X

News and Events

 Recent public activities of Center for Information Assurance (CfIA)

  • Dr. Harkeerat Singh Bedi gave a talk about research and industry experience at Verizon Digital Media Services at FIT 324 on 30th March 2018.
  • Dr. Bashir Morshed gave a presentation on  "Inkjet-printed Body-worn Fully-passive Wireless sensors for Smart and Connected Community" at FIT 324 on 17th of November, 2017. "This NSF funded project aims to develop a new class of battery-less, low-cost, disposable, wireless electronic patch sensors to capture a variety of physiological signals that allows monitoring of their health status through a custom smartphone app and enables sharing of their anonymized health-related events-of-interest towards a smart and connected community."
  • Prof. German Hernandez gave a presentation on "Algorithmic Trading Using Deep Neural Networks on High Frequency Data" at FIT 324 on 3rd of November, 2017.  In this talk, a high-frequency trading strategy using Deep Neural Networks (DNNs) was presented.
  • Prof. Dipankar Dasgupta gave a presentation on "How to do PhD research?" at FIT 324 on 3rd of November, 2017. The talk was focused on ways for effective PhD research.
  • Prof. German Hernandez gave a presentation on "Crowd-sourced hedge funds are leveling Wall Street's playing field making algorithmic trading accessible and easy for everyone" at FIT 324 on 20th October, 2017.  The talk focused on what is algorithmic trading and how crowd-sourced hedge funds are leveling Wall Street's playing field making algorithmic trading accessible and easy for everyone. He also gave a review on how Quantopian, the most popular of these crowd-sourced hedge funds work.
  • Prof. Dipankar Dasgupta gave a presentation on "Research Methods" at FIT 324 on 6th of October, 2017. The talk was focused on writing effective CS research papers.
  • Shannon Gayle Perry gave a presentation on "Target Audience" at FIT 324 on 27th of September, 2017. The talk was about effective writing for a target audience, including how to identify and tailor your writing to meet the needs of that audience.
  • Prof. Dipankar Dasgupta gave a presentation on "Use of A-MFA in Blockchain for Healthvcare" at FIT 324 on 13th of September, 2017. The Adaptive Multi-factor Authentication (A-MFA) framework identifies authorized users through an active authentication process using passwords, biometrics, cognitive behavior and other factors. The talk focused on how A-MFA could be used in Blockchain for Healthvcare.
  • Carolyn L Treadwell-Butler gave a presentation on "508 Compliance" at FIT 324 on 11th and 16th of August, 2017. 508 Compliance includes standards to be followed so that all users can access technology regardless of disability status.
  • Berkeley Willis gave a presentation to the Game Design Camp students on current CfIA projects. The event took place at FIT 324 on July 10, 2017.

Research presentations delivered by CfIA members

Time and location (Year-2018) 

