Cybersecurity / en George Mason’s Chief Information Security Officer protects the keys to the kingdom /news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom <span>George Mason’s Chief Information Security Officer protects the keys to the kingdom</span> <span><span>Lauren Reuscher</span></span> <span><time datetime="2025-09-04T10:42:10-04:00" title="Thursday, September 4, 2025 - 10:42">Thu, 09/04/2025 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Matthew Dalton joined as Chief Information Security Officer (CISO) in May, bringing more than 25 years of experience as a cybersecurity leader at R1 institutions. In his new role with Information Technology Services, he will provide vision and strategy for information security at Virginia’s largest public research university.&nbsp;</span></p> <p><span class="intro-text">We sat down with Dalton to learn more about today’s cybersecurity environment and how students, faculty, and staff can make sure they’re staying “cyber smart.”</span></p> <hr> <figure role="group"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/extra_large_content_image/public/2025-09/250805505.jpg?itok=sY1qNkdA" width="1480" height="987" alt="Portrait of Matthew Dalton standing outdoors on campus" loading="lazy"> </div> </div> <figcaption>Matthew Dalton, chief information security officer, . Photo by Ron Aira/Office of University Branding</figcaption> </figure> <hr> <h5><span>What does information security entail, particularly in a higher education setting?&nbsp;</span></h5> <p><span>One of the main responsibilities of my role is to help set the cybersecurity strategy for the university, allowing the flexibility and freedom necessary for creative, educational, and research endeavors, while preventing the negative impacts of cybersecurity events.</span></p> <p><span>Information security is about managing the risk to the community, their data, and the systems they rely on, as well as the risks that are presented to the university from everyday events, malicious actors, and nation-state threats. Depending on the kind of information that a person possesses or accesses online, the threats can be very different across the university.&nbsp;</span></p> <h5><span>You have led information security at several different institutions. What drew you to a career in higher education, and specifically to ?&nbsp;</span></h5> <p><span>You could say that higher education is in my blood. Many of my family members have worked in education.&nbsp;There are family stories that my great-grandparents on one side met because they taught at the same college. In my immediate family and closer generations, many of them met at the same college and went on to careers that stressed the value of education.</span></p> <p><span>For me, the brightest possible future comes through education, learning about others' experiences, and using our combined experiences to find a better path forward. I think that is one of the best examples of that in action.</span></p> <h5><span>What are the biggest changes in cybersecurity in higher education since you first entered the field?&nbsp;</span></h5> <p><span>I have seen two big changes. The first is the change from believing that individual researchers or departments at a large institution should manage information security requirements on their own. These days, it takes a coordinated effort across many different parts of the university to protect the information assets effectively.&nbsp;</span></p> <p><span>The second change is the need to bring information security closer to the individual person, rather than just the device or network that they are using. Early on, the computers were massive, and protecting the room that they were in may have been sufficient. Today, user credentials are the keys to the kingdom, and getting access to those unlocks the data that is everywhere, thanks to the cloud.</span></p> <h5><span>How do you work across other departments to reduce risks to the university?&nbsp;</span></h5> <p><span>With information technology embedded in everything across the university, it is essential that the security program works across the university as well. It’s more than just helping people not to click on that suspicious email; it’s about learning what they do in their role, so that the protections we put in place can complement, rather than compete with, their activities.&nbsp;</span></p> <h5><span>How does artificial intelligence (AI) factor into your role as chief information security officer?&nbsp;</span></h5> <p><span>Just like technology in general, AI is a force multiplier. You need to consider how AI can be used by people who are meaning ill intent just as effectively as it can be used by those who are trying to protect.&nbsp;</span></p> <p><span>It is important that AI be adopted into our strategy both from a threat-modeling perspective and how to deploy better protections for the university, so that we can respond effectively and quickly against whatever attacks come our way. &nbsp;</span></p> <h5><span>How can we better protect our personal information online? What are some important things for students, faculty, and staff to do in their daily lives?&nbsp;</span></h5> <p><span>Probably the most effective way to protect yourself online is to be aware of the hectic pace of the world we live in today. Be thoughtful in your approach, especially when it comes to emails, texts, social media messages, or any other way that some entity might interact with you.&nbsp;</span></p> <p><span>You need to stop, take time to breathe, and don't let the message dictate how frenetic a response you give. Think about whether this is a legitimate email or message, whether it's either too good to be true, or if it is trying to make you act with urgency.&nbsp;</span></p> <p><span>Almost every scam or phishing attempt has three things in common:</span></p> <ol> <li><span>The message tries to assert an authority that it may or may not have, posing as a tax collector, police, or even something like IT support.&nbsp;</span></li> <li><span>The message offers you something of value, like winning the lottery or an unclaimed prize—or a chance to avoid pain, such as past due taxes, and threats that your account is about to be suspended.</span></li> <li><span>The message holds a sense of urgency, telling you to act now, or telling you that you are actively in danger.&nbsp;</span></li> </ol> <p><span>If it seems strange, don’t engage. Instead, report it to&nbsp;</span><a href="https://its.gmu.edu/chat/"><span>Information Technology Services</span></a><span>.</span></p> <hr> <h5><span>Check out these other cybersecurity resources from George Mason:</span></h5> <p><a href="https://its.gmu.edu/working-with-its/it-security-office/security-best-practices/"><span>Security Best Practices—Information Technology Services</span></a></p> <p><a href="https://its.gmu.edu/2025/08/strong-passwords-add-security-to-accounts-and-devices/"><span>Strong passwords add security</span></a></p> <p><a href="https://its.gmu.edu/news/#:~:text=See%20all%20IT%20Security%20stories"><span>Information Technology Services (ITS) News—IT Security</span></a></p> <p>&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="a8918e9f-fcba-42b3-a544-46a4a9e2f40a"> <div class="cta"> <a class="cta__link" href="https://its.gmu.edu/news/"> <p class="cta__title">ITS news <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"> <div class="field field--name-field-cta-icon field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div> <div class="field field--name-field-media-font-awesome-icon field--type-fontawesome-icon field--label-visually_hidden"> <div class="field__label visually-hidden">Icon</div> <div class="field__item"><div class="fontawesome-icons"> <div class="fontawesome-icon"> <i class="fas fa-desktop" data-fa-transform data-fa-mask style="--fa-primary-color: #000000; --fa-secondary-color: #000000;"></i> </div> </div> </div> </div> </div> </div> </div> </span> </a> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="4ededf22-8416-4c86-baea-5e0a9e3d7f16"> <div class="cta"> <a class="cta__link" href="https://its.gmu.edu/working-with-its/it-security-office/security-best-practices/"> <p class="cta__title">Cybersecurity best practices <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="181c8472-8c7a-4b4d-b7b6-979c1a61569c" class="block block-layout-builder block-inline-blocknews-list"> <h2>Read more like this</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-3b55ab66c1dac2dc8a5f13b8c6c145d99448cb2d15e363737bf5b7db042c34d8"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/fall-2025-peace-week-focuses-bridging-peacebuilding-development-and-security" hreflang="en">Fall 2025 Peace Week focuses on bridging peacebuilding, development, and security</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 17, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/getting-know-college-science-dean-cody-w-edwards" hreflang="en">Getting to Know College of Science Dean Cody W. Edwards</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 16, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/around-mason-week-sept-16-2025" hreflang="en">Around Mason: Week of Sept. 16, 2025</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 16, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/around-mason-week-sept-9-2025" hreflang="en">Around Mason: Week of Sept. 9, 2025</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 9, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/potomac-health-foundation-grant-will-support-expanded-community-mental-health-services" hreflang="en">Potomac Health Foundation grant will support expanded community mental health services in Prince William County</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 8, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">Faculty and Staff News</a></div> <div class="field__item"><a href="/taxonomy/term/621" hreflang="en">Information Technology Services</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4666" hreflang="en">AI</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/20826" hreflang="en">GCI-Grand Challenge Initiative</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div> </div> </div> Thu, 04 Sep 2025 14:42:10 +0000 Lauren Reuscher 343046 at Cybersecurity student hopes to use his powers for good /news/2025-08/cybersecurity-student-hopes-use-his-powers-good <span>Cybersecurity student hopes to use his powers for good </span> <span><span>Shayla Brown</span></span> <span><time datetime="2025-08-29T11:49:25-04:00" title="Friday, August 29, 2025 - 11:49">Fri, 08/29/2025 - 11:49</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US">When cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun intro-text" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun intro-text" lang="EN-US"> in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.