Department of Cyber Security Engineering https://engineering.gmu.edu/ en Mason Competitive Cyber scores multiple wins at CyberForge 2024  https://engineering.gmu.edu/news/2024-02/mason-competitive-cyber-scores-multiple-wins-cyberforge-2024 <span>Mason Competitive Cyber scores multiple wins at CyberForge 2024 </span> <span><span>Martha Bushong</span></span> <span>Wed, 02/14/2024 - 12:50</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">The George Mason University team Mason Competitive Cyber scored first, second, and fourth place at the <a href="https://cyberforge.cvcsa-cyber.org/">Cyberforge 2024</a> competition held on February 11-12. During the two-day conference students heard from industry professionals and enhanced their cyberskills by competing in the Capture the Flag (CTF) competition. </span></p> <div class="align-right"> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq321/files/styles/small_content_image/public/2024-02/masoncc_2024.png?itok=2Ro139Wq" width="350" height="350" alt="group shot from event" loading="lazy" /></div> </div> <p>“Winning a Virginia-wide competition is pretty good news by itself,” said <a href="https://volgenau.gmu.edu/academics/cyber-security-engineering-department">Cyber Security Engineering Department</a> Chair <a href="https://volgenau.gmu.edu/profiles/pcosta">Paulo Costa</a>. “CyberForge is especially important due to the quality of the teams, the level of effort every team and associated organizations/universities put into it, and the impact it has in the Virginia cybersecurity space."</p> <p>Costa consider this one of the two most important competitions in the area. The other is Virginia Military Institute’s Cyber Fusion event happening later this month on February 23-24.</p> <p>The Cyberforge event featured companies such as MITRE, CCI, G2OPS, HAK5, CompTIA, Virginia Cyber Range, WiCyS, TCM Security, and more. The Mason students competed against top collegiate teams and industry professionals from around Virginia. Students value competitions as these events allow them to meet talented students and industry professionals outside their home institution. </p> <p>The team won multiple different prizes, including but not limited to Canakit raspberry pi 5 kits, CompTIA vouchers, and HAK5 gift cards, but they are most proud of the winner’s plaque, which they hope to display in the department’s office. </p> <p>The event was hosted by the <a href="https://www.cvcsa-cyber.org/" target="_blank">Coastal Virginia Cybersecurity Student Association (CVCSA),</a> Coastal Virginia Commonwealth Cyber Initiative (COVA CCI), and a local college/university's cybersecurity club. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/2766" hreflang="en">Mason Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/106" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/3666" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/4116" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/4111" hreflang="en">Tech Talent Investment Program</a></div> </div> </div> </div> </div> </div> Wed, 14 Feb 2024 17:50:37 +0000 Martha Bushong 8496 at https://engineering.gmu.edu Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity https://engineering.gmu.edu/news/2024-02/vijay-shah-joins-2m-ntia-funded-project-5g-cybersecurity <span>Vijay Shah joins $2M NTIA-funded project on 5G cybersecurity</span> <span><span>Teresa Donnellan</span></span> <span>Thu, 02/08/2024 - 16:06</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">George Mason University researcher <a href="https://www.gmu.edu/profiles/vshah22" target="_blank">Vijay Shah</a> has joined a $2 million project to develop a system to secure 5G Open Radio Access Network (O-RAN) architecture.</span></p> <p><span><span>Funded by the <a href="https://www.ntia.gov/press-release/2024/biden-harris-administration-awards-nearly-80m-wireless-innovation" target="_blank">National Telecommunications and Information Administration (NTIA)</a>, the project "A Holistic Cybersecurity Testing Framework for 5G Radio Access Networks" is a collaboration with Virginia Tech, Penn State University, and Worcester Polytechnic Institute.</span></span></p> <p><span><span>Shah, who leads <a href="https://www.nextgwirelesslab.org/" target="_blank">Mason’s NextG Wireless Lab</a>, will be allocated nearly a quarter of the project’s budget and be working with Nishith Tripathi and Jeff Reed from Virginia Tech, Syed Rafiul Hussain from Penn State University, and Bo Tang from Worcester Polytechnic Institute.</span></span></p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq321/files/styles/small_content_image/public/2024-02/vijay_shah_insta.png?itok=2BP-GY0L" width="350" height="350" alt="Vijay Shah" loading="lazy" /></div> </div> <figcaption>Vijay Shah</figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Security vulnerabilities in O-RAN present a critical cybersecurity challenge in the era of 5G. The team aims to create “a holistic and automated cybersecurity testing framework for O-RAN,” per the project’s executive summary.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Shah will also receive funding from the Commonwealth Cyber Initiative (CCI) to investigate fingerprinting technology for 5G/NextG O-RAN supply chain risk management, additional funding that highlights the multifaceted approach taken by the NextG Wireless Lab to address 5G networks cybersecurity challenges. </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">As part of these initiatives, the NextG Wireless Lab is actively growing its research team, with opportunities for postdoctoral researchers and PhD students interested in O-RAN cybersecurity, testing, and supply chain management.