Presenter  

Topic

Description

October 26, 3:00 pm - 4:00 pm, FIT 324
Dr. Zahid Akhtar Momin
Audio-visual information fusion for laughter detection in videos
Talk about techniques for audio-visual information fusion for laughter detection in videos.
September 28, 3:00 pm - 4:00 pm, FIT 324
Saurabh Pahune
Negative Representation of Information
Talk about different schemes for negative selection algorithm, negative database and negative survey.
September 7, 3:00 pm - 4:00 pm, FIT 324
Subash Poudyal
Basic Static Malware Analysis
Talk focuses on the structure of executable and some static ways to analyze the malware
August 31, 3:00 pm - 4:00 pm, FIT 324
Dr. Zahid Akhtar Momin
Security of Person Identification Systems against Spoofing Attacks
Discussion about biometric spoofing attacks and their countermeasures.
August 24, 3:00 pm - 4:00 pm, FIT 324
Kishor Datta Gupta
Network Security of Internal Medical Device using Bluetooth Low Energy
Remotely communicate a internal medical device is a challenge due to use of low power and high security measure requirement, a trade off and separation of access control implementation for internal medical device case study will be discussed
August 16, 3:00 pm - 4:00 pm, FIT 324
Sharmin Afroz
IoT Security with ML/DL algorithm
Increasing security risks in IoT systems and detecting threats/attack into IoT device with traditional machine learning algorithm and recent deep learning algorithm.
April 20, 3:00 pm - 4:00 pm, FIT 324
Kishor Datta Gupta
Tangle: An Alternative to Block Chain For Future of Crypto Currency
Analysis of current blockchain based crypto currency limitations and opportunities of tangle based technology.
April 13, 3:00 pm - 4:00 pm, FIT 324
Jon Walter Cobb, Coby Braden Glass
Team Experience at DOE Cyber Defense competition
Members of the winning team from the DOE Cyber Defense competition talked about the competition and shared their experiences.
March 2, 3:30 pm - 4:00 pm, FIT 324
Carrie Horn Atkins
Forensics Exercise
Each exercise contains scenario, objective and steps to complete the exercise.
March 2, 3:00 pm - 3:30 pm, FIT 324
Subash Poudyal
Identity Management in Browser
How web browsers work to manage Identity and Privacy?
Feb 23, 3:30 pm - 4:00 pm, FIT 324
Jon Walter Cobb
Puzzle based learning
Demo on Puzzle based learning project showing different encryption techniques.
Feb 23, 3:00 pm - 3:30 pm, FIT 324
Coby Braden Glass
Ransomware Simulation
The demo included different scenarios of Ransomware attack and prevention techniques.
Feb 16, 3:30 pm - 4:00 pm, FIT 324
Kishor Datta Gupta
Evaluation of different news detection techniques compare to adaptive reviewer rating based method
Comparison between different fake news detection methodology with reviewer based fake news detection technique where reviewer select by artificial intelligence and biasness of reviewer rating also measured.
Feb 16, 3:00 pm - 3:30 pm, FIT 324
Ayushi Mehta
Blockchain
The talk was on technical details of Blockchain technology.
Feb 9, 3:00 pm - 4:00 pm, FIT 324
Daya Ram Budhathoki
Financial Data Analysis
The talk focused on analysis of Financial data.
Feb 2, 3:00 pm - 4:00 pm, FIT 324
Peyton Warren
Understanding Ransomware
The presentation focused on Ransomware simulation.
Jan 26, 3:00 pm - 3:30 pm, FIT 324
Kishor Datta Gupta
An Adaptive Tool to Selection of Appropriate Developer for Code Review based on Code Context
An adaptive way to select reviewer set from all the reviewers based on their availability, quality, and familiarity with the code. A consensus model based on the neural network to merge the reviewer's decision and provide a review output.
Jan 26, 3:30 pm - 4:00 pm, FIT 324
Sajib Sen
A Crowdsourcing Review Technique to Prevent Spreading FAKE News
An intelligent vetting process to learn decisions on the authenticity of News content.
(Year-2017)
     
Dec 15, 3:00 pm - 4:00 pm , FIT 324
Kul Prasad Subedi
Ransomware Detection using Data Mining Approach by Leveraging Reverse Engineering
The talk focused on Ransomware detection using data mining approach.
Nov 10, 3:00 pm - 4:00 pm , FIT 324
John M Shrein
Fingerprint classification using convolutional neural networks and ridge orientation images
How convolutional neural nets can be used to solve the fingerprint classification problem efficiently and accurately using image representations of fingerprint ridge orientations?
Oct 13, 3:00 pm - 4:00 pm , FIT 324
Subash Poudyal
NS-3 Simulation
Network Simulator-3 provides simulation platform for networking research and education.
Sep 29, 3:00 pm - 4:00 pm , FIT 324
Daya Ram Budhathoki
Association Rules using Apache Spark
Association rules are used in order to
discover frequent patterns hiding in big datasets.
Sep 22, 3:00 pm - 4:00 pm , FIT 324
Senjuti Dutta   
Computer Aided Diagnosis on Ultrasonographic Images Using Clustering Techniques
Identification of fatty part and normal part of human liver images by making clusters from USG(Ultrasonographic )Images based on unsupervised learning algorithms.
Sep 15, 3:00 pm - 4:00 pm , FIT 324
Sajib Sen
Battery Less Solar Power Controller
A Solar power controller capable of driving load at constant power without any storage device and irrespective of solar radiance variation.
Sep 8, 3:00 pm - 4:00 pm , FIT 324
Kishor Datta Gupta
Faster high density monochromic QR-codes with reduced error rate
A backtracking approach to recover bits in damaged QR code and a new proposed QR code which has better performance in distortion issues.
Sep 1, 3:00 pm - 4:00 pm , FIT 324
Berkeley Willis/Robert Edstrom
Red Team - Raining Shells in Pentestit
Delve into the Red Team perspective with Berkeley and Robert when they present walkthroughs for Pentestit labs, where the ultimate goal is to take control of the Sub-domain admin account.
Aug 25, 3:00 pm - 4:00 pm, FIT 324
McKittrick Swindle
NextCloud Document Storage
Using NextCloud to upload documents and manage versioning of projects.
Aug 18, 3:00 pm - 4:00 pm, FIT 324
Ayushi Mehta
Cryptocurrency using Blockchain
Cryptocurrency is a digital currency for secure transaction using cryptography.
Aug 11, 3:30 pm - 4:00 pm, FIT 324
Peyton Warren
Ransomware Game
Ransomware game presents a different way of learning about Ransomware attack and prevention.