&nbsp;</span><span class="EOP TrackedChange SCXW140835998 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Since winter 2024, the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://honorscollege.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Honors College</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> student has been interning at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> (CCI) Northern Virginia Node, George Mason’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-08/250819602.jpg?itok=gVKY2IIJ" width="560" height="374" loading="lazy"> </div> </div> <figcaption>CEC student and Commonwealth Cyber Initiative intern Connor Wadlin. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It’s a super exciting job because I get to work with </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">AprilTags</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, which are on objects that the drone's camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cyberinitiative.org/events-programs/events-for-2025/cci-symposium-2025.html" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">CCI Symposium</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">,</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> environmental variables, cyber-attacks, and more,” he explained.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin learned about many of the tools he’s currently using for CCI in his classes with </span><a class="Hyperlink SCXW140835998 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Highlight Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">College of Engineering and Computing</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> professors</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, such as his </span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">mentor </span><a class="Hyperlink SCXW140835998 BCX0" href="https://volgenau.gmu.edu/profiles/mgebril" target="_blank"><span class="SCXW140835998 BCX0 TrackChangeTextInsertion TrackedChange TextRun Underlined NormalTextRun" lang="EN-US">Mohamed Gebril</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">, an associate professor in the Department of Cyber Security Engineering.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“George Mason supports people where they are to get them where they want to be,” Wadlin said.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">The skills Wadlin has acquired during his time at George Mason and in his work with CCI have enable him to help other students in their studies.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George Mason. He even assists the students during our workshops,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin is participating in George Mason’s </span><a class="Hyperlink SCXW140835998 BCX0" href="/admissions-aid/accelerated-masters" target="_blank"><span class="TextRun Underlined SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Bachelor’s to Accelerated Master’s Program</span></a><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> and will to pursuing a master’s degree also in cyber security.</span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cutting</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">edge technology,” said Gebril.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun Highlight SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin’s team is also working to develop</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"> a first</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">of</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">its</span><span class="TrackChangeTextInsertion TrackedChange SCXW140835998 BCX0 TextRun NormalTextRun" lang="EN-US">-</span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">kind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.&nbsp;</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW140835998 BCX0"><span class="TextRun EmptyTextRun SCXW140835998 BCX0" lang="EN-US"></span><span class="TextRun SCXW140835998 BCX0 NormalTextRun" lang="EN-US">“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That's always got to be the end goal,” said Wadlin.</span><span class="EOP SCXW140835998 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="0cea7810-3f69-41bb-a54e-947fabf8f245"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Explore the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/mgebril" hreflang="und">Mohamed Gebril</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="f48742ce-f36a-4b68-9a09-4ea4555c6ffb" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-fb878018bb765376eafb10e745a5ca8d215d538665a33f4012f501e4932cc18a"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/field-career-dreams-grad-student-spends-summer-identifying-and-protecting-native" hreflang="en">Field of career dreams: Grad student spends summer identifying and protecting native plants</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 2, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/george-mason-student-finds-his-voice-through-dream-internship" hreflang="en">George Mason student finds his voice through dream internship  </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 27, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/biomedical-internship-yielded-lively-experience" hreflang="en">Biomedical internship yielded lively experience</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 22, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/george-mason-interns-make-difference-biotech-start-ups" hreflang="en">George Mason interns make a difference at biotech start-ups</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 19, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/721" hreflang="en">internships</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/821" hreflang="en">Honors College</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Fri, 29 Aug 2025 15:49:25 +0000 Shayla Brown 342981 at Five George Mason cybersecurity students hack their way to Boston /news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston <span>Five George Mason cybersecurity students hack their way to Boston </span> <span><span>Jennifer Pocock</span></span> <span><time datetime="2025-07-31T10:38:39-04:00" title="Thursday, July 31, 2025 - 10:38">Thu, 07/31/2025 - 10:38</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="TextRun SCXW254463957 BCX0 NormalTextRun intro-text" lang="EN-US">The Country to Country (C2C) Capture the Flag (CTF) contest is an international competition that issues challenges to code, decrypt, search, hack, and reverse engineer their way through as many challenges as possible.</span><span class="EOP SCXW254463957 BCX0 intro-text">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-07/1751924384845.png?itok=uFP2TDau" width="560" height="297" loading="lazy"> </div> </div> <figcaption>(C2C) CTF contestants gathered from across the globe to solve pernicious problems. Photo provided.</figcaption> </figure> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">About 500 students from nearly 100 countries, ranging from inexperienced freshmen to PhD candidates in cybersecurity</span><span class="TrackChangeTextInsertion TrackedChange SCXW266550933 BCX0 TextRun NormalTextRun" lang="EN-US">,</span><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> competed individually in the qualifying rounds. Only the top 100—including five from —were accepted into the finals. Four went to Boston for the competition, held this year at Northeastern University.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">The </span><a href="https://cec.gmu.edu/"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">College of Engineering and Computing</span></a><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> students Gael Abboud, Sanjay Kumar Samala, Nhat Le, and Jonah Wilbur represented the green and gold, but were all placed on different teams. (Amaan Abbas also made the cut but could not attend.)</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“The organizers were amazing,” said Abboud, who is a graduate student pursuing her master's in systems engineering through the </span><a href="/admissions-aid/accelerated-masters"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Accelerated Master's Program</span></a><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">. She explained that they try to make it a truly international and cooperative competition. Ideally, each team would contain people from different countries.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“Somehow, I ended up on a team with two other people from Virginia,” Abboud said with a laugh. “They came from Virginia Commonwealth University and William and Mary.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Her Virginia-strong team did the state proud. Over a day of competition, they sometimes worked together and sometimes apart to solve as many problems as possible from across various skill sets.&nbsp;</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">It’s not just coding. Abboud described one of the challenges. “It was open-source intelligence, which is </span><span class="TextRun SCXW266550933 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">really just</span><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US"> fancy Googling. They set a scene where we had to find a very certain scooter repair shop in Boston. They told us that it was near a metro stop and in sight of an Indian restaurant. Seems like it should be easy, but it wasn’t!”&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">They also had to track down things like the price of the building and the vice president of the company that sold it more than 60 years ago. “No one solved that one.