Find My Hacker? How Apple’s Network Became a Tracking Tool

A research team headed by CS faculty Qiang Zeng and Lannan Luo has discovered a critical vulnerability in Apple’s Find My network. This attack, called nRootTag, allows an attacker to turn any Bluetooth device into an AirTag-like tracker, leveraging Apple’s 1.5-billion-device network at no cost.

Using AI to uncover Human Smuggling Networks

Professor Carlotta Domeniconi in the Department of Computer Science at George Mason University is using artificial intelligence (AI) to combat human smuggling networks. She is the principal investigator (PI) on a groundbreaking project aimed at understanding and modeling human smuggling networks.  

GMU CS Students Win First Place in Cyber Warfare Challenge

Post Image: GMU CS Students Win First Place in Cyber Warfare Challenge

Congratulations to Sam Best (CS BS) and Tommy Chin (CS PhD) and teammate Noah Korzak (CYSE BS/BAM) for winning first place among 11 teams from universities across the nation in the Cyber Warfare Challenge hosted by the Naval Surface Warfare Center Dahlgren Division (NSWCDD). The team earned a $60,000 prize for designing a powerful toolkit to analyze network risks and resilience against a number of Advanced Persistent Threat attacks. Their work, praised by the NSWCDD Technical Director Dale Sisson Jr., P.E., SES, and Commanding Officer Joe Oravec for its potential to shape cybersecurity’s future, highlights the depth of the security expertise at George Mason. 

Prof. Alex Brodsky is a keynote speaker at the 36th IEEE International Conference on Tools with Artificial intelligence (ICTAI-2024)

Post Image: Prof. Alex Brodsky is a keynote speaker at the 36th IEEE International Conference on Tools with Artificial intelligence (ICTAI-2024)

Celebrating Excellence: Faculty Achievements in Spring'24

As we approach the end of the school year, we are proud to announce achievements received by our faculty this Spring semester. These awards highlight their contributions to both research and teaching.