Mike Borowczak

Mike Borowczak
Verified
Mike verified their affiliation via an institutional email.
Verified
Mike verified their affiliation via an institutional email.
  • Ph.D. Computer Science and Engineering
  • Professor (Associate) at University of Central Florida

Red-teaming AI, exploiting/exfiltrating information from AI/ML running on hardware, PI on NSF CS4ALL and RET.

About

93
Publications
18,325
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
459
Citations
Introduction
Current research interests include Secure Distributed Systems, Security and Resilience of Autonomous Systems, Continuous and Adaptive Authentication, Cyber-Physical Systems and Applications, and Hardware-Level Security for Lightweight Agents.
Current institution
University of Central Florida
Current position
  • Professor (Associate)
Additional affiliations
January 2017 - present
University of Wyoming
Position
  • Professor
Description
  • Director of the Cybersecurity Education And Research (CEDAR) Center
January 2017 - present
University of Wyoming
Position
  • Managing Director
June 2011 - present
Erebus Labs
Position
  • CEO
Education
August 2007 - August 2013
University of Cincinnati
Field of study
  • Computer Science and Engineering
September 2002 - June 2007
University of Cincinnati
Field of study
  • Computer Engineering

Publications

Publications (93)
Conference Paper
Side-channel attacks target system implementation statistics, such as the electricity required to run a cryptographic function. Deriving cryptographic keys, such as AES keys, has become such a simplified process that extracting sensitive information from an otherwise secure algorithm requires only a $35USD microcontroller. While cryptographic algor...
Conference Paper
Determination of an adequate level of security and providing subsequent mechanisms to achieve it, is one of the most pressing problems regarding embedded computing devices. While there are some solutions available for resource-rich computer systems, direct application of these solutions to resource-constrained environments are often unfeasible. The...
Conference Paper
Full-text available
With the rising concerns over privacy and fairness in machine learning, privacy-preserving fair machine learning has received tremendous attention in recent years. However, most existing fair models still need to collect sensitive demographic data, which may be impossible given privacy regulations. To address the dilemma between model fairness and...
Article
Full-text available
The measure of diffusion, the property of dissipating patterns and statistical structures in cryptographic transformations, serves as a valuable heuristic for assessing the obscurity of patterns that could lead to collisions. As with many cryptographic hash functions, SHA-256 is thought to exhibit the property of diffusion. While SHA-256’s diffuse...
Article
Full-text available
A computer science camp for pre-collegiate students was operated during the summers of 2022 and 2023. The effect the camp had on attitudes was quantitatively assessed using a survey instrument. However, enrollment at the summer camp was small, which meant the well-known Pearson's Chi-Squared to measure the significance of results was not applied. T...
Preprint
Full-text available
The von-Neumann architecture has a bottleneck which limits the speed at which data can be made available for computation. To combat this problem, novel paradigms for computing are being developed. One such paradigm, known as in-memory computing, interleaves computation with the storage of data within the same circuits. MAGIC, or Memristor Aided Log...
Article
Full-text available
Power-based Side-Channel Analysis (SCA) began with visual-based examinations and has progressed to utilize data-driven statistical analysis. Two distinct classifications of these methods have emerged over the years; those focused on leakage exploitation and those dedicated to leakage detection. This work primarily focuses on a leakage detection-bas...
Article
Full-text available
The control flow of a program represents valuable and sensitive information; in embedded systems, this information can take on even greater value as the resources, control flow, and execution of the system have more constraints and functional implications than modern desktop environments. Early works have demonstrated the possibility of recovering...
Conference Paper
Full-text available
In recent years, Wyoming has developed Computer Science (CS) standards for adoption and use within K-12 classrooms. These standards, adopted in January of 2022, go into effect for the 2022-2023 school year. The University of Wyoming has offered two different computer science week-long professional developments for teachers. Many K-12 teachers do no...
Article
Full-text available
For 2 weeks in the summer of 2018, K-12 STEM teachers ( n = 40) attended a professional development (PD) that included four sessions focused on computer science modeling with follow-up academic year sessions; however, overall, the teachers did not meet expectations about what modeling means or how to utilize it. To examine why, the authors looked a...
Chapter
Finite state machines represent a fundamental component of all electronic circuit design yet their development, implementation, and refinement have often been constrained toward power and area optimization requirements of circuits. Given the present-day technological advances, many lightweight and low-power circuits are no longer constrained by phy...
Chapter
Kevin Costner: America's Teacher examines the role of Costner in educational settings domestically and abroad. Costner’s career over the past 35 years has seen ups and downs: his movies grossed 2 billion dollars in ticket sales worldwide and he has he won/been nominated for several Academy Awards but he also experienced critical and box office fail...
Article
Full-text available