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">In the end, Abboud’s team landed in fourth place: an admirable showing when the contestants represent some of the best from around the globe. “I was so disappointed,” she sighed. “There was less than one point separating us from the third-place team.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">Abboud said that she loved every minute and would tell anyone curious about hack-a-thons to try qualifying for this Capture the Flag event.&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0"><span class="TextRun SCXW266550933 BCX0 NormalTextRun" lang="EN-US">“It may seem intimidating, but there are challenges for any skill level,” she said. “You don’t know what it will be like if you don’t try. &nbsp;Don’t stress if you don’t know something. People are happy to walk you through how they solved it.”</span><span class="EOP SCXW266550933 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW266550933 BCX0">&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="df4163a0-5e9e-4ea9-8a46-a6b51307cecf"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Learn more about the College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="cfe360fc-a6bc-493f-b473-66d882279911" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="b1fe0cb9-6461-40fd-8a76-aa2a9b266111" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-b61bedaba25582c015bada351c2d5d652be719a1cdbb8d5df4fa120c8db532f1"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George Mason turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George Mason cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-01/unlocking-privacy-encrypted-ingenuity-security-expert-receives-nsf-career-award" hreflang="en">Unlocking privacy with encrypted ingenuity: Security expert receives NSF CAREER award </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">January 27, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2024-12/cyber-savant-hacks-his-way-international-team" hreflang="en">Cyber savant hacks his way onto international team</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">December 3, 2024</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/15806" hreflang="en">competitions</a></div> <div class="field__item"><a href="/taxonomy/term/8986" hreflang="en">Hackathon</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> </div> </div> </div> </div> </div> Thu, 31 Jul 2025 14:38:39 +0000 Jennifer Pocock 251101 at Safeguarding George Mason’s research and researchers /news/2025-06/safeguarding-george-masons-research-and-researchers <span>Safeguarding George Mason’s research and researchers </span> <span><span>Katarina Benson</span></span> <span><time datetime="2025-06-18T14:45:55-04:00" title="Wednesday, June 18, 2025 - 14:45">Wed, 06/18/2025 - 14:45</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="TextRun SCXW119951882 BCX0 NormalTextRun intro-text" lang="EN-US">Earlier this year, Melissa Perez was named assistant vice president for research security in the Office of Research Integrity and Assurance at . In this role, she oversees university-wide policies and processes to ensure compliance with research security laws and regulations (including export control), international collaborations, travel, and cybersecurity. As George Mason’s designated research security officer, she also leads institutional responses to threats affecting the university’s research compliance and standing.</span><span class="EOP TrackedChange SCXW119951882 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><em><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Perez has more than 20 years of research compliance experience, including the past decade leading George Mason’s export compliance and secure research programs—most recently as director for export compliance and secure research. She recently shared her insights on the university’s Research Security Program, regulatory challenges, and the impact </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">on</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"> researchers.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></em></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-06/m_perez.jpg?itok=8IhWeHGV" width="279" height="350" loading="lazy"> </div> </div> <figcaption>Melissa Perez. Photo by Office of University Branding</figcaption> </figure> <p class="Paragraph SCXW49919964 BCX0" lang="EN-US"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What inspired you to take on this new role?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">I majored in international relations at St. Joseph’s University and law at American University. I enjoy analyzing the geopolitical aspects of research security and how the federal government uses regulations to advance its foreign policy goals. I began actively advocating for a research security program at George Mason in 2023 because the U.S. government has been messaging to universities how critical it is to protect U.S. research and the role universities have in safeguarding the research.&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span><span class="EOP SCXW49919964 BCX0"> </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">I am committed to supporting our researchers and knew that I wanted to have an even greater role in ensuring that they can pursue their international research safely and responsibly. I have created and expanded other compliance programs at George Mason that support our faculty and researchers, and I am excited for the opportunity to create a new program that will be a resource for the George Mason community.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Why is a research security program vital for George Mason, and how does it align with the requirements of National Security Presidential Memorandum 33 (NSPM-33)?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Under NSPM-33, the U.S. government mandates that R1 universities like George Mason establish robust research security programs to protect U.S. technology against foreign government misappropriation. The Research Security Program enables us to meet this requirement and continue receiving federal funding, and it also demonstrates to government sponsors George Mason’s commitment to protecting our research and researchers when they engage with international colleagues.&nbsp;&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What are the key security challenges universities face?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">One key challenge is raising awareness of threats and risks, and helping researchers recognize international activities that may compromise their research, their funding, or their careers. When people hear “research security,” they often think that the U.S. government is only interested in protecting classified or sensitive research, but, in fact, the threat of misappropriation goes beyond that and includes fundamental or basic research.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>NSPM-33 introduces specific guidelines for safeguarding research. How </strong></span><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US"><strong>you</strong></span><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong> plan to ensure compliance without stifling academic freedom?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">While there is an inherent tension between limiting what faculty can do, from a regulatory perspective, and academic freedom, the goal of George Mason’s Research Security Program is to help researchers identify international activities that are safe, secure, and that protect them, their research teams, and their careers. I don’t want to stop collaborations; I want to make sure that our researchers can engage in these activities with confidence that the collaborations will benefit them, the university, and the scientific community.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><strong><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></strong></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>What are your top priorities for the first year of implementation?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">The priorities for the first year are communications and outreach as they are key to raising awareness and establishing buy-in and a culture of compliance. Research security applies to all federally funded research and will impact anyone involved in federally funded research, especially researchers collaborating internationally. That’s why outreach is so important. I want to ensure that faculty, staff, and students understand the new requirements and how the evolving policy landscape impacts them. In terms of workflow changes, by working with offices across campus to refine our processes around foreign travel security and cybersecurity, my intent is to embed elements of research security into existing processes rather than create new workflows for people to follow. My goal is to make research security easy and unobtrusive for </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">the researchers</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Universities thrive on collaboration. How does the program ensure that partnerships with external entities remain productive and secure?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">A strong research security program will allow us to maintain and grow the level of international engagements at George Mason. Without this program and the processes and tools that will be a part of it, it is much harder from a risk perspective to evaluate which activities may involve a high level of risk that could jeopardize our research or researchers.&nbsp;</span><span class="EOP SCXW49919964 BCX0"> &nbsp;</span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>Can you provide an example of a security threat that could potentially compromise research at a university, and how the program will prepare to address it?&nbsp;</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">One example is the U.S. government’s policy regarding Malign Foreign Talent Recruitment Programs (MFTRP). In the past, being selected to participate in a program such as China’s Thousand Talents Program was considered an achievement. Today, participation in a foreign talent program that the U.S. government considers “malign” could jeopardize a researcher’s ability to receive federal funding.