A conference paper published in IEEE Xplore entitled, “Interfacing Computing Platforms for Dynamic Control and Identification of an Industrial KUKA Robot Arm” has been published by Assistant Professor Nathir Rawashdeh, Applied Computing.
In this work, a KUKA robotic arm controller was interfaced with a PC using open source Java tools to record the robot axis movements and implement a 2D printing/drawing feature.
The paper was presented at the 2020 21st International Conference on Research and Education in Mechatronics (REM). Details available at the IEEE Xplore database.
Associate Professor Guy Hembroff, director of Michigan Tech’s Health Informatics graduate program, presented an invited virtual talk to physicians, residents, and medical students at the Bahiana Medical School, Salvador, Brazil, on September 25, 2020.
Hembroff spoke about, “The Challenges and Opportunities of Artificial Intelligence in Disease Prevention and Monitoring.”
BAHIANA (Bahia School of Medicine and Public Health) is a private, nonprofit, educational, cultural, scientific and healthcare institution. Its main purpose is “teaching, research and the spread of knowledge and special services in the fields of health, science and culture in general.” Learn more here.
The MTU RedTeam ranked 13th out of 162 teams in a recent 24-hour Cybar OSINT Capture The Flag (CTF) cybersecurity competition. The team finished tied for 5th place, having completed all the challenges presented by the competition.
Students on the team were Trevor Hornsby (Software Engineering), Shane Hoppe (Computer Science), Matthew Chau (Cybersecurity), Steven Whitaker (Electrical Engineering), and Sankalp Shastry (Electrical Engineering).
Professor Yu Cai, Applied Computing, and Assistant Professor Bo Chen, Computer Science, are advisor and co-advisor of RedTeam, respectively.
RedTeam promotes a security-driven mindset among Michigan Tech students and provides a community and resource for those wishing to learn more about information security. The RedTeam competes in National Cyber League (NCL) competitions, a great way for students to gain competency in cybersecurity tools and boost their resumes.
RedTeam is on Slack at mturedteam.slack.com. Interested students can sign up with a Michigan Tech email. View past RedTeam presentations here.
This OSINT CTF is non-theoretical and contestants work in teams of up to four members to crowdsource the collection of OSINT to assist law enforcement in generating new leads on missing persons.
The contest runs as a Capture the Flag (CTF) format where contestants must collect various “flags” which equate to points. Since the each flag submitted is treated as potential “net new intelligence”, Trace Labs has a team of volunteers known as “Judges” who validate each submission and award points if the flag meets the category requirements. At the end of each CTF, the team with the most points on the scoreboard wins.
College of Computing Assistant Professor Bo Chen, Computer Science, and his graduate students presented two posters at the 41st IEEE Symposium on Security and Privacy, which took place online May 18 to 21, 2020.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
Chen leads the Security and Privacy (SnP) lab at Michigan Tech. He is a member of Michigan Tech’s Institute of Computing and Cybersystems (ICC) and its Center for Cybersecurity (CyberS).
His research focuses on applied cryptography and data security and he investigates novel techniques to protect sensitive data in mobile devices/flash storage media and cloud infrastructures. Chen is also interested in designing novel techniques to ensure security and privacy of big data.
Chen will serve as general chair for the First EAI International Conference on Applied Cryptography in Computer and Communications (AC3), which will be held in Xiamen, China, in May 2021.
Poster: A Secure Plausibly Deniable System for Mobile Devices against Multi-snapshot Adversaries Authors:Bo Chen, Niusen Chen Abstract: Mobile computing devices have been used broadly to store, manage and process critical data. To protect confidentiality of stored data, major mobile operating systems provide full disk encryption, which relies on traditional encryption and requires keeping the decryption keys secret. This however, may not be true as an active attacker may coerce victims for decryption keys. Plausibly deniable encryption (PDE) can defend against such a coercive attacker by disguising the secret keys with decoy keys. Leveraging concept of PDE, various PDE systems have been built for mobile devices. However, a practical PDE system is still missing which can be compatible with mainstream mobile devices and, meanwhile, remains secure when facing a strong multi- snapshot adversary. This work fills this gap by designing the first mobile PDE system against the multi-snapshot adversaries.
