Cybersecurity Research / en Commonwealth Cyber Initiative CATAPULT fund launches translational research projects /news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects <span>Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 10/06/2022 - 14:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="90e15bd6-772b-4e20-ba74-f53e2bac4044"> <div class="cta"> <a class="cta__link" href="https://cyberinitiative.org"> <h4 class="cta__title">Learn About the CCI <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>As researchers and their teams work to answer questions and find solutions for protecting privacy and securing information through cybersecurity innovation, many set their sights on commercialization. Still, the path from research ideas to consumer products can be long and winding. To help straighten the path the Commonwealth Cyber Initiative (CCI) is supporting a Cyber Acceleration, Translation, and Advanced Prototyping for University Linked Technology (CATAPULT) Fund. The fund’s purpose‑‑advance collaborative translational research projects among CCI partners, to speed up the progress of academic research outcomes to the marketplace. </span></span></span></span></p> <p><span><span><span>"It is truly exciting to tap into the breadth of innovation from academic institutions across the Commonwealth and introduce these faculty inventors to the opportunity to expand the impact of their research through commercialization,” says Liza Wilson Durant, associate dean, strategic initiatives and community engagement, College of Engineering and Computing. “It is just the right time for Virginia to support and accelerate cybersecurity innovation as the Commonwealth establishes its role as a magnet for new companies with the best and brightest solutions to the nation's greatest cybersecurity challenges."</span></span></span></p> <p><span><span><span><span>In July 2022 CCI awarded seven teams from four universities in the Northern Virginia Node funding for their projects. These research teams received up to $50,000, with funding increments released based on the achievement of agreed-upon milestones. The teams and their projects are as follows.</span></span></span></span></p> <p><span><span><strong><span><span>Protecting Smartphones from Fingerphoto Spoofing</span></span></strong></span></span><br /><span><span><span><span><a href="https://gmu.edu" title="Mason">AV</a> Assistant Professor <a href="https://volgenau.gmu.edu/profiles/emarasco" title="Marusco profile">Emanuela Marasco’s</a> </span></span><span><span>the project addresses the urgent need for a mechanism that properly secures smartphone technology. Contactless fingerprint authentication allows faster capture times, unattended operations, and high hygiene. These systems, however, are still in the early stages of development. Although researchers are advancing matching, the risk of spoofing for contactless authentication must be mitigated as well. This project addresses the problem.</span></span></span></span></p> <p><strong>Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing  </strong><br /><span><span><span><span>As the number of Internet of Things (IoT) devices has increased rapidly, IoT botnets and information stealer attacks have exploited the vulnerabilities of IoT devices. It is still challenging, however, to detect the initial intrusion on IoT devices before massive attacks. Professor Gang Zhou,</span></span><span><span> from the College of William & Mary, </span></span><span><span>and his partners at Old Dominion University are addressing the challenge of the lack of accurate models in real-time for ubiquitous attack detection with their project.</span></span></span></span></p> <p><strong>Algorithm Evaluation for Backdoor Detection and Mitigation in Remote Sensing Systems</strong><br /><span><span><span><span>Artificial Intelligence (AI) technology has advanced to the point that it is inescapable in life and work. AI models extract knowledge from data to make decisions. Though AI has achieved state-of-the-art performances for many applications, it can be easily deceived by the backdoor attack.<strong> </strong><a href="https://odu.edu" title="Old Dominion University">Old Dominion University</a></span></span><span><span><strong> </strong>Professor<a href="https://www.odu.edu/directory/people/j/jli" title="Jang Li"> Jiang Li</a> </span></span><span><span>and his partners at <a href="https://maxar.com" title="Maxar">Maxar’s</a> </span></span><span><span>project leverages a novel approach to addressing this concern.