&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">To ensure that our researchers remain eligible to bid on federal projects, we have a pre-approval process in RAMP where we review foreign appointments and affiliations to determine whether they would be </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">a MFTRP</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.&nbsp; If the researcher is contemplating an activity that would be considered a MFTRP, I work with the researcher to mitigate risk by removing terms that make the activity “malign,” and I provide guidance so that they can weigh the risks associated with such foreign appointments.&nbsp;&nbsp;</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">Cybersecurity is one of the pillars of NSPM-33, and my office will partner with many across campus who manage cybersecurity threats, including the Office of Research Computing, ITS, and the IT units in the colleges, to make sure that all research security policies addressing cybersecurity are coordinated and reflect industry best practices.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US"></span></p> <h5><span class="TextRun MacChromeBold SCXW49919964 BCX0 NormalTextRun" lang="EN-US"><strong>How do you envision adapting the program over time?</strong></span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></h5> <p class="Paragraph SCXW49919964 BCX0"><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">In my role as research security officer, it will be my responsibility to be aware of regulatory changes in this space and to have a pulse on how other universities are responding to these changes. As the regulatory landscape evolves, I will work with leadership to communicate those changes to our researchers. Our program will need to be agile to reflect changes implemented by the U.S. government. Policies and guidance are shifting rapidly, and a big challenge will be keeping our community </span><span class="TextRun SCXW49919964 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">up-to-date</span><span class="TextRun SCXW49919964 BCX0 NormalTextRun" lang="EN-US">.</span><span class="EOP SCXW49919964 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="37c22b1e-2f73-434b-a0cd-78b28f5c0127" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="f0a1012d-8478-4e58-9747-e8b3f070a26a"> <div class="cta"> <a class="cta__link" href="https://gmu.edu/research"> <p class="cta__title">Learn more about Research at George Mason <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="8cb98d08-d845-4f4b-8302-ee4792a0d63e" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="5d85d82c-33e4-4c26-a392-c9baaf9c6551" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-415136cff8edc33bb985e3254083eb916b1c2373ff11674a6e85b601a260a6a5"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George Mason cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-06/safeguarding-george-masons-research-and-researchers" hreflang="en">Safeguarding George Mason’s research and researchers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 18, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-05/sit-stay-buzz" hreflang="en">Sit! Stay! Buzz?</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/206" hreflang="en">Faculty and Staff News</a></div> <div class="field__item"><a href="/taxonomy/term/1111" hreflang="en">Office of Research Innovation and Economic Impact</a></div> </div> </div> </div> </div> </div> Wed, 18 Jun 2025 18:45:55 +0000 Katarina Benson 117846 at Sit! Stay! Buzz? /news/2025-05/sit-stay-buzz <span>Sit! Stay! Buzz?</span> <span><span>Jennifer Pocock</span></span> <span><time datetime="2025-05-29T10:56:51-04:00" title="Thursday, May 29, 2025 - 10:56">Thu, 05/29/2025 - 10:56</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">These students are short-circuiting voice commands, dog whistles, and clickers.</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-05/jwb_050625_gmu-oscars009-final_0.jpeg?itok=LL92aYfb" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Covert Dog Comms Team Leader Paul J. Wyche displays their finished prototype at the Office of Student Creative Activities and Research (OSCAR) Celebration. Photo by John Boal</figcaption> </figure> <p class="MsoNormal">If you’ve had a puppy, you probably know the patience it takes to train them in basic commands, and it can be a noisy affair involving begging, pleading, and some yelling. Working dogs like those in police and military K9 units need to learn so much more.&nbsp;</p> <p class="MsoNormal">Sometimes, they need to obey without hearing a word.&nbsp;</p> <p class="MsoNormal">Rescue situations can be chaotic, with so much going on that a command gets lost in the noise. Sometimes, a team of dogs need to hear many different commands, and competing voices are confusing. Other times, operation teams need to go radio silent and any noise at all will give their positions away.</p> <p class="MsoNormal">Enter Team Covert Dog Comms. This pack of cybersecurity seniors at George Mason, all of whom graduated in May, sniffed out a way to direct dogs without barking commands.</p> <p class="MsoNormal">Together, they became the dream team that was the envy of anyone who has ever worked on a bad group project—and proof that great leadership combined with a passionate team yields amazing results.&nbsp;</p> <p class="MsoNormal">“Working with this team has been a very positive experience. One key factor that made it successful was the balance of specialized skill sets,” said team leader Paul J. Wyche, who also recently spoke at his College of Engineering and Computing graduation. “While some of our backgrounds overlapped, each team member had a distinct area of expertise, allowing us to overcome any obstacle and collaborate effectively.”</p> <p class="MsoNormal">Those members were Maxime Bonnaud, who specialized in the vest’s wireless and cryptographic security; Jonathan Perry, who designed the hardware; and AJ Hoepfner, who set up testing standards and regulations, along with assisting Wyche with project management.</p> <p class="MsoNormal">“Mostly, what made this team great was good execution on the fundamentals,” said Bonnaud. “Everyone showed up, communicated well, and looked for areas they could work on instead of having to be assigned work.”&nbsp;</p> <p class="MsoNormal">The end result was a securely encrypted working prototype of a vest that can be programmed with three different vibrating pattern commands that a dog can be trained to obey. While they were unable to find a working dog to test on, the team tested the vest on themselves and found it to work as intended.&nbsp;</p> <p class="MsoNormal">When asked whether the team planned to patent or commercialize the vest, Wyche said that they wouldn’t rule it out. “We haven’t formally discussed commercializing the project. However, if the opportunity arises and we receive the necessary support, we may explore those possibilities.”&nbsp;</p> <p class="MsoNormal">Until then, they achieved their goal of making “a fully operational haptic vest that could be refined for real-world use in special operations.”</p> <p class="MsoNormal">And that is something to howl about.</p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/4281" hreflang="en">Senior Capstone Project</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/2076" hreflang="en">Military</a></div> <div class="field__item"><a href="/taxonomy/term/1246" hreflang="en">Police and Public Safety</a></div> <div class="field__item"><a href="/taxonomy/term/4261" hreflang="en">Prototype</a></div> <div class="field__item"><a href="/taxonomy/term/21136" hreflang="en">Grad</a></div> <div class="field__item"><a href="/taxonomy/term/481" hreflang="en">Graduation</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/20206" hreflang="en">Defense and Security</a></div> </div> </div> </div> </div> </div> Thu, 29 May 2025 14:56:51 +0000 Jennifer Pocock 117531 at George Mason and CodeLock work on securing the software supply chain /news/2025-05/george-mason-and-codelock-work-securing-software-supply-chain <span>George Mason and CodeLock work on securing the software supply chain </span> <span><span>Nathan Kahl</span></span> <span><time datetime="2025-05-15T07:27:25-04:00" title="Thursday, May 15, 2025 - 07:27">Thu, 05/15/2025 - 07:27</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> </span><span class="intro-text">Department of Information Sciences and Technology </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Professor Kun Sun received a grant from the </span><a href="https://cyberinitiative.org" title="CCI Nova"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Commonwealth Cyber Initiative (CCI) of Northern Virginia</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> to collaborate with </span><a href="https://www.codelock.it" title="CodeLock"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CodeLock,</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> Inc</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">., a Virginia-based technology company specializing in software security. The grant totals $75,000 for one year and is part of CCI’s </span><a href="https://cyberinitiative.org/innovation/cyber-acceleration-catapult/call-for-proposals.html" title="CCI"><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US">Academic Support for Cybersecurity Entrepreneurship and Next-Gen Development</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun intro-text" lang="EN-US"> (ASCEND) Fund. </span><span class="EOP SCXW190735760 BCX4 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The idea for this funding is to partner a startup company with university subject matter experts,” said Sun. “The focus of this grant is to build a platform that connects startups with academic experts to solve technical industry challenges.”  </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project will integrate Sun’s previous research on automated security patching with </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> technology for secure software supply chain using dynamically generated digital signatures to develop solutions that address vulnerabilities in source code. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2024-02/untitled_0.png?itok=8IWyGgqi" width="350" height="350" loading="lazy"> </div> </div> <figcaption>The CCI is Virginia’s main access point for cybersecurity research, innovation, workforce development. Image courtesy CCI.&nbsp;</figcaption> </figure> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> offers a cybersecurity platform designed to secure software development processes by providing real-time monitoring, compliance automation, and protection against insider threats and supply chain attacks. It creates a forensic chain of custody by linking every code change to its developer, ensuring transparency and integrity throughout the software development lifecycle. ​ </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> </span><span class="LineBreakBlob BlobObject DragDrop SCXW190735760 BCX4">&nbsp;</span><br><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">So</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> for software supply chain security we install outside software applications on our smartphones and computers, for example,” said Sun. “That software may rely on  other software and we have this term, SBOM, which means software bill of material. It says that we need to know what other dependent software is used and can we trust that software? If you install software, you need to verify it has not been manipulated or modified by an attacker.” Sun will apply his 10+ years of research on automatic software vulnerability detection and automated program repair. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">“The vast majority of software supply chain attacks begin with compromised credentials—something traditional security tools are ill-equipped to prevent,” said </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> CEO Brian Gallagher. “By enforcing zero-trust authentication at the developer level and linking that identity to a tamper-proof chain of custody, </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> is fundamentally reshaping the threat landscape. Partnering with George Mason allows us to build on that foundation by automating vulnerability patching, which not only strengthens security but also delivers measurable cost savings for our customers. This collaboration accelerates our mission to bring transparency, accountability, and efficiency to software development across both government and commercial sectors.”</span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> <p class="Paragraph SCXW190735760 BCX4"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">The project team will get feedback from </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock’s</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> existing customers and collaborate with CCI and the </span><a href="https://www.nvtc.org" title="NVTC"><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US">Northern Virginia Technology Council</span></a><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> to refine the solution for broader commercial adoption. Additional funding will be provided by </span><span class="TextRun SCXW190735760 BCX4 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CodeLock</span><span class="TextRun SCXW190735760 BCX4 NormalTextRun" lang="EN-US"> and supplemented through grant opportunities. </span><span class="EOP SCXW190735760 BCX4">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/ksun3" hreflang="und">Kun Sun</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="addcd760-8411-417d-bff5-264648e05587" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related News</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-07972f7250a2c5b1df73d8900265b70ee35d4cc29adcb822727b9d092520bab2"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George Mason cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-06/safeguarding-george-masons-research-and-researchers" hreflang="en">Safeguarding George Mason’s research and researchers </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">June 18, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-05/sit-stay-buzz" hreflang="en">Sit! Stay! Buzz?</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">May 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10196" hreflang="en">software</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Thu, 15 May 2025 11:27:25 +0000 Nathan Kahl 117286 at Cyber sweep: George Mason students take top three spots in national transportation cybersecurity competition /news/2025-03/cyber-sweep-george-mason-students-take-top-three-spots-national-transportation <span>Cyber sweep: George Mason students take top three spots in national transportation cybersecurity competition </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-03-27T10:42:35-04:00" title="Thursday, March 27, 2025 - 10:42">Thu, 03/27/2025 - 10:42</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US">"I'm going to teach you how to hack a modern car," said professor </span><a class="Hyperlink SCXW105000804 BCX0" href="https://cec.gmu.edu/profiles/marafin" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US">Tanvir Arafin</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US"> to the fall 2024 cohort of CYSE 465 Transportation Systems Design. </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun intro-text" lang="EN-US"> not only introduced his students to such exciting concepts in transportation security, but he also incorporated the opportunity to participate in a nationwide cybersecurity competition into his course.</span><span class="EOP SCXW105000804 BCX0 intro-text">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The entire class of 12 from the </span><a class="Hyperlink SCXW105000804 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Department of Cyber Security Engineering</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> chose to participate in the optional assignment and several won first, second, and third place at the &nbsp;</span><a class="Hyperlink SCXW105000804 BCX0" href="https://www.uh.edu/cybercare/newsevents/cyber-care-competition/" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">National Transportation Cybersecurity Competition</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> (NTCC) in November 2024. George Mason’s Finn Schaefer won first place; the team of Noor Mohammed, Sonia Shaukat, Caleb Hughston, and Kayleigh Batchos won second place; and Navraj Singh Gill won third place.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cars-1.png?itok=yaFw7tTc" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Adobe Stock</figcaption> </figure> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The national competition was open to all university students, both undergraduate and graduate, who could participate individually or in teams of up to four, guided by a faculty advisor. This year’s competition was titled “CYBER-CARE Challenge 2024: Securing the Future of Transportation.”&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Participants faced a series of cybersecurity challenges, including password cracking, traffic management system exploitation, Vigenère cipher decryption, SQL injection vulnerability identification, cross-site scripting (XSS) attacks, and vehicle trajectory anomaly detection. They had a few weeks to complete the challenges remotely.&nbsp;</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> developed CYSE 465 by integrating real-world scenarios and cutting-edge research findings from his lab. He has been working in hardware and cyber-physical systems security with a key focus on cybersecurity issues of autonomous and transportation systems. CYSE 465 covers understanding data, communication, operating systems, control, and security primitives used in today's vehicles for safe and intelligent control and navigation.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“The course offers a unique perspective on the cyber vulnerabilities that emerge from the security-oblivious modernization of transportation systems,” said </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">.&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">While he has taught the course since 2022, this was the first time he incorporated the competition into the course. </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Arafin</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> noted that such competition participation can greatly enhance students’ resumes, and first-place winner Schaefer, a busy student, greatly appreciated the chance to participate.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“This was actually the first competition that I've competed in,” he said, explaining that it’s hard to find time for such activity outside of school and work. Schaefer’s favorite challenge at the NTCC involved assessing vehicle datasets to detect problems or attacks. He drew from his personal interest in machine learning to solve the challenge.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">“I've worked with machine learning models a lot in my own personal projects, but I've never had an applicable use for it,” said Schaefer. “So, it was interesting to </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">actually see</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US"> my work have real meaning to it for once. I was able to do something </span><span class="TextRun SCXW105000804 BCX0 NormalTextRun AdvancedProofingIssueV2Themed" lang="EN-US">pretty cool</span><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">.”&nbsp;</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Through courses like CYSE 465, which bridge the gap between theoretical knowledge and practical application, the Department of Cyber Security Engineering is fostering a new generation of cybersecurity professionals who are well-equipped to secure the future of transportation systems.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">"The students’ competition performance is a very compelling argument on the benefits of bringing the results and lessons learned in the research lab directly to the classroom, something many CYSE faculty are doing," said </span><a class="Hyperlink SCXW105000804 BCX0" href="https://volgenau.gmu.edu/profiles/pcosta" target="_blank"><span class="TextRun Underlined SCXW105000804 BCX0 NormalTextRun" lang="EN-US">Paulo Costa</span></a><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">, the department's faculty chair.