Cybersecurity Awareness Month https://ece.sitemasonry.gmu.edu/ en Commonwealth Cyber Initiative CATAPULT fund launches translational research projects https://ece.sitemasonry.gmu.edu/news/2022-10/commonwealth-cyber-initiative-catapult-fund-launches-translational-research-projects <span>Commonwealth Cyber Initiative CATAPULT fund launches translational research projects</span> <span><span lang="" about="/user/291" typeof="schema:Person" property="schema:name" datatype="" content="4429684e-ae8d-405e-870a-3b7aefe68162 (Martha Bushong)">4429684e-ae8d-…</span></span> <span>Thu, 10/06/2022 - 14:18</span> <div class="layout layout--gmu layout--twocol-section layout--twocol-section--30-70"> <div class="layout__region region-first"> <div data-block-plugin-id="field_block:node:news_release:field_associated_people" class="block block-layout-builder block-field-blocknodenews-releasefield-associated-people"> <h2>In This Story</h2> <div class="field field--name-field-associated-people field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">People Mentioned in This Story</div> <div class='field__items'> <div class="field__item"><a href="/profiles/ldurant2" hreflang="und">Liza Wilson Durant</a></div> </div> </div> </div> <div data-block-plugin-id="inline_block:call_to_action" data-inline-block-uuid="90e15bd6-772b-4e20-ba74-f53e2bac4044"> <div class="cta"> <a class="cta__link" href="https://cyberinitiative.org"> <h4 class="cta__title">Learn About the CCI <i class="fas fa-arrow-circle-right"></i> </h4> <span class="cta__icon"></span> </a> </div> </div> </div> <div class="layout__region region-second"> <div data-block-plugin-id="field_block:node:news_release:body" class="block block-layout-builder block-field-blocknodenews-releasebody"> <div class="field field--name-body field--type-text-with-summary field--label-visually_hidden"> <div class="field__label visually-hidden">Body</div> <div class="field__item"><p><span><span><span><span>As researchers and their teams work to answer questions and find solutions for protecting privacy and securing information through cybersecurity innovation, many set their sights on commercialization. Still, the path from research ideas to consumer products can be long and winding. To help straighten the path the Commonwealth Cyber Initiative (CCI) is supporting a Cyber Acceleration, Translation, and Advanced Prototyping for University Linked Technology (CATAPULT) Fund. The fund’s purpose‑‑advance collaborative translational research projects among CCI partners, to speed up the progress of academic research outcomes to the marketplace. </span></span></span></span></p> <p><span><span><span>"It is truly exciting to tap into the breadth of innovation from academic institutions across the Commonwealth and introduce these faculty inventors to the opportunity to expand the impact of their research through commercialization,” says Liza Wilson Durant, associate dean, strategic initiatives and community engagement, College of Engineering and Computing. “It is just the right time for Virginia to support and accelerate cybersecurity innovation as the Commonwealth establishes its role as a magnet for new companies with the best and brightest solutions to the nation's greatest cybersecurity challenges."</span></span></span></p> <p><span><span><span><span>In July 2022 CCI awarded seven teams from four universities in the Northern Virginia Node funding for their projects. These research teams received up to $50,000, with funding increments released based on the achievement of agreed-upon milestones. The teams and their projects are as follows.</span></span></span></span></p> <p><span><span><strong><span><span>Protecting Smartphones from Fingerphoto Spoofing</span></span></strong></span></span><br /><span><span><span><span><a href="https://gmu.edu" title="Mason">George Mason University</a> Assistant Professor <a href="https://volgenau.gmu.edu/profiles/emarasco" title="Marusco profile">Emanuela Marasco’s</a> </span></span><span><span>the project addresses the urgent need for a mechanism that properly secures smartphone technology. Contactless fingerprint authentication allows faster capture times, unattended operations, and high hygiene. These systems, however, are still in the early stages of development. Although researchers are advancing matching, the risk of spoofing for contactless authentication must be mitigated as well. This project addresses the problem.</p> <p><strong>Distributed Online Intrusion Detection System for IoT devices via Power Side-channel Auditing  </strong></span></span></span></span><br /><span><span><span><span>As the number of Internet of Things (IoT) devices has increased rapidly, IoT botnets and information stealer attacks have exploited the vulnerabilities of IoT devices. It is still challenging, however, to detect the initial intrusion on IoT devices before massive attacks. Professor Gang Zhou,</span></span><span><span> from the College of William &amp; Mary, </span></span><span><span>and his partners at Old Dominion University are addressing the challenge of the lack of accurate models in real-time for ubiquitous attack detection with their project.