechanisms to support digital forensics for cloud computing environments. Dr. Dykstra is a Fellow of the American Academy of Forensic Sciences (AAFS), member of the American Association for the Advancement of Science (AAAS), and member of the Human Factors and Ergonomics Society (HFES).</p><p>Dr. Dykstra is the author of the book Essential Cybersecurity Science (2016), a guide for practitioners and discusses key considerations for conducting scientific experiments in cybersecurity, including domain-specific insights including digital forensics and malware analysis. He is also co-author of the book Cybersecurity Myths and Misconceptions (2023). An experienced presenter and lecturer, he has spoken at major security events including Black Hat USA and RSA Conference.</p></div></div>
]]>
  </Body>
  <Summary>ACM Distinguished Speaker Talk: American Self-Defense in Cyberspace    Dr. Josiah Dykstra  11am-12:30pm, Thursday, March 12  UMBC ITE 325b and online; Lunch provided!  The United States is a major...</Summary>
  <Website>https://acm.umbc.edu/acm-distinguished-speaker-talks/acm-distinguished-speaker-talk-prof-josiah-dykstra/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/157310/guest@my.umbc.edu/69977ddea83727d4c9ec818e234d4a81/api/pixel</TrackingUrl>
  <Tag>acm</Tag>
  <Tag>cyber</Tag>
  <Tag>cyber-defense</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>talk</Tag>
  <Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/cybersecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
  <Sponsor>UMBC ACM Chapter</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/xxlarge.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/xlarge.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/large.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/medium.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/small.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/xsmall.jpg?1773083604</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/157/310/49805d0757ff81d6dfdf4112372ef5a5/xxsmall.jpg?1773083604</ThumbnailUrl>
  <ThumbnailAltText>Josiah Dykstra</ThumbnailAltText>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 09 Mar 2026 15:21:11 -0400</PostedAt>
  <EditAt>Tue, 10 Mar 2026 19:30:05 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="155242" important="false" status="posted" url="https://dev.my.umbc.edu/groups/cybersecurity/posts/155242">
  <Title>Talk: Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System</Title>
  <Tagline>12-1 pm EST Friday, December 12, 2025 online</Tagline>
  <Body>
    <![CDATA[
    <div class="html-content"><p>The UMBC Cyber Defense Lab presents</p><h4><strong>Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System</strong></h4><p><strong>Alan T. Sherman, Enis Golszewski, and Jeremy J. Romanik Romano<br>UMBC CSEE Department</strong></p><p><strong>Joint work with Edward Zieglar, Jonathan D. Fuchs, and William E. Byrd</strong></p><p><strong>12:00 noon–1pm Friday, December 12, 2025 via </strong><a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo"><strong>WebEx</strong></a></p><p>We analyze security aspects of the SecureDNA system regarding its system design, engineering, and implementation. This system enables DNA synthesizers to screen order requests against a database of hazards.  By applying novel cryptography involving distributed oblivious pseudorandom functions, the system aims to keep order requests and the database of hazards secret. Discerning the detailed operation of the system in part from source code (Version 1.0.8), our analysis examines key management, certificate infrastructure, authentication, and rate-limiting mechanisms. We also perform the first formal-methods analysis of the mutual authentication, basic request, and exemption-handling protocols.</p><p>Without breaking the cryptography, our main finding is that SecureDNA's custom mutual authentication protocol SCEP achieves only one-way authentication: the hazards database and keyservers never learn with whom they communicate. This structural weakness violates the principle of defense in depth and enables an adversary to circumvent rate limits that protect the secrecy of the hazards database, if the synthesizer connects with a malicious or corrupted keyserver or hashed database. We point out an additional structural weakness that also violates the principle of defense in depth: inadequate cryptographic bindings prevent the system from detecting if responses, within a TLS channel, from the hazards database were modified. Consequently, if a synthesizer were to reconnect with the database over the same TLS session, an adversary could replay and swap responses from the database without breaking TLS. Although the SecureDNA implementation does not allow such reconnections, it would be stronger security engineering to avoid the underlying structural weakness. We identify these vulnerabilities and suggest and verify mitigations, including adding strong bindings. Software Version 1.1.0 fixes SCEP with our proposed SCEP+ protocol.