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW105000804 BCX0"><span class="TextRun SCXW105000804 BCX0 NormalTextRun" lang="EN-US">The achievements of George Mason students at the NTCC highlight the importance of this approach. By bringing state-of-the-art research directly to the classroom, the Department of Cyber Security Engineering is preparing students to become leaders in the field. As the cybersecurity landscape continues to evolve, the department's innovative educational strategies will ensure that its graduates are ready to meet the challenges of tomorrow.</span><span class="EOP SCXW105000804 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/marafin" hreflang="en">Tanvir Arafin</a></div> <div class="field__item"><a href="/profiles/pcosta" hreflang="und">Paulo Costa</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="21ff7f92-f193-4b04-9ccf-e546087191ad" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="c5327acb-36f8-4659-9eb8-aeee4690865b"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <p class="cta__title">Learn more about Cybersecurity at George Mason <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="6f715fa7-870b-4dd2-a905-748fddbf6156" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="20ccc63b-185d-4b0b-983c-389957a1f2fb" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-370441c920b4fc582695349f8505aa924679878d678e09c835b69ce465cac081"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George Mason turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George Mason cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10161" hreflang="en">transportation engineering</a></div> <div class="field__item"><a href="/taxonomy/term/1076" hreflang="en">Student Success</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/166" hreflang="en">innovative classes</a></div> <div class="field__item"><a href="/taxonomy/term/17356" hreflang="en">Strategic Direction</a></div> </div> </div> </div> </div> </div> Thu, 27 Mar 2025 14:42:35 +0000 Teresa Donnellan 116366 at Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 /news/2025-03/nearly-500-high-schoolers-get-expert-advice-virginia-cyberslam-2025 <span>Nearly 500 high schoolers get expert advice at Virginia CyberSlam 2025 </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-03-17T12:20:56-04:00" title="Monday, March 17, 2025 - 12:20">Mon, 03/17/2025 - 12:20</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US">Nearly 500 high school students from across the commonwealth gathered at for Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed intro-text" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun intro-text" lang="EN-US"> 2025, where cybersecurity experts from both the public and private sectors shared industry insights during a day of activities aimed at inspiring the next generation of cybersecurity professionals.&nbsp;</span><span class="EOP SCXW163820684 BCX0 intro-text">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-2.png?itok=S69YBjX3" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Dolores Garza addresses CyberSlam 2025 attendees. Photo by Teresa Donnellan/CEC</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">“</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">What an event it was March 10, with 475 students representing 22 schools and six school districts from around the commonwealth enjoying hands-on workshops and activities led by cyber experts from industry, government, and higher education,” said </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> founder Chris Starke, a teacher for Loudoun County Public Schools who co-directed the event with the University of Alabama in Huntsville’s Jennifer Marden. “In all, 28 presenters combined to run 12 workshops—6 for each of our novice and advanced students. It was truly rewarding to see students enjoy learning about cybersecurity.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Students heard from keynote speaker Dolores Garza, Branch Chief of the Technical Operations Group at the United States Marshals Service, among others. Garza oversaw the creation of a cyber investigation unit at the U.S. Marshals and described the evolution of cybersecurity as a professional field. She encouraged attendees to stay open to new technological developments and emphasized the need for a hybrid set of skills that combines criminal investigatory techniques with technical expertise.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“Diversity in technology is not just an asset; it is a necessity,” said Garza. “The more perspectives we bring to problem-solving, the stronger and more effective our solutions become.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-6.png?itok=NquBylb_" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Student navigates drone during CyberSlam 2025. Photo by Ron Aira/Office of University Branding.</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Throughout the day, professionals led hands-on workshops in various aspects of cybersecurity.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">David Raymond from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia Cyber Range</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> led a session on advanced Capture the Flag challenges, focusing on Wireshark.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">Greg Crabb</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">10-8, LLC</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, conducted a tabletop exercise on incident response and deep fake technology, and Randy Benn from </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> introduced students to the Internet of Things.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Other experts leading workshops represented </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Vertex11</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, &nbsp;OpusType Advisors, </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun CommentStart" lang="EN-US">the</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Idaho National Laboratory</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, the </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun" lang="EN-US">Drug Enforcement Administration</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><span class="FieldRange SCXW163820684 BCX0 TextRun Underlined NormalTextRun CommentStart" lang="EN-US">CYBER.ORG</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, George Mason, and </span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Shenandoah University</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, leading workshops on drones, deep fakes, digital forensics, and more.</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-03/cyberslam_2025-5.png?itok=0CrQKcAq" width="560" height="293" loading="lazy"> </div> </div> <figcaption>Students participate in a CyberSlam workshop. Photo by Ron Aira/Office of University Branding&nbsp;</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank our co-hosts, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George Mason’s Department of Cyber Security Engineering</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> and Loudoun County Public Schools, as well as the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cyberinitiative.org/about/regional-structure/northern-virginia-node.html" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Commonwealth Cyber Initiative Northern Virginia Node</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node), Virginia Cyber Range,&nbsp;Vertex11, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.caci.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CACI International Inc</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">., </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Claroty</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://codehs.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">CodeHS</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.widelity.com/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Widelity, Inc.</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and </span><a class="Hyperlink SCXW163820684 BCX0" href="https://gtedge.ai/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">GT Edge AI</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> for sponsoring this wonderful event that in four years has impacted more than 1,600 students,” said Starke. “</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun ContextualSpellingAndGrammarErrorV2Themed" lang="EN-US">And,</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> thank you to our exhibitors the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://www.cisa.gov/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Cybersecurity and Infrastructure Security Agency</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, </span><a class="Hyperlink SCXW163820684 BCX0" href="https://competitivecyber.club/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Mason Competitive Cyber</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> (MCC), </span><a class="Hyperlink SCXW163820684 BCX0" href="https://cec.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">George Mason’s College of Engineering and Computing</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, GT Edge AI, and the </span><a class="Hyperlink SCXW163820684 BCX0" href="https://va.ng.mil/Army-Guard/91st-Cyber/" target="_blank"><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US">Virginia National Guard 91</span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun Superscript" lang="EN-US"><sup>st</sup></span><span class="TextRun Underlined SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Cyber Brigade</span></a><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> <figure role="group" class="align-left"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-03/cyberslam_2025-3_0.png?itok=j-7EUDNh" width="350" height="350" loading="lazy"> </div> </div> <figcaption>CyberSlam attendees navigate drones in a workshop. Photo by Jennifer Marden</figcaption> </figure> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">One event highlight was a panel featuring George Mason students from the MCC club—Dylan Charnick, Dylan Knoff, and Danyaal </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">Shaozab</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">. MCC is known for its inclusivity, welcoming George Mason students from all majors and levels of experience. The club meets twice weekly, hosting impressive speakers, running workshops on cybersecurity skills, and forming teams to participate successfully in various CTF events throughout the year.