</span></span></span></span><br />  </p> <p><span><span><strong><span><span>RF Fingerprinting Techniques for Millimeter-Wave Device Authentication in 5G/NextG Wireless Communication</span></span></strong><br /><span><span>Millimeter-wave (mmWave) technology is a key enabler for 5G and NextG wireless communications as it supports applications that require high-throughput and ultra-low latency. Due to the broadcast nature of the wireless medium, however, mmWave communication is vulnerable to various attacks. With this project <a href="https://volgenau.gmu.edu/profiles/kzeng2" title="Kai Zang">Kai Zeng,</a> </span></span><span><span>associate professor, AV</span></span><span><span> and his team aim to develop robust and efficient techniques to address these vulnerabilities.</span></span></span></span></p> <p><strong>Extended Reality Empowered 5G Telemedicine Mentoring</strong> <br /><span><span><span><span>Old Dominion University</span></span><span><span> Associate Professor <a href="https://ww2.odu.edu/~sshetty" title="Shetty">Sachin Shetty</a>’s</span></span><span><span> project looks at the development and commercialization of a 5G telemedicine platform that leverages Extended Reality technologies and a 5G environment. Because 5G technology supports massive capacity connections and fast data rates it has the potential to transform healthcare training and service delivery. One example, 5 G-enabled telemedicine, connects remotely located medical providers and allows access to near real-time data, and permits split-second decision-making critical in health care environments.</span></span></span></span></p> <p><span><span><span><span><strong>Super Timelines</strong><br /> When a cybersecurity incident occurs, analysts need to quickly construct a forensic timeline of events to assess the impact and plan the response. This effort typically involves extracting logs and other artifacts from various sources and then combining them into a single list, ordering them by date and time. Only then can an analyst look for clues to help better understand the course of events before, during, and after the incident. With Super Timelines, Florian Buchholz, </span></span><span><span>professor at <a href="https://jmu.edu" title="James Madison University">James Madison University</a>,</span></span><span><span> and his partners at Gigasheet (https://www.gigasheet.com) will develop a turnkey solution for this problem, based on a modern cloud-based infrastructure.</span></span></span></span></p> <p><span><span><span><span>“Without this funding from CCI, the research and start-ups that are so critical to Virginia’s strategy of building a high-impact cyber economy would not have the opportunity to meet the wonderful members of the tech community who have rallied around them to provide advice, guidance, and structure to launching new products and companies,” says Associate Vice President of the Office of Research Innovation and Economic Development, at AV, Paula Sorrell.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/9661" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/15721" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/19146" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 18:18:33 +0000 Martha Bushong 99511 at Foteini Baldimtsi earns NSF CAREER Award /news/2022-05/foteini-baldimtsi-earns-nsf-career-award <span>Foteini Baldimtsi earns NSF CAREER Award</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Mon, 05/16/2022 - 11:05</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/foteini" hreflang="und">Foteini Baldimtsi</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><figure role="group" class="align-left"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2022-05/Foteini-story-photo_600x400.jpg?itok=hhkdAb7i" width="350" height="233" alt="Foteini Baldimtsi standing in front of computers." loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>Computer Science, Assistant Professor, Foteini<br /> Baldimtsi.</figcaption></figure><p><span><span><span><span><span>George Mason Department of Computer Science Assistant Professor Foteini </span></span></span><span><span><span><span>Baldimtsi has been granted a National Science Foundation CAREER Award for her project, <em>Privacy Preserving Transactions with Accountability Extensions</em>.