</p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Those interested in contributing to cutting-edge research in this field should <a href="mailto:vshah22@gmu.edu" target="_blank">email Shah</a>.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/2566" hreflang="en">Department of Cyber Security Engineering faculty</a></div> <div class="field__item"><a href="/taxonomy/term/1236" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/2896" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/1071" hreflang="en">cyber infrastructure</a></div> <div class="field__item"><a href="/taxonomy/term/86" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/3936" hreflang="en">WCC</a></div> </div> </div> </div> </div> </div> Thu, 08 Feb 2024 21:06:24 +0000 Teresa Donnellan 8396 at https://engineering.gmu.edu Mason faculty part of $1.7 million NTIA Wireless Innovation Fund project using AI to test O-RAN components https://engineering.gmu.edu/news/2023-12/mason-faculty-part-17-million-ntia-wireless-innovation-fund-project-using-ai-test-o <span>Mason faculty part of $1.7 million NTIA Wireless Innovation Fund project using AI to test O-RAN components</span> <span><span>Teresa Donnellan</span></span> <span>Tue, 12/12/2023 - 14:17</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/kzeng2" hreflang="und">Kai Zeng</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Two College of Engineering and Computing faculty members are part of a project awarded $1.7 million by the <a href="https://www.ntia.gov/" target="_blank">National Telecommunications and Information Administration’s</a> (NTIA) Public Wireless Supply Chain Innovation Fund. <a href="https://ece.gmu.edu/profiles/kzeng2" target="_blank">Kai Zeng</a>, a professor in the <a href="https://ece.gmu.edu/" target="_blank">electrical and computer engineering department</a>, and Vijay K. Shah, an assistant professor in the <a href="https://cybersecurity.gmu.edu/" target="_blank">cyber security engineering department</a> at George Mason University, are part of a team led by researchers from Michigan State University to test Open Radio Access Network (O-RAN) components using artificial intelligence (AI).  </p> <figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq321/files/styles/small_content_image/public/2023-12/resize_image_project_copy_2.png?itok=vkVKdSNI" width="350" height="350" alt="Kai Zeng" loading="lazy" /></div> </div> <figcaption>Kai Zeng</figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Zeng, Shah, and their colleagues will use AI to guide the process of running hundreds of millions of test cases within complex O-RAN systems. “We can accelerate the testing process and make it automatic [with AI],” said Zeng.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">The team’s testing includes three objectives: test for whether the O-RAN is secure, test the O-RAN's performance (i.e., its capacity for users in different app environments), and, finally, test for interoperability. When a system passes these myriad tests, Shah noted, “At least you can guarantee that, as long as a given environment is not very, very unique, it will work.” Supporting open and interoperable wireless networks is the aim of the NTIA’s Wireless Innovation Fund.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Inherently interoperable, O-RAN architecture is designed to comprise open and standardized interfaces for disaggregated RAN functions to lower the barrier for different vendors and third-party software developers to contribute to RAN innovation.  </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">“It's not like the current monolithic, proprietary cellular networks,” Zeng explained. “If you purchase, say, Ericsson products, you can only use their hardware and software. But now, with the open RAN interfaces, different vendors can come into play that are just based on some generalized hardware; and they can build a lot of software applications or functions in this O-RAN architecture.” O-RAN architecture is standardized by the <a href="https://www.o-ran.org/" target="_blank">O-RAN Alliance,</a> a consortium of cellular operators, large vendors, start-ups, and academic institutions.  </p> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq321/files/styles/small_content_image/public/2023-12/resize_image_project_copy.png?itok=zqeh4pPB" width="350" height="350" alt="Vijay Shah" loading="lazy" /></div> </div> <figcaption>Vijay K. Shah</figcaption></figure><p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">Zeng’s 5G/NextG wireless expertise and Shah’s O-RAN research and development work in the <a href="https://www.nextgwirelesslab.org/home" target="_blank">NextG Wireless Lab@George Mason University</a> positioned the pair perfectly to join this project. The project grew from Zeng’s working relationship with Michigan State and AT&amp;T researchers, with whom he completed an earlier project funded jointly by the National Science Foundation (NSF) and the Department of Defense’s <a href="https://new.nsf.gov/news/nsf-dod-partner-advance-5g-technologies" target="_blank">Securely Operating Through 5G Infrastructure program</a>. That project developed a product called <a href="https://wirelesscyber.cec.gmu.edu/WindTexter/" target="_blank">WindTexter</a> based on generative AI. Shah’s <a href="https://cec.gmu.edu/news/2023-07/george-mason-university-improving-next-gen-wireless-networks" target="_blank">O-RAN work</a> began late in 2020 with seed funding from the <a href="https://cyberinitiative.org/" target="_blank">Commonwealth Cyber Initiative</a> xG Testbed. He went on to secure a separate NSF grant, <a href="https://www.nextgwirelesslab.org/open-ai-cellular-oaic" target="_blank">Open AI Cellular</a>, which resulted in the development of a novel AI-driven controller to automatically control or configure O-RAN system parameters. </p> <p lang="EN-US" xml:lang="EN-US" xml:lang="EN-US">If the project goes well, Zeng said, the research team would like to see their hardware and software tools guide private industry in purchasing, testing, and, ultimately, adopting O-RAN.  </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/1236" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/2566" hreflang="en">Department of Cyber Security Engineering faculty</a></div> <div class="field__item"><a href="/taxonomy/term/306" hreflang="en">Electrical and Computer Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/2866" hreflang="en">Electrical and Computer Engineering Faculty</a></div> <div class="field__item"><a href="/taxonomy/term/201" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/2896" hreflang="en">5G/6G Wireless Communications</a></div> <div class="field__item"><a href="/taxonomy/term/3936" hreflang="en">WCC</a></div> <div class="field__item"><a href="/taxonomy/term/3666" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/4116" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/4111" hreflang="en">Tech Talent Investment Program</a></div> </div> </div> </div> </div> </div> Tue, 12 Dec 2023 19:17:21 +0000 Teresa Donnellan 8451 at https://engineering.gmu.edu Students shine at Mason’s Andrew P. Sage Memorial Capstone Competition https://engineering.gmu.edu/news/2023-04/students-shine-masons-andrew-p-sage-memorial-capstone-competition <span>Students shine at Mason’s Andrew P. Sage Memorial Capstone Competition</span> <span><span>Martha Bushong</span></span> <span>Mon, 04/24/2023 - 09:57</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/jshortle" hreflang="und">John Shortle</a></div> <div class="field__item"><a href="/profiles/sluo4" hreflang="und">Songjun Luo </a></div> <div class="field__item"><a href="/profiles/lsherry" hreflang="und">Lance Sherry</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span><span>George Mason University’s  </span></span><span><a href="https://seor.gmu.edu/" target="_blank"><span>Department of Systems Engineering and Operations Research</span></a></span><span><span> (SEOR) held its sixth annual Andrew P. Sage Memorial Capstone Design Competition on April 17, 2023. This student-focused competition is an international assembly for the design of complex systems and a leading showcase for undergraduate design projects. These projects are from capstone design courses or from baccalaureate, honors, or design-oriented graduate theses. The event honors Andrew P. Sage, the founding dean of the Volgenau School of Engineering, a pioneer and leader in systems engineering, a prolific author, and a dedicated educator.</span></span></span></span></span></p> <figure class="quote"><span><span><span><span><span>Event organizer Songjun Luo, associate professor from SEOR said, “The competition provided students in systems engineering and related disciplines an opportunity to showcase how they apply what they learn in solving real-world problems. As they receive feedback from judges, who are industry experts, the students learned if their solutions are practical or not. Finally, by competing with teams from other universities, they learned from each other.”</span></span></span></span></span></figure> <p><span><span><span><span><span>Mason teams competed with groups from UPenn, Virginia Tech, and other domestic and foreign universities. Since its inception in 2018, the competition has grown to include more teams from foreign countries. This year there were 12 international teams from four universities. </span></span></span></span></span></p> <p><span><span><span><span><span>Categories included design, network security, healthcare, software security, decision support systems, device security, and transportation and logistics. Teams from the Bachelor of Science in systems engineering and cyber security engineering represented Mason at the competition.</span></span></span></span></span></p> <p><span><span><span><span><span>Independent judges commented on the outstanding quality of the presentations and the skill of the student presenters and described the methodologies as top-notch. </span></span></span></span></span></p> <p><span><span><span><span><span>“I’d like to thank all of the people who contributed to the success of the event,” said Luo. “It was really an effort of many people.”</span></span></span></span></span></p> <ul> <li><span><span><span><span><span>The judges for reading through all the papers (~60), asking tough questions, and giving honest and constructive feedback and evaluations.</span></span></span></span></span></li> </ul> <ul> <li><span><span><span><span><span><span> The track chairs for working through all the technical issues and ensuring the smooth running of all sessions.</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>Justin Amoyal, CEO and Co-Founder of Impruvon, for a very inspirational keynote speech</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>George Donohue for hosting a wonderful (and humorous) award ceremony.