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations o...
Conference Paper
Many smart city applications rely on machine learning; however, adversarial perturbations can be injected into training data to cause models to return skewed results. Jangseung is a preprocessor limits the effects of poisoning attacks without impeding on accuracy. Jangseung was created to guard support vector machines from poisoned data by utilizin...
Preprint
Full-text available
Climate change and global warming are the significant challenges of the new century. A viable solution to mitigate greenhouse gas emissions is via a globally incentivized market mechanism proposed in the Kyoto protocol. In this view, the carbon dioxide (or other greenhouse gases) emission is considered a commodity, forming a carbon trading system....
Conference Paper
The SHARKS protocol enables agents to circle a two-dimensional target or ensphere a three-dimensional target through two simple distributed algorithms that ensure that the drones are equally dispersed from each other and maintain a specified distance from a target. An attack vector was identified in previous work that corrals agents and inhibits th...
Article
Full-text available
This study compares three pre-collegiate teacher professional learning and development (PLD) integrated science, technology, engineering, and mathematics (STEM) experiences framed in astronomy. The study is set in the western United States (USA) and involves 60 pre-collegiate teachers (in the USA these are K-12 teachers) over the course of three ye...
Article
Full-text available
Research on innovative, integrated outreach programs guided three separate week-long outreach camps held across two summers (2018 and 2019). These camps introduced computer science through real-world applications and hands-on activities, each dealing with cybersecurity principles. The camps utilized low-cost hardware and free software to provide a...
Article
Distributed systems disseminate emergent behaviors across an interconnected group of lightweight agents. The SHARKS protocol (Secure, Heterogeneous, Autonomous, and Rotational Knowledge for Swarms) allows for a robotic swarm to encircle/ensphere a target. Motivated by security and resiliency, the SHARKS protocol addresses traditional vulnerabilitie...
Preprint
Full-text available
The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some dro...
Conference Paper
Most current authentication mechanisms rely on static initial verification of the user; however, such authentication mechanisms do not verify user identities on already unlocked systems. Spy Hunter, a continuous authentication mechanism, constantly examines user's keystroke timing dynamics to assess the user's identity. Also, Spy Hunter preserves t...
Conference Paper
The decreased size and cost of Unmanned Aerial Vehicles (UAVs) and Unmanned Ground Vehicles (UGVs) has enabled the use of swarms of unmanned autonomous vehicles to accomplish a variety of tasks. By utilizing swarming behaviors, it is possible to efficiently accomplish coordinated tasks while minimizing per-drone computational requirements. Some dro...
Article
Full-text available
Power side-channel attacks have been shown to be effective against recovering protected information from integrated circuits. Existing defense methods are expensive in area, power or both. Small-scale ICs used in embedded systems and IoT devices are expected to be safe and secure, and yet cannot afford the area and power overheads of the sophistica...
Conference Paper
Full-text available
Automation and mechanization require students to master the utilization and creation of new technology. Vital for potential careers, tomorrow's professionals require technological understanding to remain competitive in a job market driven by engineering advances. Regardless, most K-12 schools in the US and other countries do not currently other Com...
Conference Paper
Full-text available
Many institutions across the country suffer from a high attrition rate in their engineering programs, especially between the freshman and sophomore levels. A summer-long research and development experience can aid undergraduate mechanical engineering students in gaining and reinforcing skills critical to success in their programs. The research oppo...
Article
Full-text available
There is a clear call for pre-collegiate students in the United States to become literate in computer science (CS) concepts and practices through integrated, authentic experiences and instruction. Yet, a majority of in-service and pre-service pre-collegiate teachers (instructing children aged five to 18) lack the fundamental skills and self-efficac...
Article
Full-text available
Security‐centric components and systems, such as System‐on‐Chip early‐boot communication protocols and ultra‐specific lightweight devices, require a departure from minimalist design constructs. The need for built‐in protection mechanisms, at all levels of design, is paramount to providing cost‐effective, efficient, secure systems. In this work, Sec...
Preprint
Full-text available
Emerging technology demands reliable authentication mechanisms, particularly in interconnected systems. Current systems rely on a single moment of authentication, however continuous authentication systems assess a users identity utilizing a constant biometric analysis. Spy Hunter, a continuous authentication mechanism uses keystroke dynamics to val...
Article
This article explores one group’s use of action research (AR) and lesson study in three US university-level computer science courses affecting 85 undergraduate computer science and engineering students. It offers an overview of three areas including AR, lesson study, and engineering soft skills. The research group identified a problem: undergraduat...
Preprint