</span></span></span></span> </span></span></p> <p><span><span><span><span><span>Baldimtsi recently discussed the ubiquity of cryptography. “We use cryptography every single day. Every time you log in to your email or make a transaction with your bank, you use cryptography. Data do not fly around unencrypted.” </span></span></span></span></span></p> <p><span><span><span><span><span>Even so, certain types of interactions require people to offer up more data than they might be comfortable with. She gave a non-digital example of buying alcohol at a store, noting that a vendor simply needs to know if a buyer is over 21. When the buyer shows a driver’s license, the vendor can learn a customer’s full name, address, and exact date of birth, even though they didn’t need that information for the transaction. Using cryptographic techniques, she seeks to create digital credentials that only prove the necessities for a particular interaction. Such “zero-knowledge proofs,” she says, “lets me prove something to you about my identity, while keeping the rest of the stuff hidden.”</span></span></span></span></span></p> <p><span><span><span><span><span>Privacy has a price, one of which is speed. She said, “A big part of my CAREER award is how to make privacy techniques practical by being faster and more efficient.” She is particularly looking at anonymous payments. A credit card company, for example, may know that someone is buying coffee from Einstein’s Bagel in the Nguyen Engineering Building every day, though they only need to be able to process a financial transaction. “If you pay with cash, your bank only knows you withdrew a sum of money, but no one knows where or how you’re spending that money. Using a credit card is so much more convenient than paying with cash,” she said. “The question is, using our credit cards or our phones, can we maintain the same level of privacy? The answer is yes.”</span></span></span></span></span></p> <p><span><span><span><span><span>Digital privacy has regulatory consequences. “There is a tension between privacy and the ability to enforce the law,” she noted. “If we make everything completely private, there are regulatory issues, so I’m trying to design auditable or accountable schemes that ensure the following - as long as users obey the law, their privacy is maintained. If they break the law - under some well-defined notion of what the law says - their privacy will be lifted.” A key part of her grant, she said, is tackling the challenge of determining ways to mathematically formulate the law. To assist with this, she will be collaborating with the Mason policy and business schools.</span></span></span></span></span></p> <p><span><span><span><span><span>From her abstract:</span></span></span><span><span><span><span> “The amount of digital data collected electronically is increasing and poses threats to user privacy. Cryptographic mechanisms enhancing data privacy suffer from prohibitive computational and communication costs and do not offer accountability mechanisms. Towards the goal of bringing privacy-enhancing technologies closer to adoption, this project defines and constructs new cryptographic building blocks like: new types of digital signatures, cryptographic accumulators, and zero-knowledge proofs, which are at the core of mechanisms used to enhance privacy.”</span></span></span></span></span></span></p> <p><span><span><span><span><span>The award totals more than $500K and the award period is from July 2022 to June 2027. </span></span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/14746" hreflang="en">cryptography</a></div> <div class="field__item"><a href="/taxonomy/term/2186" hreflang="en">computer science</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Mon, 16 May 2022 15:05:16 +0000 Martha Bushong 70131 at At the Cross-Roads of Health Policy and Information Technology - Cybersecurity and Healthcare Data: What Executives and Policy Makers Need to Know Event Held in Arlington /news/2021-10/cross-roads-health-policy-and-information-technology-cybersecurity-and-healthcare-data <span>At the Cross-Roads of Health Policy and Information Technology - Cybersecurity and Healthcare Data: What Executives and Policy Makers Need to Know Event Held in Arlington </span> <span><span lang="" about="/user/811" typeof="schema:Person" property="schema:name" datatype="" content="John Brandon Cantrell" xml:lang="">John Brandon C…</span></span> <span>Wed, 10/06/2021 - 14:59</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/10521" hreflang="en">Health Information Technology</a></div> <div class="field__item"><a href="/taxonomy/term/4231" hreflang="en">Department of Health Administration and Policy</a></div> <div class="field__item"><a href="/taxonomy/term/676" hreflang="en">Arlington Forward</a></div> <div class="field__item"><a href="/taxonomy/term/8736" hreflang="en">CHHS News</a></div> <div class="field__item"><a href="/taxonomy/term/7171" hreflang="en">Tech Talent Investment Pipeline (TTIP)</a></div> <div class="field__item"><a href="/taxonomy/term/18541" hreflang="en">TTIP</a></div> <div class="field__item"><a href="/taxonomy/term/19491" hreflang="en">Tech Talent Investment Program</a></div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/pmaddox" hreflang="und">PJ Maddox, EdD, MSN, RN</a></div> <div class="field__item"><a href="/profiles/aevanscu" hreflang="und">Alison Evans Cuellar, PhD, MBA</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><h4><span><span>Department of Health Administration and Policy Partner with Healthcare Technology Network (HealthTechNet) and Arlington Forward to Host a Successful Event.