 

Time and location: July 28, 2017, 3:00PM, FIT 324
Presenter: Daya Ram Budhathoki
Topic: Big Data Analysis with Apache Spark

Time and location: July 21, 2017, 3:00PM, FIT 324
Presenter: Clifford Montjoy
Topic: SGX and its applications

Time and location: July 14, 2017, 3:00PM, FIT 324
Presenter: John M, Shrein
Topic: Deep Learning

Time and location: July 7, 2017, 3:00PM, FIT 324
Presenter: Anjana Tiha
Topic: Financial data

Time and location: June 15, 2017, 3:00PM, FIT 324
Presenter: Irfanur Rahman
Topic: Cyber Identity and Authentication(CIAA) module scenarios

Time and location: June 9, 2017, 3:00PM, FIT 324
Presenter: Subash Poudyal
Topic: WannaCry Ransomware

Time and location: June 9, 2017, 3:00PM, FIT 324
Presenter: Raasi Manasa Annavajjala
Topic: Certificate search algorithm

Time and location: June 2nd, 2017, 3:00PM, FIT 324
Presenter: Peyton Warren
Topic: Ransomware Simulation

Time and location: May 26th, 2017, 3:00PM, FIT 324
Presenter: Robert Edstrom/Berkeley Willis
Topic: Programming of PBL 2.0

Time and location: May 12th, 2017, 3:00PM, FIT 324
Presenter: Daya Ram Budhathoki/Kul Prasad Subedi
Topic: Ransomware Defense

Time and location: Feb 24th, 2017, 3:00PM, FIT 324
Presenter: Robert Edstrom
Topic: Phishing: Phase 1 - Reconnaissance.

Time and location: March 17th, 2017, 3:00PM, FIT 324
Presenter: Adithya K Murthy
Topic: Efficiently process data generated from IoT using Hadoop.

Time and location: March 24th, 2017, 3:00PM, FIT 324
Presenter: Dr. Kan Yang (Assistant Professor, Department of Computer Science)
Topic: Secure and Scalable Data Outsourcing in the Public Cloud.

Time and location: March 31st, 2017, 3:00PM, FIT 324
Presenter: Vamsi Krishna Polam
Topic: Mobile device security and Privacy.

Time and location: April 7th, 2017, 3:00PM, FIT 324
Presenter: Subash Poudyal
Topic: Literature review of web security.

Time and location: April 14th, 2017, 3:00PM, FIT 324
Presenter: Ayushi Mehta
Topic: Blockchain--- technical details, potential uses and security risks.

 Nulltester meeting (our group for cyber defense competition on the behalf of UofM)

Tuesday: 3:00PM-5:00PM, FIT 324
Thursday: 3:00PM-5:00PM, FIT 324
Friday: 10:20AM-12:00PM, FIT 324

 Guest speaker (joint event between CfIA and Department of Computer Science)

Time and location: Feb 17th, 2017, 12:30 pm, Dunn Hall 351
Presenter: John Hamilton, Jr., Professor, Computer Science and Engineering Department, Mississippi State University
Topic: Simulation Security - "What if a Simulation is Too Good?"