&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">During the panel, the MCC students fielded questions from the audience about degree programs at George Mason, the benefits of technical certifications, and how to best prepare for a career in cybersecurity. “Most cyber jobs are here in the D.C. area,” noted Knoff, pointing out one benefit of pursuing cybersecurity at George Mason.</span></p> <p class="Paragraph SCXW163820684 BCX0"><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> fosters the cultivation of cybersecurity talent in Northern Virginia, where the industry is booming. This year’s event particularly underscored the opportunities in both public and private sectors that are preparing the next generation of cybersecurity professionals, ensuring they are equipped with the skills and knowledge needed to thrive in this rapidly growing field.</span><span class="EOP CommentStart SCXW163820684 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW163820684 BCX0" lang="EN-US"><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">“I would like to thank CCI </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">NoVA</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US"> Node, specifically Liza Durant and Jordan Mason for sponsoring the amazing raffle prizes and their support for the Virginia </span><span class="TextRun SCXW163820684 BCX0 NormalTextRun SpellingErrorV2Themed" lang="EN-US">CyberSlam</span><span class="TextRun SCXW163820684 BCX0 NormalTextRun" lang="EN-US">, and also George Mason’s Elizabeth Dean&nbsp;for making this event possible,” said Marden. “We could not have done this with the support of George Mason, CCI, our presenters, sponsors, and of course our wonderful Virginia cybersecurity educators and students.”</span><span class="EOP SCXW163820684 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="df8242b0-caab-447b-9b69-6f967a4432e7" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="29c404d3-7f4b-4bd9-bb7b-ead7d1d616f6"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/strengths/cybersecurity"> <p class="cta__title">Explore Cybersecurity at George Mason <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="ef2037b0-71ae-4792-ad61-df0597edd70d" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="2b541678-77ec-40ec-8ada-77de7c0e366b" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-217588d738ed6dca84d2441cff99e4c9c2ad6f07386bd0a91812835aef0afb58"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George Mason turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-07/five-george-mason-cybersecurity-students-hack-their-way-boston" hreflang="en">Five George Mason cybersecurity students hack their way to Boston </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">July 31, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/6886" hreflang="en">Department of Cyber Security Engineering</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> </div> </div> </div> </div> </div> Mon, 17 Mar 2025 16:20:56 +0000 Teresa Donnellan 116276 at Keeping data safe by keeping it separate /news/2025-02/keeping-data-safe-keeping-it-separate <span>Keeping data safe by keeping it separate </span> <span><span>Teresa Donnellan</span></span> <span><time datetime="2025-02-25T10:35:36-05:00" title="Tuesday, February 25, 2025 - 10:35">Tue, 02/25/2025 - 10:35</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Developing a robust cybersecurity system demands a lot of data, but keeping all that data in a single location introduces the risk of a data breach. Luckily, researcher </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cec.gmu.edu/profiles/zzhu24" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Zhuangdi Zhu</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US"> in the </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cybersecurity.gmu.edu/" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US">Department of Cyber Security Engineering</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun intro-text" lang="EN-US"> specializes in federated learning, a method of decentralized machine learning that allows multiple entities to collaboratively train a machine learning model without sharing their raw data.&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">Zhu is using this expertise to assist </span><a class="Hyperlink SCXW236395453 BCX0" href="https://engineering.virginia.edu/faculty/wajih-ul-hassan" target="_blank"><span class="FieldRange SCXW236395453 BCX0 TextRun Underlined NormalTextRun" lang="EN-US">Wajih Ul Hassan</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US"> of the University of Virginia develop scalable host-based intrusion detection systems (HIDS). Together, Zhu and Hassan are leveraging artificial intelligence (AI) to enhance a given host’s cybersecurity while ensuring data privacy.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">HIDS monitor and analyze the activities within a single host or device. These systems use data, such as system logs, web browsing logs, and process logs, to detect irregularities that may indicate a security threat. For example, Zhu noted, a HIDS might detect malicious software that prompts a browser to download a harmful PDF file. By identifying such irregularities, the HIDS can prevent potential security breaches. Central management of these logs through managed security service providers (MSSPs) on cloud servers, however, could potentially breach user privacy. Enter: federated learning.&nbsp;</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/small_content_image/public/2025-02/zhuangdi-zhu-profile-1x1.jpg?itok=NrcM87hF" width="350" height="350" loading="lazy"> </div> </div> <figcaption>Zhuangdi Zhu, photo provided</figcaption> </figure> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">In a federated learning system, each entity trains a local model on its own data and only shares the model updates with a central server. Local models are trained on individual datasets, and their findings are sent to a central server, Zhu explained. The server then aggregates these parameters to create a global model, which is subsequently sent back to the local models. This iterative process continues until a robust and accurate model is developed. Federated learning thus ensures sensitive data remains within the local models, addressing privacy concerns and complying with data regulations.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">The project, </span><a class="Hyperlink SCXW236395453 BCX0" href="https://cyberinitiative.org/research/funded-projects/ai-for-cybersecurity-and-cybersecurity-for-ai/secure-privacy-conscious-threat-detection.html" target="_blank"><span class="TextRun Underlined SCXW236395453 BCX0 NormalTextRun" lang="EN-US">funded by the Commonwealth Cyber Initiative</span></a><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">, is set to span one year, starting in the summer of 2025. In addition to developing a federated learning framework for HIDS, the team plans to create an open-source dataset for intrusion detection, which will serve as a valuable resource for future research and development in this field.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="TextRun SCXW236395453 BCX0 NormalTextRun" lang="EN-US">Zhu's work on decentralized machine learning not only addresses critical privacy concerns but also paves the way for more secure and efficient threat detection systems. Her work on this project represents a significant step forward in the ongoing effort to protect digital environments from evolving cyber threats.</span><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> <p class="Paragraph SCXW236395453 BCX0"><span class="EOP SCXW236395453 BCX0">&nbsp;</span></p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class="field__items"> <div class="field__item"><a href="/profiles/zzhu24" hreflang="en">Zhuangdi Zhu</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="9b556b60-0cb5-461d-b15b-bfb16c1f3d81" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="2bdbfce3-3287-4ae7-a476-2c129c5063be"> <div class="cta"> <a class="cta__link" href="https://cybersecurity.gmu.edu/"> <p class="cta__title">Learn more about George Mason's Department of Cyber Security Engineering <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="324bc1e1-71b8-466e-9505-6fd7e74443b4" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="bf299381-622f-4891-a8c0-9d3581884221" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="0a45c8f3-ab25-47e3-8fee-fe675035f3a5" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-ae4b545fa07a94ab3540118853f989c133d1eeb35d522b88aba8a2b6f27b8fd5"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/powered-ai" hreflang="en">Powered by AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 18, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/information-sciences-and-technology-instructor-patriot-through-and-through" hreflang="en">This information sciences and technology instructor is a Patriot through and through </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 15, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/dialing-new-9-1-1-training-ai" hreflang="en">Dialing up new 9-1-1 training with AI </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 9, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/mason-korea-hosts-young-innovators-summer-camp-local-youth" hreflang="en">Mason Korea hosts Young Innovators Summer Camp for local youth</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/4186" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/7006" hreflang="en">Machine Learning</a></div> <div class="field__item"><a href="/taxonomy/term/4656" hreflang="en">Artificial Intelligence</a></div> <div class="field__item"><a href="/taxonomy/term/271" hreflang="en">Research</a></div> </div> </div> </div> </div> </div> Tue, 25 Feb 2025 15:35:36 +0000 Teresa Donnellan 115901 at Cybersecurity students prepare for inaugural DistrictCon Hacker Conference /news/2025-01/cybersecurity-students-prepare-inaugural-districtcon-hacker-conference <span>Cybersecurity students prepare for inaugural DistrictCon Hacker Conference </span> <span><span>Shayla Brown</span></span> <span><time datetime="2025-01-27T12:21:53-05:00" title="Monday, January 27, 2025 - 12:21">Mon, 01/27/2025 - 12:21</time> </span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--70-30"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span class="intro-text">Students from ’s <a href="https://competitivecyber.club/" target="_blank">Competitive Cybersecurity </a>(MCC) club have dominated in multiple national competitions. The team got 1st place in the 2024 VMI CyberFusion and 2nd place in the 2024 Spring National Cyber League.