</span></span></h4> <figure role="group" class="align-right"><div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2021-10/IMG_9143.JPG?itok=ySgDL8So" width="560" height="257" loading="lazy" typeof="foaf:Image" /></div> </div> <figcaption>The cybersecurity event provided attendees with networking opportunities, a keynote presentation, and a panel of cybersecurity experts discussing the top concerns in the federal, state, and private sectors. </figcaption></figure><p><span><span>Cyberattacks have become a pervasive threat in the health care industry. As more hospitals, clinics, and other health care organizations rely on technology for storing confidential medical records and delivering patient care, cyberattacks can jeopardize the safety and health of millions of individuals, making cybersecurity a priority for protecting public health. </span></span></p> <p><span><span>As leaders in health administration, policy, and informatics, Mason’s <a href="https://hap.gmu.edu/" target="_blank">Department of Health Administration and Policy</a> (HAP) partnered with <a href="https://www.healthtechnet.net/" target="_blank">Healthcare Technology Network</a> (HealthTechNet) and <a href="https://www2.gmu.edu/arlington-forward" target="_blank">Arlington Forward</a> to address this important issue and help professionals learn about the latest cybersecurity concerns in health care—and what to do about it.</span></span></p> <p><span><span>On September 23, information technology (IT), cybersecurity, and health care professionals across the DMV region gathered in Mason's Van Metre Hall in Arlington, Virginia, for “Cybersecurity and Healthcare Data: What Executives and Policy Makers Need to Know,” hosted by HAP, HealthTechNet, and Arlington Forward. </span></span></p> <p><span><span>"It was a pleasure to moderate this panel of experts," said <a href="https://chhs.gmu.edu/profiles/aevanscu" target="_blank">Alison Cuellar</a>, HAP professor and the event moderator. "Cybersecurity in health care has become hugely important. As we learned from our panelists, it's more than a data security issue; for providers, it can mean patient safety, too. And the state, federal, and private partners are working to address this important challenge."</span></span></p> <h4>Connecting, Collaborating, and Gaining Insight from Leading Cybersecurity Experts </h4> <p><span><span>The event offered attendees a valuable opportunity to network with a wide range of professionals dedicated to improving cybersecurity practices in their organizations. More than 100 professionals registered for the event. </span></span></p> <p><span><span><a href="https://chhs.gmu.edu/profiles/pmaddox" target="_blank">PJ Maddox</a>, HAP department chair, welcomed attendees and noted the significance of partnering with like-minded organizations to create an event where professionals can connect, collaborate, and gain insight from leading cybersecurity experts.   </span></span></p> <p><span><span>Keynote speaker <a href="https://www.linkedin.com/in/holycyberbatman/" target="_blank">Robert Wood</a>, chief information security officer at Centers for Medicare & Medicaid Services, spoke about simplifying cybersecurity processes throughout his career and encouraged attendees to be flexible and adaptable to meet the fast-paced changes in cybersecurity successfully.</span></span></p> <p><span><span>The panel provided a robust conversation on the public and private sectors' cybersecurity concerns. Alison Cuellar guided the discussion regarding current threats through the unique lens of each panelist, resulting in a well-rounded perspective on how cybersecurity affects all areas of health care and individual citizens. </span></span></p> <h4><span><span>Top Cybersecurity Concerns for Federal, State, and Private Sectors </span></span></h4> <p><span><span><a href="https://www.linkedin.com/in/john-riggi-aha-fbi/" target="_blank">John Riggi</a>, senior advisor for cybersecurity and risk at the American Hospital Association, spoke on how the pandemic created vulnerabilities at hospitals throughout the country and the move to increased telehealth delivery created new opportunities for hackers to take advantage of weaknesses in cybersecurity – resulting in security breaches that affected millions of patients. </span></span></p> <p><span><span><a href="https://www.linkedin.com/in/john-guerriero-721777b9/" target="_blank">John Guerriero</a>, a senior policy analyst in Homeland Security & Public Safety at the National Governors Association, discussed how cyberattacks affect the public’s trust in state government and the state executives’ focus on policies that protect patient data.  </span></span></p> <p><span><span>Looking to the future, <a href="https://www.linkedin.com/in/melina-scotto-3b010a37/" target="_blank">Melina Scotto</a>, chief information and security officer at General Dynamics Information Technology, focused her discussion on how private sectors can be proactive in cybersecurity by investing in educational pathways for students to become experts in cybersecurity engineering.</span></span></p> <h4>What's Next for HAP, Arlington Forward, and HealthTechNet</h4> <p><span><span>The event was one in a series of seminars on the most pressing issues at the intersection of information technology and health care.</span></span></p> <p><span><span>"At HealthTechNet, we are proud of our growing collaboration with AV and its Department of Health Administration and Policy," said Jim Oakes of HealthTechNet and adjunct faculty at Mason. "Several HAP faculty members were instrumental in the growth of HealthTechNet over twenty years ago, and we are grateful for their ongoing support and contributions to our programs. We are delighted to have put on this joint program and look forward to working together in the future."</span></span></p> </div> </div> </div> </div> </div> Wed, 06 Oct 2021 18:59:20 +0000 John Brandon Cantrell 54971 at Secure manufacturing saves energy and protects businesses /news/2021-04/secure-manufacturing-saves-energy-and-protects-businesses <span>Secure manufacturing saves energy and protects businesses</span> <span><span lang="" about="/user/326" typeof="schema:Person" property="schema:name" datatype="" xml:lang="">Martha Bushong</span></span> <span>Thu, 04/15/2021 - 12:36</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> <div class="field__item"><a href="/profiles/dwijesek" hreflang="und">Duminda Wijesekera</a></div> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="91a2a47d-6a1d-4a9a-81f8-758b42126595" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><figure role="group" class="align-right"><div alt="Paulo Costa and team" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{"image_style":"","image_link":"","svg_render_as_image":1,"svg_attributes":{"width":"","height":""}}" data-entity-type="media" data-entity-uuid="1bc348f7-19cc-4efb-9fa1-6fe9e5786d63" title="Paulo Costa in RARE Lab" data-langcode="en" class="embedded-entity"> <img src="/sites/g/files/yyqcgq291/files/2021-04/RARE%20lab.jpg" alt="Paulo Costa and team" title="Paulo Costa in RARE Lab" typeof="foaf:Image" /></div> <figcaption>Paulo Costa (on right) with his team in the RARE Lab.</figcaption></figure></div> </div> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span>Cybersecurity experts from <a href="https://engineering.gmu.edu" title="home page">Mason’s College of Engineering and Computing</a> are playing an important role in protecting American manufacturing automation and supply chains from cyber threats and designing better security into advanced manufacturing plants.</span></span></span></p> <p><span><span><span>Through its membership with the <a href="https://cymanii.org" title="CyManII home">Cybersecurity Manufacturing Innovation Institute</a> (CyManII, pronounced sī-man-ē), researchers will focus on developing an integrated cybersecurity architecture and achieving significant energy efficiencies in manufacturing. </span></span></span></p> <p><span><span><span>The institute is led by the University of Texas at San Antonio and has an initial 5-year budget of $111 million, including $70 million from the U.S. Department of Energy. The remaining budget is comprised of cost-sharing, member contributions, and other factors that together will ensure the self-sustainability of CyManII after this initial period.