</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>John Shortle and Lance Sherry for their advice and guidance.</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>SEOR and CYSE faculty for attending the conference.</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>Rania and Mike (our admins.) for the around-the-clock support in the last few days, and all 260+ students for their hard work!</span></span></span></span></span></span></li> </ul> <p><span><span><span><span><span>Mason winners from Cyber Security Engineering Tracks</span></span></span></span></span><span><span><span><span><span>"The projects consider all aspects of the systems engineering design process. It is very impressive what the students accomplish in a year,” said John Shortle, SEOR department chair.</span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="inline_block:mason_accordion" data-inline-block-uuid="9d5d252f-650d-4eda-be46-40acdf4ccedd" class="block block-layout-builder block-inline-blockmason-accordion"> <h2>Competition Winners</h2> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__items"> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS 1 Offensive / Defensive Network Security</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Winner - Team 2 </span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Advay Janardhan, Ryker Gogolkiewicz, Mathew Creeks, and Hassan Al Hani</span></span></span></span></span></p> <p><span><span><span><span><span>Title: Development of a Packer and Loader System for Malware Delivery. </span></span></span></span></span></p> <p><span><span><span> </span></span></span></p> <p><span><span><span><span><span>Honorable Mention - Team 5 </span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Celeste Huang, Chetan Kala, Faris Shaheen, Jhonn Dalton Cardozo, Mohammad Alessa and Sahil Khan</span></span></span></span></span></p> <p><span><span><span><span><span>Title: OpenStack Cloud Penetration Testing.</span></span></span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS2 Risk and Vulnerability Assessment Awards</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Best paper award: Chat Application Analysis: Custom Tooling and Workflow </span></span></span></span></span></p> <p><span><span><span><span><span>Team members: Sruthi Chavali, Rand Alaqeel, Mohamed Alfalasi, and Udhayvir Goraya</span></span></span></span></span></p> <p><span><span><span> </span></span></span></p> <p><span><span><span><span><span>Honorable Mention: Mitigation Roadmap for Supply Chain Attacks</span></span></span></span></span></p> <p><span><span><span><span><span>Team members: Johnathan Hy, Daniel Behrooz, Sahil Gulati, and Zain Shah</span></span></span></span></span></p> <p> </p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS 3 Cyber-physical Systems</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Best paper:  Team 4, ‘Decentralized Privacy-Preservation Misbehavior Detection in Vehicular Networks Using Deep Learning’</span></span></span></span></span></p> <p><span><span><span><span><span>Honorable mention: Team 2,   ‘Design and Testing of a Secure Asset Tracking System’</span></span></span></span></span></p> <p><span><span><span> </span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS 4 Software Security</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Best paper:  Team 4 (Mitigating Security Risks in the Software Supply Chain: A Continuous Inspection Framework within Azure)</span></span></span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS 5 Hardware Security</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Winner – Team 1 </span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Casey Cho, Pacey Querubin, Michael Long, Uthra Muthukumaran, Dian Rajic, and Kelson Schira</span></span></span></span></span></p> <p><span><span><span><span><span>Title: Detecting Unmanned Aircraft Systems on a Broadband Network and Long-Term Evolution</span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span>Honorable Mention – Team 3</span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Nathaniel Lovgren, Angelina Lee, Hashim Cheema, Brandon Avila, Jack Knobloch, and Lucas Artero</span></span></span></span></span></p> <p><span><span><span><span><span>Title: Identifying Friendly Forces in the Battlefield</span></span></span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track CS 6 Cyber-threat Intelligence</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Best Paper Winner: Team 3 </span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Rishi Shyamala, Luna Baral, Yonel Beaulieu, Haya Saeed, and Mosha Kamran</span></span></span></span></span></p> <p><span><span><span><span><span>Title: Using Machine Learning to Perform Anomaly Detection</span></span></span></span></span></p> <p> </p> <p><span><span><span><span><span>Honorable Mention: Team 2 </span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Paulina Keifer, Simran Chhatwal, Hamza Aljaidi, Tashfin Hassan, Joycelyn Joo, and Nathaniel Kim</span></span></span></span></span></p> <p><span><span><span><span><span>Title: ELK Stack Security Enhancement with Log Anomaly Detection and Analysis</span></span></span></span></span></p> <p><span><span><span> </span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track SE 1 and 2 System Design</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><strong><span>Best paper: Team 4</span></strong></span></span></p> <p><span><span><span>Design of a Portable and Renewable EV Battery Charging System  (PREVBCS)</span></span></span><span><span><span> </span></span></span><br />  </p> <p><span><span><span>Authors: Michael Riggi, Amir Abrari, Nancy Reyes, and Jojo Taylor</span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track SE 3 and 4 Industrial Applications</p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Most Promising Team.  