</p><p>Our work illustrates that a secure system needs more than sound mathematical cryptography; it also requires formal specifications, sound key management, proper binding of protocol message components, and careful attention to engineering and implementation details.</p><p><a href="https://www.csee.umbc.edu/people/faculty/alan-t-sherman/" rel="nofollow external" class="bo"><strong>Dr. Alan T. Sherman</strong></a> is a professor of computer science at UMBC in the CSEE Department, associate director of UMBC's Cybersecurity Institute, and director of the Cyber Defense Lab.  His main research interest is high-integrity voting systems. He has carried out research in election systems, protocol analysis, algorithm design, cryptanalysis, theoretical foundations for cryptography, applications of cryptography, cloud forensics, and cybersecurity education. Dr. Sherman is also a private consultant performing security analyses and serving as an expert witness.  Sherman earned the PhD degree in computer science at MIT in 1987, studying under Ronald L. Rivest.  His research accomplishments include contributions to the Scantegrity and VoteXX election systems and development and validation of the Cybersecurity Concept Inventory (CCI) and Cybersecurity Curriculum Assessment (CCA). This work has been presented at USENIX Security 2010 and E-VOTE-ID 2025, and won best research paper at SIGSCE 2023. Sherman received approximately $15 million in funding from NSF, NSA, and IBM. </p><p><strong><a href="https://www.csee.umbc.edu/enis-golaszewski/" rel="nofollow external" class="bo"><strong>Dr. Enis Golaszewski</strong></a> </strong>is a teaching assistant professor of computer science at UMBC in the CSEE Department.  He holds weekly workshops in formal-methods analyses of cryptographic protocols using the Cryptographic Protocol Shapes Analyzer (CPSA). His current research projects include analysis of the Coalition for Content Provenance and Authenticity (C2PA) protocol. Golaszewski earned the PhD under Sherman. His dissertation includes the design and development of a tool---ProtoBindGuard---that automatically binds protocol messages to context to prevent protocol-interaction attacks.  Golaszewski is a former SFS scholar at UMBC. <a href="https://www.csee.umbc.edu/enis-golaszewski/" rel="nofollow external" class="bo">https://www.csee.umbc.edu/enis-golaszewski/</a></p><p><strong>Jeremy J. Romanik Romano</strong> is an MS student in computer science at UMBC.  His research interests include cybersecurity, software security, and protocol analysis.  His involvement in this project began through being a student in Sherman's INSuRE and cryptology research courses.  Romano is a member of the UMBC Protocol Analysis Lab and system administration and cybersecurity clubs on campus.</p>Support for this event was provided in part by NSF under grants DGE-1753681 and 2438185. </div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents  Analysis of the Security Design, Engineering, and Implementation of the SecureDNA System  Alan T. Sherman, Enis Golszewski, and Jeremy J. Romanik Romano UMBC...</Summary>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/155242/guest@my.umbc.edu/9a0071f6f931c4880b76f3802acbca7e/api/pixel</TrackingUrl>
  <Tag>cryptography</Tag>
  <Tag>securedna</Tag>
  <Tag>security</Tag>
  <Tag>talk</Tag>
  <Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/cybersecurity</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="original">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
  <AvatarUrl size="large">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
  <AvatarUrl size="medium">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
  <AvatarUrl size="small">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
  <Sponsor>UMBC Cybersecurity Institute Group</Sponsor>
  <ThumbnailUrl size="xxlarge">https://assets3-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xxlarge.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xlarge.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="large">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/large.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="medium">https://assets4-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/medium.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="small">https://assets1-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/small.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="xsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xsmall.jpg?1765471295</ThumbnailUrl>
  <ThumbnailUrl size="xxsmall">https://assets2-dev.my.umbc.edu/system/shared/thumbnails/news/000/155/242/02f32b4cba306f3f9ad23578e138a682/xxsmall.jpg?1765471295</ThumbnailUrl>
  <ThumbnailAltText>talk announcement</ThumbnailAltText>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 11 Dec 2025 11:45:53 -0500</PostedAt>
</NewsItem>
</News>