Abstract:
The need for simulation software vulnerability assessment is being driven by three major trends: increased use of modeling and simulation for training and operational planning; increased emphasis on coalition warfare and interoperability and finally increased awareness of the potential security risks inherent in sharing operationally useful software. This presentation will describe in an unclassified manner the process developed by Dr. Hamilton and the Missile Defense Agency to evaluate potential vulnerabilities in shared simulation software.

Research presentations delivered by CfIA members

Time and location: Feb 10th, 2017, 3:00PM, FIT 324
Presenter: Berkeley Willis
Topic: How to solve the challenges in the computer hacking competition.

Time and location: Feb 17th, 2017, 3:00PM, FIT 324
Presenter: McKittrick Swindle
Topic: Linux encrypted containers, variants, and their usages in systems administration.

Nulltester meeting (our group for computer hacking competition on the behalf of UofM)

Feb 9th, 2017, 3:00PM, FIT 324
Feb 10th, 2017, 10:20AM, FIT 324
Feb 14th, 2017, 3:00PM, FIT 324
Feb 16th, 2017, 3:00PM, FIT 324
Feb 17th, 2017, 10:20AM, FIT 324

Computational Intelligence in Cyber Security

Organize a Symposium on Computational Intelligence in Cyber Security (CICS) at IEEE Symposium Series on Computational Intelligence (SSCI), December 6-9, 2016 at Athens, Greece

Ransomware Workshop by FBI

FBI Sponsored Ransomware Symposium (at FIT on August 22nd) from 1PM to 3PM, register at here

NCPC Annual Report

Click here to view

AnnounceMent:

Research Assistant Professor Position (in Cyber Security) Available

Invited talk at syracuse university

Posted on 2015-30-11

Prof. Dasgupta has been invited to give a talk next week on Adaptive Multi-Factor Authentication at the Department of Electrical Engineering and Computer Science and CASE Center, Syracuse University, November 18, 2015.

Latest FIT Training & Events

Posted on 2015-30-11

 

Cybersecurity Lightning Talks

Date: December 3rd, 2015
Time: 3pm - 6pm
Place: FedEx Institute of Technology, Fishbowl

Please join us for an evening of cybersecurity research project presentations with special guest speaker: Special Agent Tim Marsh of the Memphis FBI Division.
RSVP Required: There is no cost to attend, but please RSVP to : Tammy Alexander x1589 tlxander@memphis.edu

Cybersecurity Certificate Course

Date: February 1-5, 2016

This foundational program in cybersecurity is designed to cover the fundamentals of cybersecurity and cybersecurity vulnerabilities (IT background required).
Click for more info and to register

CfIA Receives Cyber Security Training Grant from FEMA

Posted on 2015-30-11

The Federal Emergency Management Agency (FEMA) has awarded a 2015 Continuing Training Grant of $3 million for cyber security training to the National Cybersecurity Preparedness Consortium (NCPC). The project will be led by the University of Arkansas Criminal Justice Institute; the University of Memphis Center for Information Assurance (CfIA) will collaborate on the project as a core member of the consortium.

This Homeland Security National Training Program (HSNTP) will provide FEMA-certified training to first responders, emergency managers, technical specialists, and local government and community leaders, preparing them for all types of cyber emergencies.

The University of Memphis is at the forefront of information security research, education, and outreach in the region, according to Dr. Dipankar Dasgupta, founding director of CfIA, which is a National Center for Academic Excellence in Information Assurance. "The center will receive $474,000 from the consortium, and though this grant we will be developing an online training course on mobile device security and privacy issues. The course will make it safer for everyone browsing the Internet," he said.

The 36-month program focuses on four areas: cyber security, hazardous materials, countering violent extremism and rural preparedness. Rural preparedness includes school-based incidents, mass fatality planning and response, the development of emergency operation plans, rail car safety, media engagement strategies for first responders, agro-terrorism, food and animal safety, and hazardous materials.

STL-CyberCon 2015

Posted on 2015-30-11

Prof. Dasgupta gave keynote speech at St. Louis at Cyber Security workshop (STL-CyberCon), University of Missouri-St. Louis, November 20, 2015.

NICE Conference & Expo 2015

Posted on 2015-30-11

Prof. Dasgupta attended the NIST-NICE conference at San Diego from November 1-4, 2015.

