Skip to main content

Showing 1–7 of 7 results for author: Golaszewski, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2004.05248  [pdf, other

    cs.CR cs.CY

    Experiences and Lessons Learned Creating and Validating Concept Inventories for Cybersecurity

    Authors: Alan T. Sherman, Geoffrey L. Herman, Linda Oliva, Peter A. H. Peterson, Enis Golaszewski, Seth Poulsen, Travis Scheponik, Akshita Gorti

    Abstract: We reflect on our ongoing journey in the educational Cybersecurity Assessment Tools (CATS) Project to create two concept inventories for cybersecurity. We identify key steps in this journey and important questions we faced. We explain the decisions we made and discuss the consequences of those decisions, highlighting what worked well and what might have gone better. The CATS Project is creating… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

    Comments: Invited paper for the 2020 National Cyber Summit, June 2-4, 2020, in Huntsville, AL

  2. arXiv:2003.07421  [pdf, other

    cs.CR

    Formal Methods Analysis of the Secure Remote Password Protocol

    Authors: Alan T. Sherman, Erin Lanus, Moses Liskov, Edward Zieglar, Richard Chang, Enis Golaszewski, Ryan Wnuk-Fink, Cyrus J. Bonyadi, Mario Yaksetig, Ian Blumenfeld

    Abstract: We analyze the Secure Remote Password (SRP) protocol for structural weaknesses using the Cryptographic Protocol Shapes Analyzer (CPSA) in the first formal analysis of SRP (specifically, Version 3). SRP is a widely deployed Password Authenticated Key Exchange (PAKE) protocol used in 1Password, iCloud Keychain, and other products. As with many PAKE protocols, two participants use knowledge of a pr… ▽ More

    Submitted 16 March, 2020; originally announced March 2020.

  3. arXiv:1909.04230  [pdf

    cs.HC

    Investigating Crowdsourcing to Generate Distractors for Multiple-Choice Assessments

    Authors: Travis Scheponik, Enis Golaszewski, Geoffrey Herman, Spencer Offenberger, Linda Oliva, Peter A. H. Peterson, Alan T. Sherman

    Abstract: We present and analyze results from a pilot study that explores how crowdsourcing can be used in the process of generating distractors (incorrect answer choices) in multiple-choice concept inventories (conceptual tests of understanding). To our knowledge, we are the first to propose and study this approach. Using Amazon Mechanical Turk, we collected approximately 180 open-ended responses to severa… ▽ More

    Submitted 9 September, 2019; originally announced September 2019.

  4. arXiv:1901.09286  [pdf, ps, other

    cs.CR cs.CY

    The CATS Hackathon: Creating and Refining Test Items for Cybersecurity Concept Inventories

    Authors: Alan T. Sherman, Linda Oliva, Enis Golaszewski, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Dong San Choi, Spencer E. Offenberger, Peter Peterson, Josiah Dykstra, Gregory V. Bard, Ankur Chattopadhyay, Filipo Sharevski, Rakesh Verma, Ryan Vrecenar

    Abstract: For two days in February 2018, 17 cybersecurity educators and professionals from government and industry met in a "hackathon" to refine existing draft multiple-choice test items, and to create new ones, for a Cybersecurity Concept Inventory (CCI) and Cybersecurity Curriculum Assessment (CCA) being developed as part of the Cybersecurity Assessment Tools (CATS) Project. We report on the results of t… ▽ More

    Submitted 26 January, 2019; originally announced January 2019.

    Comments: Submitted to IEEE Secuirty & Privacy

  5. arXiv:1811.04794  [pdf, other

    cs.CR

    The SFS Summer Research Study at UMBC: Project-Based Learning Inspires Cybersecurity Students

    Authors: Alan Sherman, Enis Golaszewski, Edward LaFemina, Ethan Goldschen, Mohammed Khan, Lauren Mundy, Mykah Rather, Bryan Solis, Wubnyonga Tete, Edwin Valdez, Brian Weber, Damian Doyle, Casey O'Brien, Linda Oliva, Joseph Roundy, Jack Suess

    Abstract: May 30-June 2, 2017, Scholarship for Service (SFS) scholars at the University of Maryland, Baltimore County (UMBC) analyzed the security of a targeted aspect of the UMBC computer systems. During this hands-on study, with complete access to source code, students identified vulnerabilities, devised and implemented exploits, and suggested mitigations. As part of a pioneering program at UMBC to extend… ▽ More

    Submitted 12 November, 2018; originally announced November 2018.

    Comments: Full-length report with 18 pages, 4 figures

  6. arXiv:1810.06130  [pdf

    cs.CR

    On the Origins and Variations of Blockchain Technologies

    Authors: Alan T. Sherman, Farid Javani, Haibin Zhang, Enis Golaszewski

    Abstract: We explore the origins of blockchain technologies to better understand the enduring needs they address. We identify the five key elements of a blockchain, show embodiments of these elements, and examine how these elements come together to yield important properties in selected systems. To facilitate comparing the many variations of blockchains, we also describe the four crucial roles of blockchain… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

    Comments: 14 pages, 3 tables, includes all references. A short version with ten references will be submitted to IEEE Security & Privacy in October 2018

  7. arXiv:1706.05092  [pdf, ps, other

    cs.CR

    Creating a Cybersecurity Concept Inventory: A Status Report on the CATS Project

    Authors: Alan T. Sherman, Linda Oliva, David DeLatte, Enis Golaszewski, Michael Neary, Konstantinos Patsourakos, Dhananjay Phatak, Travis Scheponik, Geoffrey L. Herman, Julia Thompson

    Abstract: We report on the status of our Cybersecurity Assessment Tools (CATS) project that is creating and validating a concept inventory for cybersecurity, which assesses the quality of instruction of any first course in cybersecurity. In fall 2014, we carried out a Delphi process that identified core concepts of cybersecurity. In spring 2016, we interviewed twenty-six students to uncover their understand… ▽ More

    Submitted 15 June, 2017; originally announced June 2017.

    Comments: Appears in the proceedings of the 2017 National Cyber Summit (June 6--8, 2017, Huntsville, AL)