Poster: Incorporating Malware Detection into Flash Translation Layer Authors: Wen Xie, Niusen Chen, Bo Chen Abstract: OS-level malware may compromise OS and obtain root privilege. Detecting this type of strong malware is challeng- ing, since it can easily hide its intrusion behaviors or even subvert the malware detection software (or malware detector). Having observed that flash storage devices have been used broadly by computing devices today, we propose to move the malware detector to the flash translation layer (FTL), located inside a flash storage device. Due to physical isolation provided by the FTL, the OS-level malware can neither subvert our malware detector, nor hide its access behaviors from our malware detector.
Twenty-one Michigan Tech students on three teams finished the spring 2020 semester with impressive success at a recent National Cybersecurity League (NCL) competition. All three teams ranked in the top 100, out of 925 teams nationwide. Assistant Professor Bo Chen, Computer Science, is the faculty advisor to the teams.
Michigan Tech’s overall “Cyber Power Ranking” is 22nd nationally and 6th in the central region, as of Spring 2020. Schools are ranked based on their top team performance, their top student’s individual performance, and the aggregate individual performance of their students.
Team 1 ranked 16th in a field of 925 teams; with Alex Larkin (CS), Jack Bergman (CS), Jon Preuth (CS), Trevor Hornsby (Software), Shane Hoppe, Dakoda Patterson (CS), and Matthew Chau (Cyber).
Team 2 ranked 45th among 925 teams; with Sophia Kraus (EE), Sam Breuer (EE), Ian Hughes (Cyber/CS), Austin Doorlag (CS), Sankalp Shastry, Hunter Indermuehle (EE), and Samantha Christie (CS).
Team 3 ranked 78th of 925; with John Claassen (CS), Stu Kernstock (Cyber), Jacson Ott (Cyber), Bradley Gipson (CNSA), Ethan Frenza (CNSA), Tim Lucero (Cyber), and Anders Jacobsen (EE).
Shane Hoppe was ranked 95th among 5,357 participants in the NCL individual game.
The National Cyber League (NCL) is a biannual cybersecurity competition. Open to U.S. high school and college students, the competition consists of a series of challenges that allow students to demonstrate their ability to identify hackers from forensic data, pentest and audit vulnerable websites, recover from ransomware attacks, and more.
Every year, over 10,000 students from more than 300 colleges and universities across the U.S. participate in the NCL competitions. Student players compete in the NCL to build their skills, leverage the NCL Scouting Reports for career and professional development, and to represent their school in the national Cyber Power Rankings.
Powered by Cyber Skyline, NCL provides a platform on which students can prepare and test themselves against practical cybersecurity challenges that they will likely face in the workforce, such as identifying hackers from forensic data, pentesting and audit vulnerable websites, recovering from ransomware attacks, and more.
The Cyber Power Rankings were created by Cyber Skyline in partnership with the National Cyber League (NCL). The rankings represent the ability of student competitors to perform real-world cybersecurity tasks on the Cyber Skyline platform.
Siva Krishna Kakula, a PhD candidate in the College of Computing’s Department of Computer Science, has been awarded a grant from the IEEE Computational Intelligence Society that covers the cost of full IEEE member registration for the IEEE World Congress on Computational Intelligence, July 19-24, 2020.
Kakula will present two papers at the conference, “Choquet Integral Ridge Regression” and “Extended Linear Order Statistic (ELOS) Aggregation and Regression,” both co-authored with Anthony Pinar (ECE), Timothy Havens (CC), and Derek Anderson (University of Missouri).
The IEEE World Congress on Computational Intelligence (IEEE WCCI) is the world’s largest technical event in the field of computational intelligence. WCCI 2020 features the flagship conference of the Computational Intelligence Society: The 2020 International Joint Conference on Neural Networks (IJCNN 2020), the 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2020), and the 2020 IEEE Congress on Evolutionary Computation (IEEE CEC 2020) under one roof. It encourages cross-fertilisation of ideas among the three big areas and provides a forum for intellectuals from all over the world to discuss and present their research findings on computational intelligence.