</span></span></span></p> <p><span><span><span>As a managing member, Mason is overseeing and operating CyManII’s East Coast headquarters on the Arlington Campus. The headquarters will house the institute’s primary offices, meeting space, and training facilities for the National Capital Region. </span></span></span></p> <p><span><span><span>“The Arlington facility will house lab space and equipment to demonstrate, test, and validate CyManII’s emerging cybersecurity and advanced manufacturing technologies and products,” says Associate Professor and </span><span>Vice President for Securing Automation and Supply Chain </span><span>Paulo Costa. </span><span>“Our proximity to the Department of Energy and Washington, D.C. will be useful to visitors when we return to in-person meetings and events.”</span></span></span></p> <p><span><span><span>The 13,000-square-foot facility supports robotic platforms that evaluate security vulnerabilities, the impact of 5G on autonomous vehicles, the power grid, smart buildings and cities, and smart manufacturing. The space will also host a robotic smart manufacturing testbed and provide meeting and temporary office space for visiting researchers and staff.</span></span></span></p> <p><span><span><span>Other benefits of filling the role of managing partner include representation on the governance board for leadership on strategic directions, planning, prioritization, and key programming. </span></span></span></p> <p><span><span><span>Mason will participate in road mapping efforts and strategic decisions about investments, technical focus, and projects. Mason faculty will also gain complimentary access to CyManII events, tech showcases and meetings, and participate in annual RFP competition with extensive outreach promoting completed projects/technologies.</span></span></span></p> <p><span><span><span>Mason researchers from the College of Engineering and Computing, who are setting up the lab, are playing key roles in CyManII’s first-year projects, finding ways to protect manufacturing automation and supply chains from cyber threats, and designing better security into advanced manufacturing plants. </span></span></span></p> <p><span><span><span>In one of the projects, Professor Duminda Wijesekera, CyManII’s <span><span>Coordinated Vulnerability Awareness Lead,</span></span></span> <span>is working with Bo Yu, research assistant professor, and Matt Jablonski, a PhD candidate and research assistant, to study Smart Manufacturing Architecture (SMA).</span></span></span></p> <p><span><span><span>SMA has the potential to make American manufacturing more productive, more energy-efficient, more competitive, and verifiably correct. “We hope our research in Smart Manufacturing Architecture provides the backbone for modeling that will speed up the adoption of these technologies and processes and help companies to create new, secure, integrated systems,” says Jablonski. “We know that the sooner we can identify risks, the better we can help manufacturers mitigate the risks.”</span></span></span></p> <p><span><span><span>The team’s work addresses potential methods for formally analyzing safety and security risks in Automated Manufacturing Systems. They emphasize how to identify components and the communication interfaces and components that can be modeled using formal methods. </span></span></span></p> <p><span><span><span>Recently the team used an automated manufacturing system that produces aluminum cans to show how these processes are modeled using a suite of formal methods that included Linear Time propositional Temporal Logic, Architecture Analysis, and Design Language, as well as fault and attack tree analysis. </span></span></span></p> <p><span><span><span>“This work is some of the most exciting work I’ve ever done,” says Yu. “The real-world application of this knowledge has tremendous impact. This modeling and what it does can protect the reputation of a business by finding weaknesses early on.” </span></span></span></p> <p><span><span><span>As CyManII’s work becomes more established, the research enterprise will expand and grow into additional areas, such as other cyber-physical systems that directly control physical processes such as machinery, vehicles, cranes, and other movable infrastructure. </span></span></span></p> <p><span><span><span>“Formal guarantees are needed in secure manufacturing automation because, in their absence, there is no acceptable way to guarantee against failures that occur due to malice and natural faults,” says Wijesekera. “These failures can affect the operational safety of machinery, operators, and the equipment that uses manufactured parts, resulting in wasted material and energy.” </span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/7461" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/7456" hreflang="en">CyManII</a></div> <div class="field__item"><a href="/taxonomy/term/7096" hreflang="en">Mason Momentum</a></div> </div> </div> </div> </div> </div> Thu, 15 Apr 2021 16:36:05 +0000 Martha Bushong 45646 at