Team 6 for A Design of a Mason Recovery System to Meet Net Zero Pledge</span></span></span></span></span></p> <p><span><span><span><span><span>Authors: Dominic Galarza, Nick Baxter, Christian Artz, and Aaron Bergantinos</span></span></span></span></span></p> </div> </section></div> <div class="field field--name-field-accordion-rows field--type-entity-reference-revisions field--label-hidden field__item"> <section class="accordion"> <header class="accordion__label"><span class="ui-accordion-header-icon ui-icon ui-icon-triangle-1-e"></span> <p>Track SE 6 Software Tools and Platform </p> <div class="accordion__states"> <span class="accordion__state accordion__state--more"><i class="fas fa-plus-circle"></i></span> <span class="accordion__state accordion__state--less"><i class="fas fa-minus-circle"></i></span> </div> </header> <div class="accordion__content"> <p><span><span><span><span><span>Best paper: <em>Team 2</em></span></span></span></span></span></p> <p><span><span><span><em><span><span>Authors: Joseph Privitera, Mikeal Lockard, and Ovidio Castillo</span></span></em></span></span></span></p> <p><span><span><span><em><span><span>Title: Design of a Climate Related Financial Risk Tool for Non-Profits and Small Businesses</span></span></em></span></span></span></p> </div> </section></div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/906" hreflang="en">Systems Engineering and Operations Research</a></div> </div> </div> </div> </div> </div> Mon, 24 Apr 2023 13:57:47 +0000 Martha Bushong 8201 at https://engineering.gmu.edu Future at Fuse: Cyber Security Engineering https://engineering.gmu.edu/news/2023-03/future-fuse-cyber-security-engineering <span>Future at Fuse: Cyber Security Engineering</span> <span><span>Teresa Donnellan</span></span> <span>Wed, 03/08/2023 - 11:24</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/pbrouse-0" hreflang="en">Peggy Brouse</a></div> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>As plans for Mason Square progress, the <a href="https://cybersecurity.gmu.edu/" title="Department homepage">Cyber Security Engineering</a> (CYSE) department, the fastest growing department in the College of Engineering and Computing (CEC), is eager to leverage the space. Home to the Commonwealth Cyber Initiative <a href="https://www.cci-novanode.org/Initiatives.html" target="_blank">Northern Virginia Node Cyber Living Innovation Lab,</a> Mason Square will house CYSE’s graduate programs  </p> <p>“The bulk of the research that we do happens there,” says department chair Paulo Costa. “It makes sense for us to have both our master's and PhD students having more presence on that campus, and that's going to become even more important after the new building [Fuse] is available to them.” </p> <p>As CEC’s youngest department and the first to offer a Bachelor of Science in cyber security engineering, CYSE is growing quickly. Associate chair and department founder Peggy S. Brouse estimates that the department gains 10 to 20 percent more students each year.  </p> <p>“This semester, we're graduating 158, and I think probably in the fall we'll get another 200 freshmen coming in, maybe more. I mean, it just doesn’t seem to be ending,” says Brouse. </p> <p>Dedicated leadership guides the department; Costa and Brouse have known each other for 25 years, having met when Costa was a student in Brouse’s class. Brouse has worked at Mason for 32 years. She co-founded the Systems Engineering and Operations Research department and developed the Cyber Security Engineering degree program from scratch; the bachelor’s in cyber security engineering was the first degree of its kind in the world.  </p> <p>“I had to work with corporations and others to find out what we should offer in this degree. It's a really hard degree—It's 126 credits, and it's very quantitative—but if you can get in it, you're going to make $100,000 going out. So, I'm really proud of it,” says Brouse. Indeed, CYSE has many organizational sponsors in northern Virginia, including various private companies that support specific senior design projects as well as government organizations that support research.</p> <figure role="group"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq321/files/styles/medium/public/2023-03/LIL.jpg?itok=XfTNf-fF" width="560" height="315" alt="Commonwealth Cyber Initiative Living Innovation Lab (Pilot Lab) in Arlington Campus. Photo by: Ron Aira/Creative" loading="lazy" /></div> </div> <figcaption>Commonwealth Cyber Initiative Living Innovation Lab (Pilot Lab) in Arlington Campus. Photo by: Ron Aira/Creative</figcaption></figure><p>The <a href="https://cyberinitiative.org/" title="Commonwealth Cyber Initiative">Commonwealth Cyber Initiative </a>(CCI), for example, funds the CCI Northern Virginia Node Cyber Living Innovation Lab at Mason Square, which includes about 4,000 square feet of space dedicated to cybersecurity research, training, and experiential learning. One such cybersecurity test involves the lab's Tormach CNC machine, which carves metal objects according to a given 3D file. As the machine engraves a coin with a word, one team tries to change a single letter of the word while another tries to detect and prevent the attack. Other lab equipment includes a robot that