CYBER SECURITY SUMMIT 2015 Summary

Posted on 2015-17-11

The University of Memphis, FedEx Institute of Technology, hosted the Mid-South Cyber Security Conference on Friday, October 16, 2015. Details about the event are in the following link:

Cyber Security Summit 2015 Event 

 

Student Team Wins 2nd Place at Cyber Defense Competition


Posted on 2015-11-11

A team of four Computer Science students recently won second place in the prestigious CANSec Cyber Defense Competition, held in Little Rock on Oct. 24. The competition is held annually as a part of the CANSec workshop (formerly KanSec), which has brought together researchers and practitioners in networking and security related fields since Spring 2012.

UofM TeamThe students competed against Cyber Security teams from several other universities across the U.S. before winning second place in the day-long competition. The goal of the competition was to provide students with a platform to apply theoretical knowledge into practice, and to obtain hands-on cyber security experience. During the competition, the teams were asked to oversee a small corporate network, to manage all critical services, and to defend against external attacks.

The U of M winning team included two graduate students (Kul Subedi, Sujit Shrestha) and two undergraduates (Robert Edstrom, Nick Gordon), all of whom are involved with the Center for Information Assurance. "It was a valuable experience, and one I'm very glad to have been a part of," said Robert Edstrom. "I think we all learned a great deal from working as a team."

The team also participated and performed well in the CyberSEED national cyber security competition, held at UConn on Oct. 29-30.

Cyber Security Summit

The University of Memphis Center for Information Assurance would like to cordially invite you to The Cyber Security Summit. This year's summit is being held on October 16, 2015 at The University of Memphis FedEx Institute of Technology. Topics such as health information security, cloud security, cyber crime, and many more will be discussed by keynote speakers. Information Assurance and Cyber Security experts will be onsite for presentations and networking to address current issues of cyber security. To learn more about the annual Mid-South Cyber Security Summit, click the following link:

http://cybersummit.memphis.edu

UofM Redesignated as National Center of Academic Excellence in Cyber Defense Research

March 23, 2015 - The University of Memphis has been re-designated as a National Center of Academic Excellence in Cyber Defense Research (CAE-R) through academic year 2021 by the National Security Agency and the U.S. Department of Homeland Security.

“This is a great honor for the University, and for the University’s Center for Information Assurance (CfIA) as well,” said Dr. Dipankar Dasgupta, professor of computer science and founding director of the CfIA.

At the forefront of research, education, and outreach on Information Assurance (IA) in the region, the Center for Information Assurance was established in 2004 through the collaboration of the Computer Science, Management Information Systems, Electrical Engineering and Criminology and Criminal Justice departments, as well as partnerships with community colleges focusing on cyber security and IA-related topics.

The Center is active in the advancement of IA education on campus and throughout the region, focusing on issues that threaten our nation’s critical infrastructure, and working toward providing solutions that enhance both local and national cyber security efforts.

The UofM will accept the certification at the 19th Annual Colloquium for Information Systems Security Education (CISSE) in Las Vegas in June.

UofM Redesignated as Center of Academic Excellence in Information Assurance

August 8, 2014 - In the battle to combat hackers, viruses and other security issues, the University of Memphis is at the center of the national effort to secure cyberspace. The University has been re-designated by the National Security Agency and the U.S. Department of Homeland Security as a National Center of Academic Excellence in Information Assurance Education. The designation covers academic years 2014-2021.

The certification was presented to the UofM’s Center for Information Assurance (CfIA) recently at the Colloquium for Information Systems Security Education in San Diego.

Directed by Dr. Dipankar Dasgupta, professor of computer science, and Dr. Judith Simon, professor of management information systems, the Center develops educational tools, programs and training for the Mid-South. By offering information assurance courses and hosting workshops for the students and professionals, including police and other law enforcement officials, the CfIA is working to create a future of secure online commerce and a safe computing environment.

The Center also contributes to the community by training local educators at all levels to serve their students better. This summer Dasgupta received a National Science Foundation grant for a project to develop innovative “puzzles” that use specialized software to help community college students learn the concepts of and approaches to cybersecurity.

More information is available online at http://cfia.memphis.edu.