</p> <p><strong>Algorithm Evaluation for Backdoor Detection and Mitigation in Remote Sensing Systems</strong></span></span></span></span><br /><span><span><span><span>Artificial Intelligence (AI) technology has advanced to the point that it is inescapable in life and work. AI models extract knowledge from data to make decisions. Though AI has achieved state-of-the-art performances for many applications, it can be easily deceived by the backdoor attack.<strong> </strong><a href="https://odu.edu" title="Old Dominion University">Old Dominion University</a></span></span><span><span><strong> </strong>Professor<a href="https://www.odu.edu/directory/people/j/jli" title="Jang Li"> Jiang Li</a> </span></span><span><span>and his partners at <a href="https://maxar.com" title="Maxar">Maxar’s</a> </span></span><span><span>project leverages a novel approach to addressing this concern.</span></span></span></span><br />  </p> <p><span><span><strong><span><span>RF Fingerprinting Techniques for Millimeter-Wave Device Authentication in 5G/NextG Wireless Communication</span></span></strong><br /><span><span>Millimeter-wave (mmWave) technology is a key enabler for 5G and NextG wireless communications as it supports applications that require high-throughput and ultra-low latency. Due to the broadcast nature of the wireless medium, however, mmWave communication is vulnerable to various attacks. With this project <a href="https://volgenau.gmu.edu/profiles/kzeng2" title="Kai Zang">Kai Zeng,</a> </span></span><span><span>associate professor, George Mason University</span></span><span><span> and his team aim to develop robust and efficient techniques to address these vulnerabilities.</p> <p><strong>Extended Reality Empowered 5G Telemedicine Mentoring</strong> </span></span></span></span><br /><span><span><span><span>Old Dominion University</span></span><span><span> Associate Professor <a href="https://ww2.odu.edu/~sshetty" title="Shetty">Sachin Shetty</a>’s</span></span><span><span> project looks at the development and commercialization of a 5G telemedicine platform that leverages Extended Reality technologies and a 5G environment. Because 5G technology supports massive capacity connections and fast data rates it has the potential to transform healthcare training and service delivery. One example, 5 G-enabled telemedicine, connects remotely located medical providers and allows access to near real-time data, and permits split-second decision-making critical in health care environments.</span></span></span></span></p> <p><span><span><span><span><strong>Super Timelines</strong><br /> When a cybersecurity incident occurs, analysts need to quickly construct a forensic timeline of events to assess the impact and plan the response. This effort typically involves extracting logs and other artifacts from various sources and then combining them into a single list, ordering them by date and time. Only then can an analyst look for clues to help better understand the course of events before, during, and after the incident. With Super Timelines, Florian Buchholz, </span></span><span><span>professor at <a href="https://jmu.edu" title="James Madison University">James Madison University</a>,</span></span><span><span> and his partners at Gigasheet (https://www.gigasheet.com) will develop a turnkey solution for this problem, based on a modern cloud-based infrastructure.</span></span></span></span></p> <p><span><span><span><span>“Without this funding from CCI, the research and start-ups that are so critical to Virginia’s strategy of building a high-impact cyber economy would not have the opportunity to meet the wonderful members of the tech community who have rallied around them to provide advice, guidance, and structure to launching new products and companies,” says Associate Vice President of the Office of Research Innovation and Economic Development, at George Mason University, Paula Sorrell.</span></span></span></span></p> </div> </div> </div> <div data-block-plugin-id="field_block:node:news_release:field_content_topics" class="block block-layout-builder block-field-blocknodenews-releasefield-content-topics"> <h2>Topics</h2> <div class="field field--name-field-content-topics field--type-entity-reference field--label-visually_hidden"> <div class="field__label visually-hidden">Topics</div> <div class='field__items'> <div class="field__item"><a href="/taxonomy/term/526" hreflang="en">Commonwealth Cyber Initiative (CCI)</a></div> <div class="field__item"><a href="/taxonomy/term/921" hreflang="en">Cybersecurity Awareness Month</a></div> <div class="field__item"><a href="/taxonomy/term/926" hreflang="en">Cybersecurity Research</a></div> <div class="field__item"><a href="/taxonomy/term/956" hreflang="en">Information Sciences and Technology Department</a></div> <div class="field__item"><a href="/taxonomy/term/1321" hreflang="en">CEC faculty research</a></div> </div> </div> </div> </div> </div> Thu, 06 Oct 2022 18:18:33 +0000 4429684e-ae8d-405e-870a-3b7aefe68162 (Martha Bushong) 776 at https://ece.sitemasonry.gmu.edu