sorts items on a conveyor belt, driving simulation systems, and a high-fidelity digital twin of the Fuse building. </p> <p>In addition, the Department of Energy funds fourteen innovation institutes, each addressing a specific challenge, Costa explains. Mason Square serves as the east coast headquarters of the DoE's <a href="https://cymanii.org/" title="Cybersecurity Manufacturing Institute">Cybersecurity Manufacturing Innovation Institute</a> (CyManII), which provides a large yearly research grant for CYSE research at Mason. Costa, the grant’s principal investigator, notes, “We've been active in the areas of manufacturing of industrial systems and also autonomous vehicles.” </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/3751" hreflang="en">Fuse at Mason Square</a></div> <div class="field__item"><a href="/taxonomy/term/3431" hreflang="en">Mason Square</a></div> <div class="field__item"><a href="/taxonomy/term/1236" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/1231" hreflang="en">Cyber Living Innovation Lab</a></div> <div class="field__item"><a href="/taxonomy/term/176" hreflang="en">Cyber Security Research</a></div> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> </div> </div> </div> </div> </div> Wed, 08 Mar 2023 16:24:18 +0000 Teresa Donnellan 9771 at https://engineering.gmu.edu Systems Engineering and cyber security engineering represent Mason at Andrew Sage Competition https://engineering.gmu.edu/news/2021-05/systems-engineering-and-cyber-security-engineering-represent-mason-andrew-sage <span>Systems Engineering and cyber security engineering represent Mason at Andrew Sage Competition</span> <span><span>Martha Bushong</span></span> <span>Mon, 05/03/2021 - 19:29</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>Mason’s </span></span><a href="https://seor.gmu.edu/" target="_blank"><span><span>Department of Systems Engineering and Operations Research</span></span></a> <span><span>(SEOR) held its fourth annual Andrew P. Sage Memorial Capstone Design Competition on April 26.</span></span></span></span></p> <p><span><span><span><span>This student-focused competition is an international assembly for the design of complex systems and a leading showcase for undergraduate design projects. These projects are from our capstone design courses or from baccalaureate, honors, or design-oriented graduate theses.</span></span></span></span></p> <p><span><span><span><span>Our teams competed with groups from the United States Military Academy at West Point, </span></span><span><span><span>University of Pennsylvania</span></span></span><span><span>, James Madison University, Virginia Tech, and the College of Engineering and Computing's SEOR department. </span></span><span><span>Categories included design, network security, healthcare, software security, decision support systems, device security, and transportation and logistics.</span></span></span></span></p> <p><span><span><span><span>Teams from the Bachelor of Science in systems engineering and cyber security engineering represented Mason at the competition.</span></span></span></span></p> <p><span><span><span><span>The event honors Andrew P. Sage, the founding dean of the Volgenau School, a pioneer and leader in systems engineering, a prolific author, and a dedicated educator.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="inline_block:mason_accordion" data-inline-block-uuid="5e31e4f8-de37-4f9e-bc8f-03b374d265f3" class="block block-layout-builder block-inline-blockmason-accordion"> <h2>Honorable Mentions</h2> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><hr /> <h3>Upcoming Sessions (Registration opens approximately two weeks prior to each event).</h3> <p>Due to COVID-19 all information sessions and VSE hosted graduate admission events will be held virtually until further notice. For questions regarding graduate programs and the admissions process, please contact our office at <a href="mailto:vsegadm@gmu.edu">vsegadm@gmu.edu</a>. </p> <table> <thead> <tr> <th>Session Type</th> <th>Date</th> <th>RSVP </th> <th>Location</th> <th>Start Time</th> <th>End Time</th> </tr> </thead> <tbody> <tr> <td>Information Session (Prospective Students)</td> <td>Sat, Feb 6, 2021</td> <td>Event Passed</td> <td>Zoom</td> <td>10 a.m.</td> <td>10:45 a.m.</td> </tr> <tr> <td>Information Session (Prospective Students)</td> <td>Wed, Mar 10, 2021</td> <td>Event Passed</td> <td>Zoom</td> <td>10 a.m.</td> <td>10:45 a.m.</td> </tr> <tr> <td>Information Session (Prospective Students)</td> <td>Mon, April 19, 2021</td> <td>Event Passed</td> <td>Zoom</td> <td>12 p.m.</td> <td>12:45 p.m.</td> </tr> <tr> <td>Information Session (Prospective Students)</td> <td>Wed, May 19, 2021</td> <td><a href="https://masongradevent.secure.force.com/events/targetX_eventsb__events#/esr?eid=a1B1I000006z1wWUAQ&amp;CID=%7B!Contact.Id%7D&amp;EID=a1B1I000006z1wWUAQ">RSVP</a></td> <td>Zoom</td> <td>10:00 a.m.</td> <td>10:45 a.m.</td> </tr> <tr> <td>Information Session (Prospective Students)</td> <td>Wed, Jun 30, 2021</td> <td>TBA</td> <td>Zoom</td> <td>6:00 p.m.</td> <td>6:45 p.m.</td> </tr> <tr> <td>Information Session (Prospective Students)</td> <td>Fri, July 9, 2021</td> <td>TBA</td> <td>Zoom</td> <td>9:00 a.m.</td> <td>9:45 a.m.