&nbsp;</span></p> <p><span class="intro-text">Next, the students will be competing in the inaugural <a href="https://www.districtcon.org/" target="_blank">DistrictCon Hacker Conference on February 21-22.</a>&nbsp;</span></p> <figure role="group"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-01/danny_dylan.jpg?itok=CDMez0x4" width="560" height="382" alt="Club president Dylan Knoff working on routers. Photo provided." loading="lazy"> </div> </div> <figcaption>Club president Dylan Knoff working on routers. Photo provided.</figcaption> </figure> <p>“We'll be presenting live demos with our exploits in front of a judge and audience. So, we'll basically go from not having access to a certain device to showing that we can get access in the eight different attack vectors that we discovered,” said club president Dylan Knoff, a junior <a href="https://cs.gmu.edu/" target="_blank">computer science</a> major.&nbsp;</p> <p>This demonstration is known as the <a href="https://www.districtcon.org/" target="_blank">junkyard competition</a>, and the device they’re hacking is a router. In preparation for the demo, the team is conducting multiple analyses and rehearsing talking points for verification of their research.&nbsp;</p> <p>“We basically ripped the firmware off of it, which is the code that runs on embedded devices like this one,” said Knoff, who participated in the <a href="https://icc.ecsc.eu/" target="_blank">International Cybersecurity Championship</a> in Chile with the U.S. Cyber Team.&nbsp;</p> <p>“We utilized hardware debugging interfaces on the device to both find potential bugs by analyzing our own local copy of the firmware and confirm their existence and exploitability by trying to trigger them on the live device and utilizing the debug interface exposed,” he said.&nbsp;</p> <p>In addition to Knoff, his teammates Danyaal Shaozab and <a href="https://www.linkedin.com/in/ryan-murphy-a37435293/">Ryan&nbsp;Murphy</a> will also participate in the junkyard competition and other cybersecurity challenges including “capture the flag,” also called CTF, where the teams receive challenges, such as web app exploitation, binary exploitation, cryptography, reverse engineering, forensics, and a description that they must solve and then get a flag that is redeemed for points.&nbsp;</p> <p>In September 2023, MCC hosted its own international CTF event, attracting more than 3,000 participants and 1,600 teams as well as hosted PatriotCTF 2024 attracting over 5400 participants and 2200 teams. The club practices are offensive cybersecurity, which is a type of ethical hacking used to evaluate and determine a system’s security, Murphy explained.&nbsp;</p> <figure role="group" class="align-right"> <div> <div class="field field--name-image field--type-image field--label-hidden field__item"> <img src="/sites/g/files/yyqcgq291/files/styles/medium/public/2025-01/ryan.jpg?itok=uGweKVy2" width="315" height="560" alt="Club member Ryan Murphy working on routers. Photo provided." loading="lazy"> </div> </div> <figcaption>Club member Ryan Murphy working on routers. Photo provided.</figcaption> </figure> <p>Murphy, who transferred to George Mason from Virginia Peninsula Community College as a part of the Mason Virginia Promise, has been passionate about cybersecurity since middle school and participated in CyberPatriot, a national youth cyber education program.&nbsp;</p> <p>“I'm still pretty new at George Mason, but it's been a really good experience so far,” said Murphy, a junior <a href="https://cybersecurity.gmu.edu/" target="_blank">cyber security engineering</a> major. “I got involved with the club from the get- go because they're a bunch of like-minded people and I’m really grateful for the opportunities the club and the university have offered me.”</p> <p>The team will have two time slots and two presentations. They plan to do a dry run the day before the conference, as well as more analysis to solidify the information, said Murphy.&nbsp;</p> <p>Shaozab is currently working as an associate vulnerability researcher at TFP0 Labs, a Reston-based security research firm. Shaozab’s role entails finding and exploiting vulnerabilities of various security systems and he compares his professional responsibilities to that of his club and school assignments.&nbsp;&nbsp;</p> <p>“Working with Dylan and Ryan is great. We all have similar career goals, and it makes projects and assignments a lot easier,” said Shaozab, who is a senior cyber security engineering major.&nbsp;</p> <p>Shaozab credits his courses, including CYSE 465 Transportation Systems Design, for helping him prepare for the upcoming competition.&nbsp;&nbsp;</p> <p>“<a href="https://cybersecurity.gmu.edu/profiles/marafin" target="_blank">Dr. [Tanvir] Arafi</a> is a very smart professor and a very talented individual in this field. His course really helped me hone my cyber techniques,” he said.&nbsp;&nbsp;</p> <p>Shaozab explained that the team is focused on exploiting the [Control Area Network] bus, which is like the nervous system of a vehicle, allowing different components like the engine, brakes, and doors to communicate with each other. “Exploiting it involves sending malicious messages in the CAN bus to manipulate the car's function, such as unlocking doors or starting the engine,” he said.&nbsp;</p> <p>“What made this particularly interesting to me is that I'm a huge car enthusiast, so being able to merge my passion for cars and cybersecurity was a unique experience. Getting hands-on with that in a classroom setting made it even more engaging. It’s rare to get that kind of knowledge taught in schools,” he said.&nbsp;</p> </div> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="df38375b-4533-4bfd-a9d3-27a129cc934a" class="block block-layout-builder block-inline-blocktext"> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="2b035e8b-3645-45b5-8dda-6d1307989667"> <div class="cta"> <a class="cta__link" href="https://cec.gmu.edu/"> <p class="cta__title">Learn more about George Mason's College of Engineering and Computing <i class="fas fa-arrow-circle-right"></i> </p> <span class="cta__icon"></span> </a> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="addaca1f-0277-41cf-87f4-c32db70bfdaa" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>&nbsp;</p> <p>&nbsp;</p> </div> </div> <div data-block-plugin-id="inline_block:news_list" data-inline-block-uuid="d7972315-0a34-4ca2-9cbe-f35d15c10356" class="block block-layout-builder block-inline-blocknews-list"> <h2>Related Stories</h2> <div class="views-element-container"><div class="view view-news view-id-news view-display-id-block_1 js-view-dom-id-1c16bf78c1bf9f48c38ddbbe3868fd2d610d74f055dc7401b4a055bb6924760f"> <div class="view-content"> <div class="news-list-wrapper"> <ul class="news-list"> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-09/george-masons-chief-information-security-officer-protects-keys-kingdom" hreflang="en">George Mason’s Chief Information Security Officer protects the keys to the kingdom</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">September 4, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/cybersecurity-student-hopes-use-his-powers-good" hreflang="en">Cybersecurity student hopes to use his powers for good </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 29, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/bluetooth-blues-george-mason-turns-bug-big-win" hreflang="en">Bluetooth blues? George Mason turns a bug into a big win </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 20, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/ais-blind-spots-one-phd-students-clear-vision" hreflang="en">AI’s blind spots, one PhD student’s clear vision </a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> <li class="news-item"><div class="views-field views-field-title"><span class="field-content"><a href="/news/2025-08/one-tiny-flip-opens-backdoor-ai" hreflang="en">One tiny flip that opens a backdoor in AI</a></span></div><div class="views-field views-field-field-publish-date"><div class="field-content">August 12, 2025</div></div></li> </ul> </div> </div> </div> </div> </div> <div data-block-plugin-id="inline_block:text" data-inline-block-uuid="4f2aa54e-4966-41b0-894e-917da46cd74c" class="block block-layout-builder block-inline-blocktext"> <div class="field field--name-body field--type-text-with-summary field--label-hidden field__item"><p>&nbsp;</p> <p>&nbsp;</p> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class="field__items"> <div class="field__item"><a href="/taxonomy/term/3071" hreflang="en">College of Engineering and Computing</a></div> <div class="field__item"><a href="/taxonomy/term/3056" hreflang="en">Cybersecurity</a></div> <div class="field__item"><a href="/taxonomy/term/10431" hreflang="en">Mason Competitive Cyber</a></div> <div class="field__item"><a href="/taxonomy/term/15796" hreflang="en">Mason Virginia Promise</a></div> <div class="field__item"><a href="/taxonomy/term/336" hreflang="en">Students</a></div> <div class="field__item"><a href="/taxonomy/term/4066" hreflang="en">Tech Talent Investment Program (TTIP)</a></div> </div> </div> </div> </div> </div> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div> </div> <div> </div> </div> Mon, 27 Jan 2025 17:21:53 +0000 Shayla Brown 115461 at