This study bridges discipline silos between science courses and computer science by indicating how they fit into and complement each other. A study of eight K12 teachers and 26 K12 secondary students participated in a GenCyber (cybersecurity) camp for a week during July 2018. External evaluations of the camp show its success and how cybersecurity f...
Article
Although you may think of our technological world as a giant web of elegantly interconnected devices, the reality is a collection of messy overlapping networks, all communicating simultaneously on disparate infrastructural backbones. To communicate within the chaos today, specific components may be forced to share space on dedicated local networks,...
Preprint
Full-text available
Unmanned Aerial Vehicles (UAVs), referenced as drones, have advanced to consumer adoption for hobby and business use. Drone applications, such as infrastructure technology, security mechanisms, and resource delivery, are just the starting point. More complex tasks are possible through the use of UAV swarms. These tasks increase the potential impact...
Conference Paper
Full-text available
Employee theft and dishonesty is a major contributor to loss in the retail industry. Retailers have reported the need for more automated analytic tools to assess the liability of their employees. In this work, we train and optimize several machine learning models for regression prediction and analysis on this data, which will help retailers identif...
Preprint
Full-text available
Employee theft and dishonesty is a major contributor to loss in the retail industry. Retailers have reported the need for more automated analytic tools to assess the liability of their employees. In this work, we train and optimize several machine learning models for regression prediction and analysis on this data, which will help retailers identif...
Article
Full-text available
This article showcases STEM as an interdisciplinary field in which the disciplines strengthen and support each other (not as separate science, technology, engineering, and mathematics disciplines). The authors focus on an open-ended, complex problem—water quality—as the primary teaching and learning task. The participants, middle school female stud...
Article
Full-text available
On-line privacy is of major public concern. Unfortunately, for the average consumer, there is no simple mechanism to browse the Internet privately on multiple devices. Most available Internet privacy mechanisms are either expensive, not readily available, untrusted, or simply provide trivial information masking. We propose that the simplest, most e...
Preprint
Full-text available
This work introduces CHIRP - an algorithm for communication between ultra-portable heterogeneous IoT devices with a type of round-robin protection mechanism. This algorithm is presented both in its basic form as well as in a secured form in order to secure and maintain trust boundaries and communication within specific groups of heterogeneous devic...
Conference Paper
Full-text available
The adoption of " new" and "untested " pedagogical approaches within collegiate classrooms discounts that these approaches are anything but new, and that a trove of data and lessons learned is already available. The work in K12 classrooms and professional development is often ignored rather than leveraged as a force multiplier as a starting point i...
Conference Paper
Full-text available
This paper, based on pre/post test scores of engineering student responses to ABET soft skill knowledge, explores the possibilities for freshman engineering students to engage meaningfully in six of the 11 outcomes for engineering graduates. With a focus on multi-disciplinary teamwork, professional ethical responsibility, effective communication, e...
Preprint
Full-text available
The retail industry is a data-rich environment, especially in the case of risk management. However, much of this risk management data is not used to its full potential and there exists a need for more automated analytic tools. Supervised learning solutions are not enticing due to the difficulty of providing meaningful labels for these types of data...
Conference Paper
Full-text available
Cloud-based implementations of interactive code notebooks and multi-agent simulators enable K12 and collegiate level instructors to incorporate computer science (CS) into their existing science, technology, engineering and mathematics (STEM) courses and professional developments (PDs). Three different K16+instructor-learner interactions are highlig...
Conference Paper
Full-text available
This paper provides a view of 22 K12 teachers' expectations versus the actuality of immersion into an engineering education computer science (CS) project during a Math/Science Partnership (MSP) grant called RAMPED, which was a 16-day, yearlong MSP grant. The CS session using NetLogo was selected for focused examination. NetLogo is a multi-agent sim...
Presentation
Full-text available
A presentation to a mixed audience of business leaders from across Wyoming.
Conference Paper
Currently, computer science (CS) is emphasized in science, technology, engineering, and mathematics (STEM) standards and curricula in K-12 settings. The authors of this paper argue that K-12 teachers can learn basic CS fundamentals through exploration with a free, online programming technology tool called NetLogo and without structured, lecture-ori...
Conference Paper
Full-text available
Computer science (CS) and engineering concepts are often absent from education-led initiatives. This study examined the views of 23 pre-service teachers (PST) regarding CS/engineering concepts. Findings show pre-service teachers (PSTs) have below average content knowledge in part recognition and skill sets, as well in use of crosscutting construct...
Conference Paper
Full-text available
Can you explain the basics of computing or computer science (CS)? Most computing experts have no problem talking to their peers about CS, but can they teach novices? Teaching and interacting with students without any prior scaffolding or exposure to CS concepts is outside the expertise area of most CS content experts and STEM faculty. This work hig...