</td> </tr> </tbody> </table> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/906" hreflang="en">Systems Engineering and Operations Research</a></div> </div> </div> </div> </div> </div> Mon, 03 May 2021 23:29:43 +0000 Martha Bushong 6551 at https://engineering.gmu.edu Secure manufacturing saves energy and protects businesses https://engineering.gmu.edu/news/2021-04/secure-manufacturing-saves-energy-and-protects-businesses <span>Secure manufacturing saves energy and protects businesses</span> <span><span>Martha Bushong</span></span> <span>Thu, 04/15/2021 - 12:36</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> <div class="field__item"><a href="/profiles/dwijesek" hreflang="und">Duminda Wijesekera</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="91a2a47d-6a1d-4a9a-81f8-758b42126595" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><figure role="group" class="align-right"> <div alt="Paulo Costa and team" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;svg_render_as_image&quot;:1,&quot;svg_attributes&quot;:{&quot;width&quot;:&quot;&quot;,&quot;height&quot;:&quot;&quot;}}" data-entity-type="media" data-entity-uuid="1bc348f7-19cc-4efb-9fa1-6fe9e5786d63" title="Paulo Costa in RARE Lab" data-langcode="en" class="embedded-entity"> <img src="/sites/g/files/yyqcgq321/files/2021-04/RARE%20lab.jpg" alt="Paulo Costa and team" title="Paulo Costa in RARE Lab" /></div> <figcaption>Paulo Costa (on right) with his team in the RARE Lab.</figcaption> </figure> </div> </div> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span>Cybersecurity experts from <a href="https://engineering.gmu.edu" title="home page">Mason’s College of Engineering and Computing</a> are playing an important role in protecting American manufacturing automation and supply chains from cyber threats and designing better security into advanced manufacturing plants.</span></span></span></p> <p><span><span><span>Through its membership with the <a href="https://cymanii.org" title="CyManII home">Cybersecurity Manufacturing Innovation Institute</a> (CyManII, pronounced sī-man-ē), researchers will focus on developing an integrated cybersecurity architecture and achieving significant energy efficiencies in manufacturing. </span></span></span></p> <p><span><span><span>The institute is led by the University of Texas at San Antonio and has an initial 5-year budget of $111 million, including $70 million from the U.S. Department of Energy. The remaining budget is comprised of cost-sharing, member contributions, and other factors that together will ensure the self-sustainability of CyManII after this initial period.</span></span></span></p> <p><span><span><span>As a managing member, Mason is overseeing and operating CyManII’s East Coast headquarters on the Arlington Campus. The headquarters will house the institute’s primary offices, meeting space, and training facilities for the National Capital Region. </span></span></span></p> <p><span><span><span>“The Arlington facility will house lab space and equipment to demonstrate, test, and validate CyManII’s emerging cybersecurity and advanced manufacturing technologies and products,” says Associate Professor and </span><span>Vice President for Securing Automation and Supply Chain </span><span>Paulo Costa. </span><span>“Our proximity to the Department of Energy and Washington, D.C. will be useful to visitors when we return to in-person meetings and events.”</span></span></span></p> <p><span><span><span>The 13,000-square-foot facility supports robotic platforms that evaluate security vulnerabilities, the impact of 5G on autonomous vehicles, the power grid, smart buildings and cities, and smart manufacturing. The space will also host a robotic smart manufacturing testbed and provide meeting and temporary office space for visiting researchers and staff.</span></span></span></p> <p><span><span><span>Other benefits of filling the role of managing partner include representation on the governance board for leadership on strategic directions, planning, prioritization, and key programming. </span></span></span></p> <p><span><span><span>Mason will participate in road mapping efforts and strategic decisions about investments, technical focus, and projects. Mason faculty will also gain complimentary access to CyManII events, tech showcases and meetings, and participate in annual RFP competition with extensive outreach promoting completed projects/technologies.</span></span></span></p> <p><span><span><span>Mason researchers from the College of Engineering and Computing, who are setting up the lab, are playing key roles in CyManII’s first-year projects, finding ways to protect manufacturing automation and supply chains from cyber threats, and designing better security into advanced manufacturing plants. </span></span></span></p> <p><span><span><span>In one of the projects, Professor Duminda Wijesekera, CyManII’s <span><span>Coordinated Vulnerability Awareness Lead,</span></span></span> <span>is working with Bo Yu, research assistant professor, and Matt Jablonski, a PhD candidate and research assistant, to study Smart Manufacturing Architecture (SMA).</span></span></span></p> <p><span><span><span>SMA has the potential to make American manufacturing more productive, more energy-efficient, more competitive, and verifiably correct. “We hope our research in Smart Manufacturing Architecture provides the backbone for modeling that will speed up the adoption of these technologies and processes and help companies to create new, secure, integrated systems,” says Jablonski. “We know that the sooner we can identify risks, the better we can help manufacturers mitigate the risks.”