Conference Paper
Full-text available
A total group of 41 K-12 science, mathematics, and technology (STEM) in-service teachers chose to participate in a Math and Science Partnership grant for professional development (PD), named Launching Astronomy: Standards and STEM Integration or LASSI (resources found at UWpd.org/LASSI) for 25-days during the summer and academic year that involved...
Article
Full-text available
Twenty-three pre-collegiate educators of elementary students (ages 5-10 years) and secondary students (ages 11-18 years) attended a two-week science, technology, engineering, and mathematics (STEM) astronomy focused professional development in the summer of 2015 with activities focused on authentic science experiences, inquiry, and partnership buil...
Article
Full-text available
This article details a new, free resource for continuous video assessment named YouDemo. The tool enables real time rating of uploaded YouTube videos for use in science, technology, engineering, and mathematics (STEM) education and beyond. The authors discuss trends of preservice science teachers’ assessments of self- and peer-created videos using...
Conference Paper
Full-text available
Two individuals, one high school teacher and one engineering graduate student, created a lesson in an attempt to expand traditional lessons and instruct the graduate student on effective pedagogy. This article outlines the integrated high school lesson showcasing all the aspects of science, technology, engineering, and mathematics (STEM) as well as...
Article
Full-text available
The thale cress Arabidopsis thaliana is a powerful model organism for studying a wide variety of biological processes. Recent advances in sequencing technology have resulted in a wealth of information describing numerous aspects of A. thaliana genome function. However, there is a relative paucity of computational systems for efficiently and effecti...
Article
Full-text available
The current push to educate highly qualified and productive Science, Technology, Engineering and Mathematics (STEM) professionals typically culminates in collegiate capstone projects. These group projects attempt to prepare STEM professionals for entry into the real world as they exemplify early career group dynamics and expose the reality that com...
Conference Paper
Full-text available
As silicon-based technology feature sizes continue to decrease and designs remain susceptible to novel attacks designers face competing goals when creating secure, low power, integrated circuits (ICs). Often, low power designs rely on heavy minimization and optimization procedures while many secure designs use low-level duplication mechanisms to th...
Conference Paper
Full-text available
We propose a high level methodology for Finite State Machine (FSM) protection on a set of insecure FSMs. Hardware controllers, from those used in low-power authentication devices to those coordinating UAVs, as well as stream-based encoders rely on classically derived and implemented FSMs. As the proliferation of electronic devices that process sens...
Article
Full-text available
Two activities, one on heat/work and one on dynamic equilibrium, are described for three high school classes (n=55) in the USA. The curriculum addressed showcases strategies to use with science, technology, engineering, and mathematics (STEM) students. The two lessons described follow the context ACS method (Application, Career opportunities, and S...
Article
Full-text available
Is the field of computer science and engineering a strict discipline or an art form? The answer is both. Computer science and engineering concepts are typically found almost exclusively in collegiate engineering and technology programs. Given its importance across the 21st Century workforce, arguably these concepts should be taught at all pre-colle...
Conference Paper
Full-text available
The emergence and proliferation of Smart Cards and other security-centric technologies require ongoing advancement in secure-IC design. We propose advanced IC protection from Differential Power Analysis attack though a hybrid-logic style based on Complementary Pass-transistor and Dynamic and Differential Logic (DDL) in conjunction with a synthesis...
Patent
Full-text available
Described are a self-protecting storage device and method that can be used to monitor attempts to access protected information. Access is allowed for authorized host systems and devices while unauthorized access is prevented. Authorization use includes inserting a watermark into access commands, such as I/O requests, sent to the storage device. The...
Conference Paper
Full-text available
This paper describes a methodology for safety-centric development of distributed embedded avionics realized as sense-actuate-control (SAC) networks. The methodology has consists of two parts. First, formal methods are used in defining and deriving families of SAC node architectures. This methodology eliminates redundant verification and validation...
Conference Paper
Full-text available
The modeling and analysis of a USB storage device with a novel protection mechanism is described. The USB storage device contains an active monitoring subsystem that decodes and analyzes an encoded request stream has been developed by Clifton Labs. However, before moving to fabrication, there are several design parameters that need to be explored a...
Article
Full-text available
We show that the ability of a lazy language, like Haskell, to allow procedures to lazily generate a stream of tokens can be added to ANSI C++ merely by writing code in a style which uses classes to implement function closures. Coding in this style provides an easy way to handle infinite streams in C++, results in application layer implementations t...

Network

Cited By