</span></span></span></p> <p><span><span><span>The team’s work addresses potential methods for formally analyzing safety and security risks in Automated Manufacturing Systems. They emphasize how to identify components and the communication interfaces and components that can be modeled using formal methods. </span></span></span></p> <p><span><span><span>Recently the team used an automated manufacturing system that produces aluminum cans to show how these processes are modeled using a suite of formal methods that included Linear Time propositional Temporal Logic, Architecture Analysis, and Design Language, as well as fault and attack tree analysis. </span></span></span></p> <p><span><span><span>“This work is some of the most exciting work I’ve ever done,” says Yu. “The real-world application of this knowledge has tremendous impact. This modeling and what it does can protect the reputation of a business by finding weaknesses early on.” </span></span></span></p> <p><span><span><span>As CyManII’s work becomes more established, the research enterprise will expand and grow into additional areas, such as other cyber-physical systems that directly control physical processes such as machinery, vehicles, cranes, and other movable infrastructure. </span></span></span></p> <p><span><span><span>“Formal guarantees are needed in secure manufacturing automation because, in their absence, there is no acceptable way to guarantee against failures that occur due to malice and natural faults,” says Wijesekera. “These failures can affect the operational safety of machinery, operators, and the equipment that uses manufactured parts, resulting in wasted material and energy.” </span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/321" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/2806" hreflang="en">CyManII</a></div> <div class="field__item"><a href="/taxonomy/term/3041" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> Thu, 15 Apr 2021 16:36:05 +0000 Martha Bushong 6511 at https://engineering.gmu.edu Mason Engineering BS in cyber security engineering earns ABET accreditation https://engineering.gmu.edu/news/2021-01/mason-engineering-bs-cyber-security-engineering-earns-abet-accreditation <span>Mason Engineering BS in cyber security engineering earns ABET accreditation</span> <span><span>Anonymous (not verified)</span></span> <span>Tue, 01/19/2021 - 09:45</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p>Mason Engineering’s bachelor’s degree program in <a href="https://volgenau.gmu.edu/expertise/cybersecurity">cyber security engineering</a> has been <a href="https://volgenau.gmu.edu/academics/accreditation">accredited</a> by the Engineering Accreditation Commission of ABET, the global accreditor of college and university programs in applied and natural science, computing, engineering, and engineering technology.   </p> <p>ABET accreditation assures that programs meet standards to produce graduates ready to enter critical technical fields that are leading the way in innovation and emerging technologies and anticipating the welfare and safety needs of the public. </p> <p>“ABET accreditation is important to all engineering programs. The BS in cyber security engineering being the first ABET-accredited cyber security engineering program, and the first accredited with the new cyber security program criteria, is an important achievement for the new Volgenau Department of Cyber Security Engineering, but it is only the beginning,” says Peggy Brouse, professor and associate chair for the department. “The department is launching the new MS CYSE degree this spring semester. In addition, we are in a great position to extend research that we already have with the National Security Agency and the Department of Homeland Security. We are excited for the future.” </p> <p>Students pursuing a BS in cybersecurity engineering learn from distinguished faculty in the classroom and gain hands-on experience through projects and a year-long senior design capstone where faculty, students, and even alumni come together to tackle real-world problems.  </p> <p>Alumnus turned senior design capstone advisor Matthew Wilkes, BS cyber security engineering ’18, says of the students he has mentored, “I want to ensure they’re encouraged to be successful in both their project and beyond. I won’t make it easy for them because if it was easy every student could do it.” Wilkes was among the first students to graduate from the program.  </p> <p>“Any student who graduates from Mason with a degree in cyber security engineering has very high expectations,” says Wilkes.  </p> <p>Students praise the program and the opportunities that Mason offers. “Mason’s cybersecurity program has helped me build a solid base of practice and theory to fuel extracurricular study,” says cyber security engineering student Zaine Wilson. “Professors Tom Winston, Jim Jones, Mohamed Gebril, and all the other professors in the department, you won't find a group of more caring, inspiring, and wise mentors anywhere else.” </p> <p>ABET’s voluntary peer-review process is highly respected because it adds critical value to academic programs in the technical disciplines, where quality, precision, and safety are of the utmost importance. </p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/606" hreflang="en">Cyber Security</a></div> <div class="field__item"><a href="/taxonomy/term/181" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/1911" hreflang="en">Accreditation</a></div> <div class="field__item"><a href="/taxonomy/term/2466" hreflang="en">Department of Cyber Security Engineering</a></div> </div> </div> </div> </div> </div> Tue, 19 Jan 2021 14:45:18 +0000 Anonymous 7216 at https://engineering.gmu.edu